=loop3, iso_blknum=36, block=72 13:57:49 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x0, @ipv4={[], [], @remote}}}, 0x6, 0x81}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r2, 0xff}, &(0x7f0000000280)=0x8) write$binfmt_elf32(r1, &(0x7f0000001700)=ANY=[@ANYRES32=0x0, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRES16=r3, @ANYRES16=r2, @ANYRESDEC=r2, @ANYBLOB="fb2a53aeb1f5de6a122edf1d7331b2facd261780a04fc7b2ce795f17cd3f7a4c33d4fa153f13879ddb337af67c41fbc4912f8876d032e4c5f7ce6ea830f6e750fc3208ebadbba1d7fe35a7bf3fef67c7b678c14a367cc943fb4f788cdce6769817669afa7788e771a34da9ccf0de6b8c24ff72611d289b08c9521305edcb135281897b11338d14ce52d1d353019fc339724bb756e1dac7b585a6632a2826d398a013d5ee562d56a06a220b076a84dc16fb817ed40a61ac8ee8dcdeabe1969120923c31bd70e56c08ffd45f26b2d681b25e2d299a6c0fed486b0dcbe0d278c78a82e531de5c8a8659c7ff017acee30098ef95de03612417ec21d6740188233bd65f5967d453e66670cac4d1dcda839c28f3df44f2765a83eb4dd3938307a72a37b0d095ed88d78eddae01cefdc13c45bc206c4b27815782e8c46676e45cebe41d4670f95ef81dea9429a739e2223800fa031f549c041b7f4d78423909c69d37574c2bce41a9a9727ee26b607a24e3a6e9c9b9cb3959946e5fd3a167115b09a1232453bc35fd565d3ce5fe6119356f6c158b51cc349a7d2b96028c9d740855c8997452d1882b9ac9d8e0d698fd3cca02536620396b7f5bdc82dcaa375296e5ea26f5ede46e20b4aa4393cc7b7996b1a6c9edfc03d2812d5235bf46b57ef98d39cacd4e42b6805774f68fa9eebbd8dc7e14f31545eb09a42c99d078f81e9a97c07e3a3341789dc233c55e924714e9fa26455012dfa7c418f9801c48e1ff369b725971460b5b1ddc91e92578b524dd9b9485568409f40ff55686f4e9fa8b9a08c9830b9baca7aeb66695316d3eabfaa5a04c59f144ddb62468fbca858487a47921fb2557ce0591e385917b585fad3a7898047e64ac6f90715c41f841832eba9f2fdabec4ce0a4ce03149924e98e35357ce3252adca8d67e21b540b54a692101cc06848933c7aef3b5429ccaa4cdc63701c7e11359d0705f4dec527586374e4b3621ab9001ab0f466cc7fcf8576283102720e26684e0296bbbd7396a7d26844a9032753680d366096fba506939ab71dbcc7ab1684a42491470df99df3d316e1ab741e27c8049c18604496bcdb7f63a376aebcffb9084bda49501ca13d3d28aa7a1ab98181d04f8d3020f8557b6e93d5b74ed0869ae0786b0b25fdf7f158889da525176b8763667f954e1e86f564c86f9aa1b819e99f0dccc6a2886ba56ec6cf357cffa5c1c698c31d9532c09c625e0a40a214db6949445f14cfd3650fdc665565af48d5135134461f4e0a42c63f456a005b504709eb5061cfc9f6b00932f4cf377414a24b0bc3aa517745fc4436c9cb1117c3889c3041956e89cd6c06b3127a9bc769aae07746b17873c03187d388588b9c2cd3853a744562c6a0213797d231d2259662e39d4c58f4f8a371f8c007d8b0bf8f79209ca8b48b2dfe32a307a20ce6563bfee70dd0bf5a1fedcf35f110e1e4ffdb3e613383f7f4e22140f32e16488dde706f95272800848de3e91db6d3d9514407b58553527cdf65e03f0bfa68210e811b1ec95160cfdf01b5a6e5ac30641bb9182db1736c0aac2e1e967e14fe602f18dcec5a623cd0008b001ab2b957c0f57bcc1285698ab0bd9eb17ba19b98f97d9a145ae6c56721f1fdf54b1a33b902eaea05cdde08612a9da542f43d52d94e348467ecf4b19a06c865fb63eeb42d996f84ce06e728c2e7124d42cb80cbda43ec0d3d1b56a2c1251b000525cbb3ee8b12a046cd564f08b70db96b01b4b58e2788655af0a28f875577ac58eeb91bea29000578442d70052e744803f7188bd12498180723b69a8ce309b5f9a87e806b13296567719bee12c49d1f474532a9d5c344feb8dc591227eac474b1a7b61b5f19ba9cc30cf7e6bee4bef7248bbb86fa7ddd799870c3bcb3e878856c73d9c31725e8ba989fc3eee2a8dcd89fa87afc8edcd939e0e0314d8ccc4f42eafa16e2b7740eeb1795f5a63c86201c2d3e58db64d2dbaffc4ee3d5f6bbd1b6f42dea35714f474d21ae3a5f307246eef4e6a4a2d05f2701568d304588f678bb2b385805c173efed9d508b027d60a950d0a0d1b48363156f298fcc80ece07d450dde2dded61be601e9a7649a02d6f4ee6514013209533a5b75591f8b96270618fc3240fa208e83d8ad64dcf2f1561f6d5d6121adea229e14a8c44ff01a56a6b944482de156e23c5ca1a453f82ffa6dd621ff5c90fb06da930f48e8e2a08b385d50cf19ba02606070d23e16cd578ab06595e93e894d323f51fea6a9433eb2dc62681d4cc35eab3c6cf3b80c6b703f1576b7107a7cd0fe7b23b87fad93ad3cc8c9a8d4998ade72dbb4774214b54580af7083de282c2b4411b295fbbd1ea7c01404054bf42cb5b617e36481a13552d621b1f5ff27525680d1626cebff9b2e1074fb95da93d407eb18402e07009d4f34249751aa4c5666f18bcbdaf8b3c7d27eeca96b835a297579dee282aff95730a97e2ec0ae7ac6d854b5fa5bd06ccbbbf3d4e93a8047bb34f33e4029546180b533cc490c398419485512eac4a21576f8babc1ad04c164f4659a66c1b90ec12d82da4e884c514082542f07977f747151d4afb72fcedb34b1b0ea621606597f09aae44a35f0585a7e28ac6ba6074cd9d22ce3709544e0429b24d37b7952c16ae72b3fbe05a81a81de8f7c44490aa52984f79f40f1f3591e68ff963e394546ec0584b5c0f0fdb7e6f4d23709491d1543ca00af5601739f98746e6e0d5bf8de27c0266b7398fc1d1efa99330af53283e551eca5b8d24cec23f783f3a6a0230d9e2430ae813a40fd722b1e024f92160558c699f760f91688c03cb75dda361cf9fef4ef29a1ae7c35fbffc5128da306584ef130160725caae4eb161fa1d6a9962f9d3e02e2c9d0de23171a5cf494ce5999e9762eeef881653f468d3743b03b50a493d7a10b8cbaa2009ab25cc9d0fce710d9f25572b1c7b2a4eb230b44d920dc9249eb12396186fe20bd9e56691c7a7ff12e17a0c640d5a0ffa6356562731f3c67bff4413c956b76fcee4b5062e07be51d3105196c40298762ff00245365e9e3a28293bd50160f7cc68ced6a8d722c7d360e4b90a9addf289680cfad9443d2a89eacc650708a4a56c247b98537df7b69d1202fdfc92056db842f9ae6ff23676094ae953440139e9f4a923df462f2eaafc3871f0bd490e83e99b6948c959c3b35159a0d180ff9edb994b847dd28729f1eed47b062f6a065dcef147613348d5cd29bd6c634b3557284fd3a6be8820ec2a9325dadb2fe77a364b22a03339d239bcef6e91d9bc540a2cebca53818031da9ee187611c44b760f15cb7614903f4b7ff53f41837184336041797c3fd806a0a98da84e3dbffc73e2ceba55b0dc979370db00a661e4ead37a5aba48fc4850271535b3607ab05c0de181c54348f2bd7d7168f8f55ea901f1053d8f8742f09dca5d31f9c0cd8f2f4c03c3c7e29a938bedd8c36dd1bd8f3408b364d0780b9568f4b7a045c17bfe5ac5d94e7f7595f13dcd0b921743d32ac023a2fff86c265e2b90cdbaf9e428894360482f85d98ca0d8f746586f1bd27b1be46c66ade7d90520276d9072b6a502792733e741db9e28b2e7ff819bf0ad689c866136cb98a8a6c288b69a28b9a022c2d7242dc37679a552853e9c8b756896c5a3877b86630b272cbe83f15b608894aa56a82fd1871b15bc65ed48de6669acde333a6fd4c8c73d6b6fb103e55243e3e3e0dd442c8f9ce0afaf36d92ae6501f88cc5205e6d4b2a57165ec0ac576d450dc6b39b9a147803ff98b77bac98b02853d16afe21c77a011c3b9658142ea4bd15bc9a4a928b29386cabea6ef7ae4d207f0b64a2480663804b0056dcaf2857183d009a8b20b06de6e0988311f5f3a03b793c53bd53dcbc5f7d2b9b328c31d5d406ae9aa04fef9917ac41473703d8ca178a053dc0fbc7344191304747d67baac7b29fa0d02e77d956d48f3cf0c3d3906158dc37df62efb61d5072d50d0a2cacf7689f261e666657fa8ca2ae84a49bdede13560776ec7006bdc983c350223aa803d27ade121311af0a1c368f4998b6979988e97103de8196443885b84db8f8ec9604d441029844bdbfccac8424cdaab87f6385664db7f98771eef71586836d8984f972c300430e9084fc80c33e3f3e3129a907f3af55fd960835da2798f31db4f4dfc4d2c7b583008df5d42afa4c3c55ccf04bb0a1d26678b9926734b4f3db8a4ce7ad28404793143cf9720e16d7054695c574b6462fa074e2e961fbde57fdaeb5fc57547011986be83754322ab1e22c75f3270263a8c40e92e4521466d300b1cd1c5a416a4f15606cf07ecc8e24e244ae084dc5fdd7bf313fe62009315cdb83761db6712fd6bc4ec9ea312c0681475f48f9a2bf25a538dc4aa3898e5e12f724731417e90fd4854a143d4df94a41ef6269b2193148f090a2011c830f9664f316cf3bfc17e51188641172a88dc1fcc3df765e6ae7bdbc22cf19e8481636a067bce4ace5c8b2852f83ec9a42d0de3de9f6e5df21ea7b7683b10350e4cfe8f447c77bcf039af0b7c7aef1ce94bea58f69a872d8136bc0043206d744e0f4694f707a83fb0e2ff37acc2483b495c4c76358ed72d9bcdd86bd92cd6b434842ba7e445a446c7900405a97b4648b90eda8670815f287674576379b998813ddac4649669f32228d61a4fed20c6b3edec10c05102120c8810c8960a2a5bb6d574b6ba67c0a81bea2d8f6ae359611c86941ff34fd170cb27163d4fc831bcbe58563b838672b65f784430f053e40888bfac08236ed1ebe7841e8d4c708d6eb547495cfc5fca724f962e95fc0c9e776804973c369f5647f9b73cb8ad4c795c48457b597ee99bb480584795e14141d4bbc96cccac28f45c03aa46cb5329bdd5d605d930318e5edc950bd33fd9d259ddd49e03e58af9bd14055400769725e1bd77776d277ae6bffad4719160404b1f1c383c915c21407ffde19615be7fcf23e137aca1c5834ecddd6e59ccd10854e27b9fc068681f8af6df35c6028663de09ffa4ea339e0b61bfcf5c76a2f0b0948198f5c4ec7f8829f239f8de32f341b679baec27383b4d79f6d18ddf0d1542c84dfaf3d7b6e2270fd11c00664e8f8a713288f73c44799ecd3b3035416e1856d587b531017a015aa54dd1e8d09f7fbc303d134da90519382e8aa2b08b9ac27ea3775c75a1102baa21aaabf62cf50c10ef1f9dda6998ac0aefd7b72261c93a24713918ff5b05e46ef4de2b4eab4aa2e96f05ec0c54af4efb1f6f259e813b4414a8ca00a9b69a7e4e28b4fafe281f6348e3f26aa504976a35bb65b1d3c7d3528f1e67f9e800538df3b8de25e183ec6d226c3dbea0b9a0fb629c0fc9cc3e213e10780eed8565ba85a422bc2bcf8d01833a4465178aecbff8ac9b02b3d06e760e02ddcd25e8efd58b94a5e9ed509232a334d002f6e7050a81778fc4b1626bde699f03ffb4034974ae70dc50236c5ab778ef6e9e012f78035dc76cb317e4916b543905b87a420516cbea1f2d64a7aa98d2910f6d08f20cc6de98c3996ff9beeaee6dddf7f00039bac66b3b41972bc05431cca92e31ea58cb926bc9c59523bb5ff06a513c246e888bfcdb60a3df399e1903552ef7705697886ae0aa3da493dc3af5cd778dabb85cd2bdcc0a57aabc0f88b4a1167f48f21297dd189a04902dbe1c6fe75b5b6f3d41ce0a8b025f68107f809e097ab03e6359d1768f6d5e7d2919ceae6440f9870d854d2357f8127413097467cd4de4f25f95ec1302ff5237a3cdda56942139b58dd249f16aaf0808d1e50d33e49b459d561650", @ANYBLOB="be5ee2f373ef53ec3a3378612cc2f78db3c700995d39c3e43661a40ff8fd3eb9bf7d392cc0ccd1ea3ec297e022e8be4ce9dde617ce3243045d6576a4212ca9ee89da499a486713a863ccdf8b4e088afd914e2cb12ba5e697e4183974083f610cce7738d697f91aa3f206e8cd7fda6387c92ce4b345d122f2497968e82659380c95e44d51f4ef8a0b5ff9eb58f12eb7b1930d4313996b32e0c437b0d29401486f", @ANYPTR64=&(0x7f00000005c0)=ANY=[@ANYRESDEC=r3, @ANYRES16=r2], @ANYRESDEC=r0, @ANYRES16=r1], @ANYRES32=r0, @ANYRES16=r2, @ANYRESOCT=0x0, @ANYBLOB="324aa3f2d7217a0c4447c7c555babb0ac7cb023eb3504d4d375c816c937d9694af571e1c32cef79b8ddde314c8fdfe7b570616be48ffc73e4df80704561b83cfdb23742b9bdd8345f0e30a08507982414b4f16df2c118cf4d374c4c8d1c05af2e93ea9d547b06a9c1b29b31ab96a884d7ebc670431e8752a81908cbdeb711d5753f419ac0069ec4d3a0138c716973f1c0decce1869098f68d76103dedabce86c2c96512fa49a9a2d8de7e5e4908479282fb0c505981bd26b094694ec8d7b6b5b9738ed4b8a9d354f8f33d246879cb3407c20e2045d92fd6bc0c9f0b5c827ab52f83280766323e1fef2763dcf42e09a7b37764b372a5a2f777924b128824e59b5ece529395ccba9a44c94e7281d85225e5e4c4df920cf92d0a3ccb2a870925f4fe601c1cfb641fc05a909194d76ea2753a3370cbf33b116eaad24bafcaecc8e2b3a7376fe1aa36e047f1b029307b684934f5cc17da64b1ce79fc15a9976aff6ab5b1afd7b202699997a20971bc0e4356dfb5da576222ca3c931083cb61a0ca12c1a5912fb256b9e03fcca82f76df379ee3d6128fe48460643648b748c68d4f6221080dc2204a43c07ca0323fa6b8e84e80689cf1414dbfc3e3d85e5249d4f01b255ef7d96f0d7de6a4b2c2f523977595172666b304fe803abf3b1607c351177fddbc587f5acc15fddf70fd27ab25a75d70323d7670d473c1a72fab69edb1057d251ce7066da1d611844f9fe14b04c7a3d6832b74c2ca544118c73ed1f34b36970af533bd70480c97d2894fb695a03a0a3637f6df4b07a79add73e0a62bd30cd6cd1316338bdbfd36f086bdd43c040fd1464097e0582506876efccd9e4d72c76b6def34e999f2057602f6787af5432b9bd775d58b1cb6d74d0f6fb8c2b985778e5c51a7ad7451ac730a6151c04b41888f83230185bfaeda9ebfb04cfd812f0c35411b18dc3dccb8bf6266e93c506eb154171265f09339199107b8ecbf5bbc5816d26af5e17c47e771868f1a09f8e269c806ebcf3af7f65015ffad8ea1ac356cfad468c136b993c353eac2b797613742d84eaaadef0ff3b2a363efbedad369bc7a16d55537c02a775c90258de46235439868316d40881ac896b5ed8e58c901ba71276567d42ea61f4d4455eba74bce8f4e6919157996a02ec89471949c391055598d5e3f5d01891796b23140d4d4358ac05e31d698e93ed364c93b9945f911af5e9fa8e42dbd02cf4b50bd6f4f769fa8ad4022bec6f6932f0fb2de10ff842b381a0bf382d0ef2c8731dd910490215c0aa1c1dd1d9ad895b0475556112cbd14243c26ca92e32ff69f12907fd98d68f978412b1d32f330ef8b32bb881080974fd97715c6fa1802fcd2b133013a98cdaf0337ccbcc2681436848a920a5a7baab3052b7d981b8191a1e68fe2a7ccf570d3d440c0f6e8a5bb1a07f99c921b8e24a09963d04c6cce3953b43f43a62f5583cba83cd2b3d696757fee6b24ee77c7c9624078f7600adc4e06016d4978d2a1e03e96d1978e186cd2bee0ce786a5dbef8633e6cfac1887045ac9dfe4981994fc1e06dd59bcad4b031754acec65dab3e95d9a2afdd4538343acf4057a4592ce44ab0c585e1bb1db6f80153d8028f8f629aad36b39283e03f1f032af198f284b6afbe256e4202d2dde896c754b5ce4720733e32c7c4e800a966d5ccb0ce133a4d30bce56a8cbeaaeb18267e0e1f5e0e16f02054d6205006cce536658e29240315c3c2ebb0eceb5216deda39d210fbd3f42e352d5f89645a46b9b0b98efbf3ca95cd3332985e8f1dcb307c3096302f955e248d09255bd9c3166263d97a6085de6bfcd604b086464cf00742e4cbf820657b01ebd28aa7c89542ee6cf164ea3ee860ba233a5764b6ab02d2ae1c011ad81a7ee74d297b3a58b4d200a602cb913ff1bee64b3b8d07a8a09863f85001ddf86c7ca97e5a84bae0f294dab8c1eae444420d63e9721ae14a85c05f0355f63532b1e5e5f521eceb499f4c6d075ea82dfe36db3129fb9fccb7fd76ef3dcbcf733d9ecdc70517b2cc815fd457003d799606931b65fdfe81099b70f9d84a4a95fc5759336ee01b750370ec57fdd771cebb8e9d74b698cda508ef26fd600446285c4a238730fbdce7b47fcc4143561c1773259c054028e6ff2ca70f32dc79f81ee50d2087b9e17f5952e1624dc1cf8ec11619bcfe479cce34328ecd0405fda68502710675bbc64d1a77805e4ffcda0417dd32c9231a0523af377a30b98962e7837f34ba9323cf5ea7ff70484ca4b92e0ea8d7cd9b52cb9dea62130e6fec189faf5dacce266f8fbf1bc97476d9ec283793b80d4df03851bb2d3881877814c913f6c95c1c0b6fb452698afc26d3c65060af7f17e492248cd6c97b03b661fb4dd5d7028bbd2f3e6f86e651552833237d3c05510c7d60be34daa37da1419159a1cef3d7313538f508addbc631dfbbb92891eeff194b93e424760d302137d46951bf845e4ae13821ed5c6028e92e36009b05ef2ae0f0c345666a2eea874da4d80abac1d5ba560f4372e0abe72d407618a92ac6222f5a51449f4c0c180ddc8a743fddae1f1430ad2e9c72fe94395bb24a7b7bdfa90596ca3897773a05d9973d2a36ac2513a126e7684754bd1391b0ea7a32f1d38749da77c65657bd270d4b78b8d55f6e3e4e35f2286bf0e9c4353960d3c58300252c18bafc6430456216647e2cd0e43fb41d885fdc0adc52f5ddd475d5063e0e35a1ccc62eaa0bb72025fef971e2617b779996cbef4e0801122fd5b7080e096716f43a937a79ec8e9f01ed8c3b738f1a0dbd7926ef08b9959470362c4a2b8ca348194ea91277238f265c022ebf1f2ec721a0ff219916016146cf6d94ebc7f9ed72852612521d8d191816600d73dc5a791cb9bec7c85d1926b04a5ba4a5157440c878d5bbfd4203ea47682728b0534f172d8b52c94150144f7cf455ca61e60e992cbc98e745ec317bedbb36bbc69093d819cc9cc7c6057f2ba9c21ada83365e1f4aafb677004f46815412c49d546251e6e0a7c1846935bfbaae995b0d4847a66577eb4c7d9ef6a0237891493f6e8a5a85813ba1c471498eb7c5c066615820e8b1628d40a2550faa03dd26975dd8bc99ad42f044e0858d41fb37786293b29fe10a534524e9977d386a24109fc1cfa7ad6713d51aaa232995b5f305dbd9a4731737174badb1789a25f2272be85ae56e22460f5424be5d74e0ae7b4d2fd88f2fbe9def064323be7fef7c650d3168d2b19efc693fb46481d903ee6e3059938aafe1ab858a2a6cfca30086d7f1dbb55664095b720da1dab4ab1dda2c1723d05142423e30692f46edb75d5470a4c8cf1c216a5cd41df4cad4924c5a650bf14746cc7fbec91a9fd22e203459a2f766f2d53e0823d990bef9f9f0eb3dbea498ed468f3884064b090623a531c7b87b23cf4d15e5c589a8886b1a11e5346cc45383aada5a039b17f5da5bf87384816cfd809804460c628964a8e9b9bcbd958e110190da9010e71d780b46ed3a790872e11b7911fe2f5889375d558866fcaf5d81739752a7d2933c80170e536f07dc678408aa88a2db549f9b89bc44fd1bdffb91bd51137c57f7dc2a5358593c10d47a46a1bae09b262775d23261b670f1ac3ab43966dc18a5e0a3c33ede7e5792e05bcc950719c9ef690ea11975b63895071e1e25d0d3174174c0a6c441e82a44263e35d2ff701963df3f9ac85cff18a413ee39a487060eece20a3046d851bb6470d5196513a1458c7887e2583f4756e4a40eac1c08598ed0acbf4cbc4bfdeb3295d5dd493085a6560f59044a6647f4becc1e4585a54bbf0282229fde575b9dc2efa3801a243eb273d037efcbefdb242d569c3780c6e62380ac18f064f8304b10d06a2b6563f2b170b8b8a1d140f697e902538029531f77760a9506d643f5bbdf8de88ceffde1e8390e34f101609d1b34c832c8dc29934a05589531f0896658da4267596a69eac0bf483cbcbfd09a546389370df941abfafe6b5c6f69bf9a20a5124c0c83e114333c8b0b4df66874345a98cc2561082e40d12b06b029a39bb86fc0ef68f393f32926a5997f04393296a5815606c4f2ae1e086a225349383c7b7da155471c6625f2681ca66ec21fec301994da689414f55ccb1692e4df0b3fce3ed68fb3f28001b500de5e8a015769d81749b9b62e9b72b3d6bf3e9ff1f1c39c756394dd61a70f98932076ed6460a3b5f2dee0fad6e693ed8b8e600a0dfc1434d724cd8f1ccedf1a0d216b12ea65e36df9c5695761f4ac76c7cbb1ced58682ce40543622cd4f48d5012e930010e8293a28a3d17c37ca57e57340f40f5d09e4119c91b5c360e07f9fac9ebd3e2bba4623fe585368ea350a0bb7dcc047f39d1b035ce67a52870b4fcb4377a2b9b4e21696cff2a3cf93e698e6d6691b224c49c77c00b21cc4cff9baf99560c6807c7ea0b7885b529cca17004b20f2cfecc75d65436b1fd807c1a59dd4457e3c54b50fb93e27b8659ebde87edbe30befd54d30777f1065517f7fbdded4b5d9c7ac6a9543d4d54cf4b594c5a75329c18512dbe981ae0e458f9ca59eb4e6930659f6fcf11a67b053ad496477b5fc8a9d50bdc5c61c0836d7e8460e782c20560370c839455308d8d5c0d987764dafc6bc6e175ee8411603cf92a287e79af27610d00c252d8b318a5ea9bbc8090e5b6733be61577c75fc19cc23fb90768ccbb5bb30cfff283e016838d9368a5704004bc59f22265bf556f46873c8dcdcf67ab4608e9188fa34f415b066a3b59682b5d5e87e78fdbaadf614b88f93cd75cec1e50b6a2c82d9650c34338af8ee5343c0423aa2c719d2c77af9efa4cd06a4e7cf936dbf7fcd51b1d8cca22dd1497da08c4fa1dda6045f305e5063c4f97fc22bbb56fe49d63dc174d217dc8ac2779e0eb00fcc89e15ff64da395b4a5f84987feddf8b330895c0e70273f545c449f43bcbd40b559933f396c9819159ab9af9a7a1e0920fc12dda1f635ad01308c6b03d4f746f8f84fc3791381ef6899b369992b4e8e15366f6eb8b0685fcd75b14dfaab61b1b4b0c20df8c9f0a51f3c0b62d7a1917bde1122d1fb2278cb0ab6fad23454085a15b54ebc036d053625c7e5f569711121a6e8898809c9ff2c5dbfe5bd7943be46763f64280bb875584bd333f2fe7b93d468f89f5126e4c699f624c76e156b4212e91ab72676fb019df9f6fbd96df2f05eff68ce815ff6c5d35d589ef200b09fac53a5a31cd8651ebf36f4a4ec8948f403e25b92981ae5f050f43358d018b8f21472209620053d758434915acc3287a410d64cf65000bdc5fee851600f59d31fc0c8aff7e6c141eb47075c2dfa2d27f22b8d1a0ea2e87784507ea458a22e765d19e9063953552116ab0e70a03a49e89ac10ea552d5074df8ced41e2e8900ec450013380258e066beaddf6a2b5ff2d13e680babbdb318607a444258907318c42c2edc9be6e8fe035940b350c5730e64ba0bcaddfe940f1c35eaf70f4f5c430937cd9fbe4771d92fddbebf0037cd587bc9df16826481a34d32d40207ab4cf159d2c792da400bd7130e92bdf1c53dead110fd53a909ef5488633a67308142ed6e3eb5fe119f2a86b6eb3e5716257bf88b75002af53ead41dc8acf25eaba4b7f4f2eec825b494d36110ab8e097f0de9eeaae0d8e9eb36f851171b91f2d8fbe0ff2c9dec3ad66d9278bb7b5a3a56814f729767d80486d59989a1e8d74d8a59b9ab9679409231e6dd336c7f81578141acdd9cd5b63bf33fac82738f335c0f84e38f9f8575afff55922bae3ad64cc67b687dee508409c8410d91796130", @ANYBLOB="f1ca021f3b1aedaf72fb0798feefbf83aed36cd5d1aff7998ef23a06a813fbbc947f5abb3040aa167a780fb9e74ba68e88791975d040f2d0022317fab34705e3278ba3d8e9fe8805d4b93e252000d7a72ee82d5b0e8b5ac4b3e4fee0959b8c3f991f32b36b292651d4c59be88f25d35eac3fe9fe5ae77a9a8f475d348ee3cd39ebfa6c1eb3f8f1d4a55c734d6a259ddb8c7031387d521b"], 0x10c0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000002c0)={r2, @in={{0x2, 0x4e24, @rand_addr=0x4000000}}}, 0x84) [ 1655.545154] ISOFS: Unable to identify CD-ROM format. 13:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000046020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:49 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1600, 0x0) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) [ 1655.604705] isofs_fill_super: bread failed, dev=loop3, iso_blknum=36, block=72 13:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000bd070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:49 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xfffffb) pwrite64(r0, &(0x7f00000009c0)="22cd6aa35e36ed1c077d60f7205400f0a680180c122a93cf3d7aff354514f7961d6f67ae750bf2fb763f49f5f17f49efd55c19b2bc120af6a8e69622d5aad9b31670bd19b8b9440071ee0720287152a70ee161c0490cff326b969369040f6d22babd422506ef44b569f60cf8a3886dcc26eaeeca969c8079bc3b9828d80a61adb23324e5b6a7f9eebb056fdf2686333d829e7fbed38b8a173ff5baa3890189b7bf86f9563a209e83247017cfc45cdcdf5dc69d57991516b25b4cea81ea8f46e0b33d1e2a6ae65737a80d332352bf093b781c3afb8cc2c39d2502250d6932224f4aa837fb562d87ce94c508c897900e47ef2940c6149ddac1931a7ca9a5d1e75ae30c63d9a1728f7c17795361add9064d2745558a829cc1b06e70647bddf791bf344ccc84cff3448078ae997aa054fad44258e4eb815e392e0e3e3874b24ba8eb6163d8e215080ebc344d9ff5f77cffd623946d700da64f44b90fede3d83b4be6908269c8c38b7efe57fd98e45011d892c9cd2ae25b1c58a2f477f1cf190f17c32341bfe6c399cf5a57fbaa992ba00d773ce2db5b90363a47b753d0d791cac71d315b53c7e187efbc9be0794cdb65eaf78fa37c177c4ac22e1f98e4c9d14d2b1cdefce97c30ca1f6e8debfd3a9d9b917e423593168887fd7888acea76606349bcd6a802fb2a6ab70ca696ec08c1eb90df9d4e8e6bcd7af85472fbbbc7ac5aead5f8e0449fc3dd6ee6ef0f01c216f31a652bf43e8637e8c24015c5925cec32f6e9a9b7c1183860537414c5ed5613e65c91fbc1fd5fdd0bcc24532761247c04dd168ec9117428c92ba91b74087153b995dd297743f983645ec9345c332ce25c9c21a48e37cba7fbc257c21a060e38d82cf266a98f7cf3565abb785733ddf948a7f601307ba0ed4d18cfe13e6de24e63ffec203cf37cf8cd907840ed1e7f44045423e7fafb9415d537ab35be74f949e472d5fe931b9cd4e1b95a522f4a7e5c4887a4b5d2c88206c1002c242c9187523f195207cdc78019b143dbaa2613d644ff4944b2671a49bd8175b87df88c10fd94a0cb5b5666d686b581f602613975094ba2506596a4c98b6bfd1dc48acb8024883a479c9538deb5d990ca32d991eb515dd4cda24a1ea86c8e1f6a4d49e8e51bf56d6f06e4b34edbfbfe78763ad256883635a73a33bd548d64d960e95ceff9b58b4ccc40ce8f2612028abec4971ead423a1379e98d50e46c12e0754388bee106e8aac367f919b96868ab31c82795e405c998613e322d5e7038d7d36a12d1d432f31dea4fe61bfcfe277c260d19b31f2df64e6050f81f08840689c4c5e0e316fc43db77b7556b093a641af1bb23a24d3495ca0258685bde2852e01158eb149b8f35da5172e0b5239f5f63f4a416fbab9669033d93c6b38b19e80b9bd754c03e76527686268dc2aa80f8c82d0c4ed01ddbc4b1d226ae1d485d75711dd77bae15daf34232f3e2ae21134e9a1cb5a9549ccd4fa41844861268a9d4481db530132e87e2db17023660a62f6a07a71738bf494864b2441709dfdeb89207a50e624294411815d3f6c99e8ace85b94b5ca4249b53a06144ad846e530481e879cdc55a34a15d9f3f6d271388cd2e53f53ad6e4aa13fdd2547b2812511abbdcc0f6b57da8cb625b93233c920b6a3c5c2bfacb364ed90f0aabb3615b43c52ad1979a158b06d8c3d378d894f2a26ce2d0be21f90cc57398658006ef211204fdbcdc0bc131da25618731ace7e44e35820d58698bc80de4372cdc81ee80a371b72e453311f94a0e955623798642ab59aa614c89f6d40443ca765e812222d87fb8a3feec814719024d9ab065414bf22917d0c44d21f90a5d6298f805bc65b4e3137abe484630a6dce7a2abe50c062b1aecb0f244c806582ed1278e7e1d7f1e28a42284a0a349bcdde9300d9a7de066943a89090648d74cdfe4697b6a9b922af6cba37dd6282448248de8fddae563242c944b1b535fb0ab91752a42898ccf8016ec98a03f23bbff9f816cd9382e76ed4d183453fac90b05de010a96c7e0901f6f439d4687e9c5ecd925dc4a7a43886d4650e8952fb9c3ce40ec3dbc0528785eb44d581446e0da13ae1d5bcc7a20a98a7ab02e8403a1a637a4bec2c564d94655860c55786b3a60fa0101227cc39deb7ecbeddd3c5fe63027415df6a61c988ec7b2e26f262c6d0cd0481f422eb3ec2b5c3c99a95e218ece7caecd4ff318c02073440a2928af61bc894038b30bd8bae0041347081ed544f2c60fdf243572999720132588874705077daaa4574d1c41c70016f0d12fd370c124818fbc56bbb8c53ddc05586085b45db24022165d5e18bca57890e759262ac5f198c9a62c83ec4e0cf875b2004c668d388e6d8c2d78ea32ffea1d94afd9fe6c046451c584e3180d2f8055bd42b53c5d4c1ef4d4005f656b5ea5288ffaeaab85188c3b6a8acfe9968dee2fcab65b89ee642be02baae418b1468c074393ea2a8aed108171d6f58d71c34656702439804a729a0051e502f7e4b092e3385044a188390a0badd6de1ee1b1a99d857852eaec09ea14d6ce3a0f3bfba983a1912039337f69ad9f481dd4fe3059f976b5205269f4dd35fffbdafd0f55f6526392b4786ea0c16c1434f9585e51bb428c3b30ce8e005c66029dbbb544f0ca7471127d1b094b472002d9703e1947b9baeebdb01a89c3711c3f219807aaef55accaa5817ebfba14d81a1b19c3cca0b8f34f30a057d0a1d93a758b398a1768f9a868f7c953bebc09b5fb0b4af8085aa30ca2345322bb4aee945f6001c37ea169095fc48b8d893c3187703e9bf18f622948a666220ff4a9a57439446f320dc3213a4b1d150b3480d95622b537b398c73225a882b6a62a2a6e7d5aaa056c7bbedc7aaa6bee45862973a49618c6921654f43029bf39098e625fe7552719668c28019232b43115b92df527d1dcf6b36def480197e771fb4ce19cc47a1a69c65e78e1887d7956c78a0eb2a0fb63d5205295624ccacecd14736fa2e3e9d8d2e4d7293f997fec2160f5cf5e520d1f364a7cf7d33a9b9e7f89ec516a8a4eb6c59c9b56e16219104c7f963791c10f58e2b87aeff97ed47a063e0800f3c8e4f3d6f9c7e0e7c1122574921de080fd70e725d1aa2b8d8130affcd1d069606103174c12f91f4b753c75a414473dd9aaea1b19c6005aa7c269e479e83fc95e47e4ce56589608f211a1cd90e7018c724ca1bc31bd3e0538d33b9783a344c3ed66839aa069b282e5c7d4818023aa8e7b34013dc2129bfb149abd5fa74b91a41d47a4f67e31f1bb7c842a146bbe211a9dc9712411b0f37b57cc498e3e1f79e50d21d2b6f4a8f9faf78b948111fbe85d620e9b6fa7da8aa4cf51adb7faa039240f0486fd5abad1e4789a9c0f70554e7d7a4fbac7f6b39580c6c412d1d70e69e0e43520482e7145267a74cbbcd7b20855ff0ad36b8bc4ccf54f57173962b673746d90bdea55f10d71415d1188f274dec96c08fcdd4b344a832274fd42f302927a46839a2b9c69c175a0ff93adca051c1889633a73566659b2d93a33ed8f2ed8b95919cc8222c3b656067167ea6338a354a27963fd9223f84ffc424141246189dac7e7d8da47482637aea0cb05ea425f4d78e972cd92a9c4568f87fb27a43c6d9922db95030040b30504735f48ed3088c22b8e8540e70e931a0423ea4d245f68c78ed60ee0561e7415b5a3e95e9a739f533b2fd709698d6f2c1f9f0d4b273b2557dbbcb8a1dc2299671f79bc9bfc80c9acc8a61d4c90710ec615a25ad518feb8ad65d076d32e82db9713f97943e7903b5f08b61117fb9b618e28115b3db72493a51a79243c32ea3cae7dcdd16d00ecc4261468f3920ba88770bd0c2bde9d65e480ad56e0cfc1235d8a1ca1601ea3e9d2f1cc53a2d176196095af3c9e1337b75787a2d7190010f1bc3b14f24a806c2666697a6971ae3b9db3b0d5dbeb6d286b38961c866c3af75903e0110f67b6d3424109d737cffdabf174b3b9de50c7d6bbabc0af7c01bedf8bc810ccccfca03cec7947440df6aeca019b5ac76e57d8302dfae70a0f5cdc997e17862ca6f07b3525ecda1430933f9e9524ade9f03a6d02de368dbabfca78731c1054f3f4218e6ed2c9a18cddfa7ab4771dad02dcd964e78e24e7f36c9c9b7e812c8b4a3fb6c5933a185677d6f5878421fd33635c87b76361754881db6c06bff5965819bd926d39a082f6b3b6e9cc17bd8f0cff2b84cb0e3a10d32b9a664e4ddc8d000a591b9b34ebe35fcf671dd68357a4244e2e73372d0dcab626ec9bd043bb3fdb0a7bf875c5400c57927643a4c4dde70c922c2cad36e09ad3f93853c6a0480ef40de664dde20735a59e1963b86f42dd26540e515bb966bc888c72626c666d6714b34d8c1bcdf3d33523eaf05725393ea24b00b98ccf14a5d360109019728057a2cc2f59bb11d3819c606e0defff91ce13c86ee815dcbe00b3c2ec0adb87c4cdd24db4f525b0622cae772c8d5c213873a0dcef1cc5cbdc6bec7c21e0fabb687d22216124c6956f51507579ad83aa129c31ae358cda25fc02a72d85b74ca6f837b3d74dbb212a03b4b17858e5d6942e22b5f72708baa85ff85db36b57c5eeb025ae86bcc6814cd7e6d87948e7f6bf5ba2a2a2652f349aec994830463b4b595feeb71dc8725ac8686cd36c3803976ca44a67ec65b9af9959e627d1b7b2768f018b64d964992d9afa07ae3cedcb5e6e27b9cc0138c40143c788e3fc7ee825dbccccfac8b52df4458b5889db2f44d985c70316505160c4d2257b760d3dea0049e1745295968026b2357e1f3cd1bfcbb625302c7db79c82274a6a9e22cca804490372df223024bc581dc7d8ea91e9b6ccfc7887b19e7bcce05c23db2b78eb6ce8ea49406cd99058b24424b0fa73d0aafc57c24591793955f38f565b60d2564601c199c8d79fb0c20011d616d7c1c455e1caa520a411bbbdff60916e7042d059f2a48316aa18b6778c7200843aade60c3d0c5e278a5f21ad0f70beda4515e46578ece6ede1582bc36fb342111e25cebf6d57925113a47fd6bb3eb1eeaed83ec38d02fc63247fd3f24f1b4f99ddbb83c9341e0d8b8f5e2fa767aace3248a33c183bfb28c4251cd4f8ed2626584b19556c7c80f11b293bed5a0210427f7677008795c5a30d9249c72604de7c0eec50e2aedd30ed077ec243b6064d09775790986014c51a3e13e1957f895df008b8868417462629c7ed748cdd2315a5544b4dfe502433102cd43db948c0b49146c61bd010a6268c944026655f6d571784c08b8c422b54f98f74ea344a28752bb6c96dc156d8d0d56137c0b48c8000c49902e29c4c19af9df3d49a376b202c0f089bfd9ff29166456005c6de8153f85f7da61ba8a174bb2e8088af26b61c60c13354f3998e78151e95226e3350bf715b6f96d57174b8a40a6a9ecec5aada70ef294694afd2f2afb8f48b2d397c51477903053581727a59cc944756df7c7f4e83487a309afb73de9dca2954516ee4876f569f8765aecb6a370ee39c95b5c36ee3afb77a0f6c2bdf2c8f724bf8617fea054dc59fc771af6895c76b18efddb10dfb456522ef0688ce911b76d7e3d8461240ec86a1ab60e41320f17c1b69d1687b9e81838f268318274a617d35028b6e3b2a9e84b01b1af11b79222ac04c1895eb765456805743675c817746116c5b9492144e8372720a594aaff8925b7c0daa48d9af2bec99684992364e91506617c743083a81866a88dcdaa6b239961f91c678a85af176c6a5f93600c0f9c1041a4673bc2105aa399b5011ddf534d3303362958832305b2b53", 0x1000, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x13e) 13:57:49 executing program 0: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200000800000000) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200000001110000000000000a000000ae0c000004000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 13:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cd020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 13:57:49 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x6000000}]}, 0x58) 13:57:49 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 13:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000031020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 13:57:49 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/122) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:49 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'erspan0\x00', 0x0}) bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10) 13:57:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cd050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) 13:57:49 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x4000000}]}, 0x58) 13:57:49 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc000000, 0x0) 13:57:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000f040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x800000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="ccfaeaa4e9790915a1f2bd25e4c0ee61", 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8, 0x200880) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r2, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x58) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="8b9d4e247092731250d03f972feceecf", 0x10) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) [ 1656.286000] ISOFS: Unable to identify CD-ROM format. 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f2020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1600}]}, 0x58) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) [ 1656.393850] ISOFS: Unable to identify CD-ROM format. 13:57:50 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x13000000, 0x0) 13:57:50 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400, 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e1040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 13:57:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454cb09e1a66648f7d79cfc91bc20d1f8346000000000000000000000000020000000011000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="ec8e3d", 0x3}, {&(0x7f0000000140)="9aa33f28d9a49b7f6f0626fb1bbb2dcfdbb798eafc0950a46f3f", 0x1a}, {&(0x7f0000000180)="7f95b8c3117c93b515f9c0ba1c39a4be51bd8f4e98d81e585a96ad6c3634ac0f378284db2acf64dfb27571097e55a05648ea1d6e4d27ec2ca2b809fc2412ac9fb5ddf40628fff9b158ca12dd0c2cdfb4490a06ea519f2d257cbe980f1c67eb3b8e28e8ce70db8035a00ad1a7197bfe9d1d4ec794788380fe66803df483732c61c17b01c6deba876be0595e3a9d0c160f4b2f5e95c4ad7fe6e247186d03f5e55bb665f5a3a30cccb90e0e8e604b88ff1350fb28f916bdd01bda9c4d25726e50ec030d5b40bc5fae89da54", 0xca}, {&(0x7f0000000280)="95e1f0c732749ee2749105de87f94a424555969949876d839ceab80c9baa9fda2acffca0fc71186566a70e4ba6280f4e59ea74347033e6f54a46c95100f1a91268867a1a0df1e0f8aebb4458716719db3b327bb4dff39afab87f6d65955fb0fa3029471ddb08b991dfdc986b1fb445beb9d9192ad1132744a548754bcf32548477756a8b96f8da543174", 0x8a}], 0x4, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f7070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x900, 0x0, 0x0, 0x0) [ 1656.654838] ISOFS: Unable to identify CD-ROM format. 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000005010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x100000000000000}]}, 0x58) 13:57:50 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000140)) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}, 0x58) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x2, @time={0x0, 0x1c9c380}, 0x8, {0x50000000000000, 0x1f}, 0x5, 0x2, 0x3}) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d1030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1656.827510] ISOFS: Unable to identify CD-ROM format. 13:57:50 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, 0x0) 13:57:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x200000000003, 0x200000) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xf0e, 0x0, 0x0, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001c070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 13:57:50 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x500000000000000}]}, 0x58) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000029020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:50 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3, @mcast1, 0xfd6}, {0xa, 0x4e20, 0x3, @local, 0xf1443ba}, r2, 0x4}}, 0x48) 13:57:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)={0x20000018}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x2800000000, 0x2, 0x100000001, 0x8, 0x4, 0xd6, 0x6, 0x1, 0x7}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000100)="6e5ac777d7076590eb51431726b7a91b9571fdb4d978d583629c896ec9513776abf9bab88134ea8eba6cb9d59547faaccabf2ea151c6ef3f716e7e41f50043590956e8e78a7e881bbf9d53afd49ceb25890eade56a74a93dbc643a8bd59c47e22465d9372d4de151ba4059c523a68ad727331e2e5d2eaa5a453d8dbcf48b0374550e09e13b8b489c3abeca0bfc89027af69ccad51121ce403b4b8fef74", 0x9d) setsockopt$inet_int(r1, 0x0, 0x18, 0x0, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000074000000000200000000110000000000003800000000001b000000000000002000000000000000000000000000000045e2bf860000000000000000000000be7ca1c52e54988d7169ed63f899e24480157525b8767ea095aacb2674644772b3303f293e31f8ef298b4f7ee65a43be5ee7149fba7b420450fc957ef3803e4bb2332f45a3bb336f9c4a47f0834ad7b3557d35f650fffd5d0ad959f3f402ec84d1ea520637ac55efb3cdd2561e80e3eccd555e00afd330a7d9"], 0x58) 13:57:50 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2300, 0x0) 13:57:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 13:57:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000064020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfb020000, 0x0, 0x0, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006f020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1100000000000000}]}, 0x58) 13:57:51 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x13, 0x0) 13:57:51 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000000180)) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 13:57:51 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x188, r2, 0x20, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb883}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}]}, 0x188}, 0x1, 0x0, 0x0, 0x4}, 0x11) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x2}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6}]}, 0x58) poll(&(0x7f0000000340)=[{r0}], 0x1, 0x2) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000092040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1657.457448] ISOFS: Unable to identify CD-ROM format. 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a4070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1000000}]}, 0x58) 13:57:51 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 1657.598705] ISOFS: Unable to identify CD-ROM format. 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, 0x0, 0x0, 0x0) 13:57:51 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffeb, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003a000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 13:57:51 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x9, 0x402) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f00000000c0)=0x101) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000000)=0x100000001) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x14000000}]}, 0x58) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000054070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 13:57:51 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 13:57:51 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x401) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:51 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000068050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 13:57:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x110000}]}, 0x58) 13:57:51 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 13:57:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000082050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 13:57:52 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/173) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c460000000000000000000007000200000000110000000000003800000000000000000000856be8bffbc000e800000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ef010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1}) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 13:57:52 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x16, 0x0) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ad000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1f000000}]}, 0x58) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 13:57:52 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x58) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0xfff, 0x10}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r2, 0x71b}, &(0x7f0000000280)=0x8) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000002c0), 0x10) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b9010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1658.559382] ISOFS: Unable to identify CD-ROM format. 13:57:52 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x400}, [{}]}, 0x58) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, 0x0) [ 1658.690852] ISOFS: Unable to identify CD-ROM format. 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f7000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1f00}]}, 0x58) 13:57:52 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) 13:57:52 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000140)=""/220) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000002000000001100000000000038fad7cac3ef44000000000d0000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000c7bb13f7"], 0x58) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000090020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 3: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x100) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020000000011000000000000380000000000000000000000000000000000000000000000000000000000000000000000ff7f00000000000013ae3756e2a8cca5606adec75acc2ad12bd5a7a1a5cd6a2cfff819cc51d55b3c0eb544738677fe7aa74944fa9ba1f92e42d14d16d5cba4cbdef60f19c45f819c952ef2ac0ee775de6bb6674e2170081d771d2ada2d1841caa8caa2e80fc3e9160d4225c002000082bb02dc6eb88c24a9d2195a9632d384b46cd24b9544b72d84d697e67bc8ac"], 0x58) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000097030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) [ 1658.942362] ISOFS: Unable to identify CD-ROM format. 13:57:52 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1500}]}, 0x58) 13:57:52 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000060040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1659.073106] ISOFS: Unable to identify CD-ROM format. 13:57:52 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x400000) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x6, 0x8000) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:52 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1500000000000000, 0x0) 13:57:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c5020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0) 13:57:53 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1600000000000000}]}, 0x58) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d4020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0)={0xb01}, 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0xfe, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8, 0x1) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:53 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x7f) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6020, 0x1) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x6, 0x7b777f7b, 0x2, @discrete={0x1, 0x7}}) 13:57:53 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x11000000, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d5060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0) 13:57:53 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x15000000}]}, 0x58) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003a040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x44) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ppoll(&(0x7f0000000280)=[{r0, 0xa}], 0x1, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000300)={0x7}, 0x8) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x4, {0xa, 0x4e22, 0x0, @mcast2, 0x9c}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x2, {0xa, 0x4e20, 0x400, @loopback, 0xfa}, r3}}, 0x38) [ 1659.652230] ISOFS: Unable to identify CD-ROM format. 13:57:53 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000180)=""/246) ioctl$sock_ifreq(r0, 0x89bb, &(0x7f0000000140)={'bpq0\x00', @ifru_settings={0x1, 0x9, @cisco=&(0x7f0000000100)={0x101}}}) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c0000020000000011000000000000380000000000e2ffffffffffffff20000000000000000000480000000000000000000000000000000000000000000000000000000000000000000000356db1"], 0x58) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'batadv0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="3d000000ca00000003000000070000000001000003000000400000000700000004000000241a67aaabeb916a8b40fe925e8b33a872b711db89fc3d556aabc4942a345082657489b04638c4871c852c7dbf6638073baeee6c7db7f462415c234e995e7638579790f2afa10314b0be68b260d7d9c5ff76c6144ec1e0776336ffc5468d9fb7957524e78ce3dcb831987fa9ef"]}) ioctl$sock_proto_private(r0, 0x89e0, &(0x7f0000000380)="713078f5795832b4ad54f74b22fe046b13e551b5ba249bda0703712aec7924dc0d4ceb2e4caeb51555b80e543289c10d7b58bc693582eff2f69fa5e69804aff65cb2d527186a7e6f5322dc447de59cc5ff258a6b87548d4c6a5ae2840d27f2b2018273ca64be83a6a98b3c4c9e53da2e220f1b1160d2d010bd34b71d855ffcda7a72e19d7240bfe1be") 13:57:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001d020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x3f000000}]}, 0x58) [ 1659.802211] ISOFS: Unable to identify CD-ROM format. 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000af060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 13:57:53 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000007d040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) 13:57:53 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x7) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{0x800, 0x717f, 0x6, 0x3}, 'syz0\x00', 0x6}) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="f87947a7f4c861febf75b87008512807f31b1a6a7eec2b641664f6fb989e8efc8af248fcc048b1e5ac72a5316ec606558a0b49af53c9", 0x36, 0xfffffffffffffffb) 13:57:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000065000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:53 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1400}]}, 0x58) 13:57:54 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000090000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)=ANY=[@ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYBLOB="b2b852e3cac44ba55815c2d77038940a1ac6888fa1632c69cbf7aaf27c068d667dda152bec998a9599296d5e33f6bd92b5e831b6da9e72aca9ce5fbc6caa6593fd41726dd710bb6a9b9194bcab76fc5a7ea50d242161f7069038cde99fb80164245d1e07f915c7f8f8687efa669e83f30fe4efc159b85d6051b357e3f1a73cf2c990c66f2316b65ab25d3e7d98074090083409997f64806b675826bbd93cb13e", @ANYRESOCT=r0, @ANYBLOB="ea64623ecc1009619dbae735082f7d8786bbbe711f98c9cb1c41d3768429ef290d00fb47b0dd9fe5483644fb187a6c9eafb562677993358c73053fa4be75e2b39b848430179fd3592655929424e24dffa7a52ff745", @ANYRES64=r1, @ANYRESDEC=r1, @ANYRES16=r1, @ANYRES16=r0], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES16=r1, @ANYPTR64, @ANYBLOB="5f5c36e0e7fff13e91b72f57879a3f99fc66f2364cd75291da7053be1a0e1e313f87ca81295047c88384e28ba9bb6c93fb72203ce5702530464549972da8840e68839d5689d10f126d5b6908c86ef5bce413eb333cb9e6d44753ad96e12598ce284b4c2c94989d34"]]], 0x8) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000300)=0x2, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000002c0)={0x6, 0x11a54e28, 0x3, 0xffffffffffffff2a, 0x20, 0x61, 0x6}, 0xc) 13:57:54 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200000000110000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c39d6767fcd8c91d86e5c22d4ab1de1cac693847f6088a741dc79d6d636d8c131c3fa9f09f97cec4ab37d3da0c6254f792647427c7f74504fd8bc862f41ce01804e2162306aa2e12c697e000578575d4974659fff713728e85b79d8b51bab4913420b5bd53e2d1427f3c7df3611746aa976783a075bf004abf5cb5d8e70570f06c37d3fcd"], 0x58) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000025000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000027020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x600}]}, 0x58) 13:57:54 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000007a060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020000000011000000000000380000000000000000000000000020000000000000000000040000000000000000000000000000000000000000000000000000000000000a802a87c91e82c61571825258aa06542a99c190f0f65351dc99dd000000000000000000000000"], 0x58) 13:57:54 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000000) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1201}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r2, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x0) 13:57:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, 0x0) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000071020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1100}]}, 0x58) [ 1660.801914] ISOFS: Unable to identify CD-ROM format. 13:57:54 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) sysinfo(&(0x7f00000000c0)=""/201) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fc040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) 13:57:54 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2002) request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='syz', 0x0) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) write$sndseq(r0, &(0x7f0000000000)=[{0xfffffffffffffffa, 0x7, 0xfff, 0x1000, @time, {0x8}, {0x4, 0x100000001}, @note={0x8001, 0x20, 0x6, 0x1, 0x52}}], 0x30) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$invalidate(0x15, r2) r3 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r3, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) [ 1660.961646] ISOFS: Unable to identify CD-ROM format. 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000003000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:54 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 13:57:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x11000000000000}]}, 0x58) 13:57:54 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x40000000000404) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c46000000000000008100000000020000000011000000000000380000000000000000000000000020000000d57397f93ed8ccc74e80fdb4b2e08d00000000000000000000000000000000000000000000000000000227cb07444602000000000000000000"], 0x58) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7ff, 0x2, 0xff, 0xb, 0x81, 0x3ff}, &(0x7f00000000c0)=0x20) 13:57:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000091050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) 13:57:55 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x9, 0x4) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c46000000000000000011ffac00000000020000000011000000000020000000000000000000c53c00000000000000000000000000000000000000000000000000000000000000000000"], 0x58) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) [ 1661.255779] ISOFS: Unable to identify CD-ROM format. 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fe020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1661.361267] ISOFS: Unable to identify CD-ROM format. 13:57:55 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1f00000000000000}]}, 0x58) 13:57:55 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x6, 0xc, 0x7}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000009040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:55 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x18, 0x0) 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e7060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:55 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 13:57:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c7060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1661.672107] ISOFS: Unable to identify CD-ROM format. 13:57:55 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1400000000000000}]}, 0x58) 13:57:55 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$P9_RLERROR(r0, &(0x7f0000000100)={0x18, 0x7, 0x2, {0xf, '@GPLuseruser]\'}'}}, 0x18) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='md5sum#\x00', 0x8, 0x2) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x7) 13:57:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) [ 1661.842068] ISOFS: Unable to identify CD-ROM format. 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b7000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:55 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000280)={0x3, 0x4, 0x1, 0x55, 0x8, [{0x10000, 0x7fffffff, 0x1}, {0x8, 0x10001, 0x8, 0x0, 0x0, 0x2}, {0x5, 0x2, 0x80000001, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x8, 0x0, 0x0, 0x2000}, {0x3, 0x8000, 0x2, 0x0, 0x0, 0x8}, {0xff, 0x7, 0x4a1, 0x0, 0x0, 0x200}, {0x2, 0x10000, 0x6, 0x0, 0x0, 0x400}, {0x7fffffff, 0x1, 0x12000000000, 0x0, 0x0, 0x2}]}) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020000000011000000000000380000000000000000000000000020002000000000000000000006000000000000000000000000000000000000000000000000000000000000000000c84163e20269fcf751e6f496743790edcca6b43f5fba2aa711c1b2f2f3c9ab22e6ca3260a62bc9ce1a570fce7f002a3298dab2f31e7a420a3be4a01e2a558ff5bf30b076a67f3e98c4d9e0402ec761d9d7f1f4a120b600b54b8f9e2b2ca101d6a9bfccf70c062da99841b42e5d0469b729ebef090000003d59f5ce8fdcf381e7fe5207131167690f70b5267fd75fbbccab3624e9b2ae7a47"], 0x58) setsockopt$inet6_buf(r0, 0x29, 0xb0ab08cb43f45290, &(0x7f00000000c0)="4199489ecc817f5dc481c7983f219ed54b582501cf72af22387bacea88b4d4b556cc7a9e8b1e5d810702c18cc8e3ba9b51b708b53facb8ec8b068240f92deff3b229c63e5d84fe64126e4249d721cdf0dcfde1dd1a4f0d2f914a6c998a0163db9d696c563329241d693deb4f5d775664891ea9f56c7bee0e21ac82fd2100e6bb7b8a1dce0da3c8a1bbb8e67047361f0b43a1ba4d18f74d9feadbb9abd2eb10cb1e5d7e48d66c2072ac663aad3d7f3509e72d5c626c4bdd2f107ba632b91c82d645f5e6096727ed857e2ee13bf52d77612b15e6e3a53352bc", 0xd8) r2 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={r2, r3, r4}, 0xc) 13:57:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd4030000, 0x0) 13:57:55 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xb00000000000000, 0x0) 13:57:55 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000300)={@ipx={0x4, 0xfd60, 0x8, "0fde43064bae", 0x2}, {&(0x7f0000000200)=""/218, 0xda}, &(0x7f0000000000), 0xc}, 0xa0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000000c0)) 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e0000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:55 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1500000000000000}]}, 0x58) 13:57:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000db030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) 13:57:56 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000002000000001100000000000038000000000000000000000000002000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000060f4492eec5b1b772bc122007df2664f0dacbef8647631f2590b0a36561463842d4619fa5a6f2f04632bb4"], 0x58) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0x100000001, 0x4) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000045030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x12000000}]}, 0x58) 13:57:56 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, 0x0) 13:57:56 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c2040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0) [ 1662.463915] ISOFS: Unable to identify CD-ROM format. 13:57:56 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x8000000000402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006e040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x1200}]}, 0x58) [ 1662.598955] ISOFS: Unable to identify CD-ROM format. 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, 0x0) 13:57:56 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000140)={[], 0x1, 0xfffffffffffffffe, 0x2, 0x0, 0x2f, 0x0, 0x1000, [], 0x100000000}) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c6070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0xa}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 13:57:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x5000000}]}, 0x58) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ad030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:56 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) r1 = semget(0x0, 0x0, 0x2) semop(r1, &(0x7f0000000000), 0x0) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd403, 0x0) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fa050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1662.971354] ISOFS: Unable to identify CD-ROM format. 13:57:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1f00}]}, 0x58) 13:57:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e7000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1663.120214] ISOFS: Unable to identify CD-ROM format. 13:57:57 executing program 1: listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000040)=""/27, 0x1b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) waitid(0x2, r0, &(0x7f0000000180), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000280), 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0xfff, 0x0) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth0\x00', 0x7fffffff}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000340)={0x0, 'bridge_slave_1\x00', 0x2}, 0x18) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000240)={0x31}) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x1000000, 0x4) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f00000006c0)={0x8, 0x5, {0x57, 0x101, 0x1ff, {0xfffffffffffffff0, 0x9}, {0x2}, @period={0x5f, 0x100000001, 0xb4, 0x0, 0x2, {0x9, 0x200, 0x7, 0x7ff}, 0x6, &(0x7f0000000680)=[0x7fffffff, 0x3f, 0x3, 0x7, 0x101, 0xfff]}}, {0x56, 0x7ff, 0x1f, {0xec1c, 0x81}, {0x9}, @ramp={0x2, 0x5, {0x791b, 0x200, 0x2, 0x1}}}}) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000740)) fstat(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000640)=[r3, r4, r5, r6]) 13:57:57 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}]}, 0x58) 13:57:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, 0x0) 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009c000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1663.521672] ISOFS: Unable to identify CD-ROM format. 13:57:57 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x4}, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0xfffffffffffffd47, 0xfa00, {&(0x7f00000000c0)}}, 0x2) close(r0) 13:57:57 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1200}]}, 0x58) 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004d060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 13:57:57 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f00000000c0)={0x10000, 0x4, [0xbd]}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)=0x0) sendmsg$netlink(r0, &(0x7f0000000a40)={&(0x7f00000002c0)=@kern={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000009c0)=[{&(0x7f00000003c0)={0x50c, 0x15, 0x104, 0x70bd2d, 0x25dfdbff, "", [@typed={0x8, 0xd, @ipv4=@loopback}, @nested={0xa8, 0x6, [@generic="a6d4bf2b7b8fbcab07c34c00fc637c30183f62a7aee00892e45557c71444f380fd7cc302bc4b9ff3970123255003e1951fa79a66729b51275677783580dca9edd4343e5ea4601a3942c1da7c3410f84f39778084a9b895ee3821b3a63c1220dea29425a881a8851e9f56563001597d3163ccc24d3a493ce7462b5412a37e87ce26bb4e498d89b37caab4bc8734ca36f22f", @generic="ee37370781cb06bd07", @typed={0x8, 0x2c, @uid=r2}]}, @nested={0x364, 0x32, [@generic="569e47a59c82ad52a5db5e5fdb82ef5da818b15aea72fa87d8c83cefaa8cd2325968c0fb8e2709fe9e1cc8984d155064eb926806a14064b3d5b2dc6322a7aa19085c66a76ac6b5c542ab5db3c617662d6fde0c981655cfe1f9ea49161ef4031bfde5a7257fee45bb115c893293315d5e663578c924959024f1feb9ebc16675c975f0ebfbbc78e3f464e4942c9acecf8f749bd3eab9d31f6f9f52ee8f", @typed={0x10, 0x42, @str='system-proc'}, @typed={0x8, 0x1, @pid=r3}, @typed={0x8, 0x7a, @ipv4=@remote}, @typed={0x8, 0x3b, @ipv4=@remote}, @typed={0x18, 0x12, @str='em1+vmnet1-vmnet0)\x00'}, @generic="c92df33f9de4af4f5a8803fb44ba77bf93ca936f3389b627daf93929173e102926eb9b34b3d687771ad6516b358250d891744cba9865dece88e2d1d542d8507056995acfcda67b3f8cf8a96cfab7c4acfcec7d4eaa044734066adbd712e8b47681bda8350afd86869700ee85a7e0a78b4ce4b4b20d847c8e936c242ab4db0fa6049a08c91acfa51c700132909ffbe0be7bb30584e737c8fed240476059b747b4a1a6f81e168265908e934bea", @generic="97cbe15e3569ba8729b5a448766e39fa954fbc312851a4c746f3b609d49e8e8e3ae1b1f4a7bd3c4ba5f14ad5c6e254cc05c8b0012fccce3668d3486fc1e45332baa0c07d4c94029616819e793987529571b404b6eb1e6dedd8e14146a513781b4d021f5ef4991b16131b1cd53d4481a2beeae8dd36eebb58dce22842c7b2cbbbbbdde373d0fee9c8b68f22df40a36c89d2a397315353508ab677", @generic="3c78e2883b6ba5af0c89b63de159a73497102db4a499431c9650a1c9e2590fb73571c43765de65c1e664e7f8801fd8b6c1978a345e7f3d1c720913a398920a40f24c2824f769859b312170e58123d6e56d021e876894bb61ea8ea28eb49782f3bd0c7d5e1acf16d72aaf98bb5f6f8c3534452d8e9be6df43dc8e39756e70b5a5ffa0cc2cf2ad2267a11ac95cd617a7088d8a4ff5afaa27e593b9f8c389e6afb95a0fee9bd557249c03b6880a8842e7c1b0735ac718d9c6bba3a578d7b6492caaa1384cf9dbc811673267e4e0dffa943540b659aa1c", @typed={0x68, 0x3e, @binary="d8e3f4d2da8999d80280825a62ed00ab7bc02aaba1bcf5687e17dbf3e6aa1ff09ce6dc00dae153a37e63899da6549b415bd2ea24acb52eab4394bcd910c5e454ebee0fcfc07f380877a54c787cc31c8327f5469beb23011219986ddb02cfd28a0d3812"}]}, @typed={0x4, 0x61}, @nested={0x78, 0x59, [@typed={0xc, 0x34, @u64=0x80000000}, @generic="6631c3a9f98f6f94db7282ff1bc30420d4b0362fbb4df53415dcd179734f98edc8581dcde2929b69800e47d1c6fb763d364736395d09a847036e49cba9b52e0f1c5bb7cb04d0460971a2c39042ce763b1f6946169dd32d16d04a0b26a9770e30752ace2d7bfe"]}, @typed={0x1c, 0x3e, @str='\\[(wlan1]keyringeth0)\x00'}, @generic, @nested={0x50, 0x74, [@generic="613a41fd80aef17584245878ee7c4db4de973ec1ec50627ee89b4054d4ed3726cc1323455eaacff42d9b22996d91cdbaa95c6ef632fd285ba406e435f3b00179ce97d1110261246b24ae12"]}]}, 0x50c}, {&(0x7f0000000900)={0x38, 0x2d, 0x101, 0x70bd26, 0x25dfdbff, "", [@generic="e1cae653b4b80279b608fba6020946a506a0aae8de8184eb85bca9b74e9304b6cb9f102ff8b06c0b"]}, 0x38}], 0x2, &(0x7f0000000a00)=[@rights={0x28, 0x1, 0x1, [r0, r0, r1, r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r0]}], 0x40, 0x20040015}, 0x4000000) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000100)) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000011020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1663.709291] ISOFS: Unable to identify CD-ROM format. 13:57:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 13:57:57 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20082, 0x0) 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003f030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 13:57:57 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200000000110000000000003800000000000000000000000000200092e7d99d5b40c06200000000000000000000000000000000000000000000000c000000000000000000000000"], 0x58) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x381, 0x0, 0x7, 0x4, 0x8001}) 13:57:57 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x16}]}, 0x58) 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006d040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1663.989748] ISOFS: Unable to identify CD-ROM format. 13:57:57 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000240)) 13:57:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) 13:57:57 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 13:57:57 executing program 3: syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10800) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) [ 1664.148107] ISOFS: Unable to identify CD-ROM format. 13:57:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000bb060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x11000000}]}, 0x58) 13:57:58 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x103000) 13:57:58 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f00000000c0)="6e3715e9edf647cf8a154af90a7a9dc66655586116c3b35ceab349108eeaa7812697a69603b608b128aa724e37b18b658bbc2fa7c52f84bfc385313beba18bcdeaf19a1c5860bf788ad9a13cc93bbab8da3186ee5ccd78821fc73aebd17329f09075a0d855c0a30be3ed058b47f93c6b9843cb7d4a6167e4fbd21a9f7699ef1ca164797a5121e7dff47b5e1e3e2d774cf6a5758443dd7d83cf399b24cd82828fbcbf15aad9b30fb48c9885f4cc06de6e56139312f007babe1e84ca8232") write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000002000000001100000000008a29c5a7bb2400380000000000080000000073e2ae7d0000cce3279c081bffad4f6c91d8bdacfb000000000100000000008d01001a00000000000000000000000000000000000000000000000000000000e76a0f712601a77f4bb2967fd62c35e4ff7e96d7a9c72b49af9350fc67f463823dc3c21c2630a663000000000000"], 0x58) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/189, 0xbd) 13:57:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) 13:57:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000180)={0x0, &(0x7f0000000040)=[0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x1, 0x1, 0x1}) 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000048020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000078030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1664.502070] ISOFS: Unable to identify CD-ROM format. 13:57:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x3f000000}]}, 0x58) 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f2030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0}, [{}]}, 0x58) 13:57:58 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x40000}]}, 0x58) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="fa000000d93573f9312abe4e5d6ffc62b06b603f93dd70a2c751ceffc0bedc53687450066b6ce87badd016c2b83dd36d2c31d0db731e44e288e07233f70de74309d6fe5949f68a500004ed96b45ceb301f181ab0aec5334b3d86635e401f04a900cee2c05b99061ca66ca6159d4c7859178db3ff010000000000000357cda609e8828a68d62a9c9235f4124e59ed07f4c9532e508fe37950440fdbed95d78f1d882b7dc2dd3f74ec80ac6b5e154016e2babb18c8ab134a9719911a621940c9b32410c6c051d11f4b5bc0b621e92bee0605e579474b1cc23daa899179a4f093c54c56f8729613969c74b5c2e93ad46fafc0079eb96ffaea8e1f92abf929be34d8f22ba404904c99e192d9630f1536fb65790738a083510d39d9c1b2a5ab8e98c5f7ef51"], &(0x7f0000000000)=0x102) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000200)={r2, 0x7}, 0x8) [ 1664.698281] ISOFS: Unable to identify CD-ROM format. 13:57:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, 0x0) 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e8020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$inet_tcp_int(r0, 0x6, 0x3a, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:57:58 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}]}, 0x58) 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ab000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, 0x0) 13:57:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x110000}]}, 0x58) [ 1664.980353] ISOFS: Unable to identify CD-ROM format. 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000043070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c7010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x23, 0x0) 13:57:58 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x10001}]}, 0x58) 13:57:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b3000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1665.148174] ISOFS: Unable to identify CD-ROM format. 13:57:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x18, 0x0, 0x0, 0x0, 0x0) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cb020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:59 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file1\x00', 0x100000000, 0x0, 0x0, 0xffffffffffeffffa, 0x0) 13:57:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x4000000}]}, 0x58) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ca000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffeb, 0x0) [ 1665.409010] ISOFS: Unable to identify CD-ROM format. 13:57:59 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockname$tipc(r0, &(0x7f0000000180)=@name, &(0x7f00000001c0)=0x10) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe718, 0x400000) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/96) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000140)) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000009060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:59 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x94, r1, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x2b}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) creat(&(0x7f0000000640)='./file0/file0\x00', 0xfffffffffffffffc) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000140)={0x274, r2, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x10c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7dcd}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffeffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf0f7}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7e9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1c0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffff814}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f1e}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6e61}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NODE={0x4c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}]}, 0x274}, 0x1, 0x0, 0x0, 0x20000000}, 0x8040) 13:57:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x16000000}]}, 0x58) 13:57:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xf, 0x0, 0x0, 0x0, 0x0) 13:57:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000046060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1665.711103] ISOFS: Unable to identify CD-ROM format. 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000076060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:59 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000049000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1665.870191] ISOFS: Unable to identify CD-ROM format. 13:57:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1500}]}, 0x58) 13:57:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) [ 1665.990979] ISOFS: Unable to identify CD-ROM format. 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000087050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:57:59 executing program 0: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) 13:57:59 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000, 0x0, 0x0, 0x4, 0x0) 13:57:59 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000010000000000000500000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0004000000000000509de54100000000000000000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000050000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000040000000000000000000000000000000000000000000000"]) 13:57:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001b050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1666.213318] ISOFS: Unable to identify CD-ROM format. 13:58:00 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1100}]}, 0x58) 13:58:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 13:58:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009e070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:00 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x5) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38, 0x0, 0x0, 0x3}}, 0x38) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x101000, 0x2) write$binfmt_elf32(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x198) [ 1666.428008] ISOFS: Unable to identify CD-ROM format. 13:58:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000bf050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a4040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 13:58:00 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1f000000}]}, 0x58) 13:58:00 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1100000000000000}]}, 0x58) [ 1666.654155] ISOFS: Unable to identify CD-ROM format. 13:58:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000140)={0x3, 0xe1, 0x2, 0x0, 0x0, [], [], [], 0xff, 0x5}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x400, 0x0) 13:58:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fa040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, 0x0) 13:58:00 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x80000, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000001c0)={'nr0\x00', {0x2, 0x4e20, @broadcast}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0x50, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x262, &(0x7f0000000200)='vmnet0(\x00', r3}, 0x30) fcntl$lock(r2, 0x5, &(0x7f0000000180)={0x3, 0x3, 0x5, 0x1, r4}) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f0000000340)=@sha1={0x1, "239515423dffc8417904fd8797cd251fc7f53cbe"}, 0x15, 0x3) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0xc, 0x5, 0x16, 0xf, 0x8, 0x8000, 0x3, 0x110, 0xffffffffffffffff}}) write$binfmt_elf32(r2, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) 13:58:00 executing program 0 (fault-call:4 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000026060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1666.887161] FAULT_INJECTION: forcing a failure. [ 1666.887161] name failslab, interval 1, probability 0, space 0, times 0 [ 1666.904890] CPU: 1 PID: 29638 Comm: syz-executor0 Not tainted 4.20.0+ #3 [ 1666.911759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1666.921132] Call Trace: [ 1666.923736] dump_stack+0x1db/0x2d0 [ 1666.927395] ? dump_stack_print_info.cold+0x20/0x20 [ 1666.932433] should_fail.cold+0xa/0x15 [ 1666.936340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1666.941460] ? ___might_sleep+0x1e7/0x310 [ 1666.945628] ? arch_local_save_flags+0x50/0x50 [ 1666.950218] __should_failslab+0x121/0x190 [ 1666.954466] should_failslab+0x9/0x14 [ 1666.958267] kmem_cache_alloc_trace+0x2d1/0x760 [ 1666.962933] ? __mutex_lock+0x622/0x1670 [ 1666.966989] ? find_held_lock+0x35/0x120 [ 1666.971045] ? lo_ioctl+0x25b/0x2190 [ 1666.974757] ? loop_get_status64+0x150/0x150 [ 1666.979177] __kthread_create_on_node+0x122/0x530 [ 1666.984014] ? kthread_parkme+0xb0/0xb0 [ 1666.988001] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1666.993290] ? rcu_read_unlock_special+0x380/0x380 [ 1666.998257] ? loop_get_status64+0x150/0x150 [ 1667.002659] kthread_create_on_node+0xbb/0xf0 [ 1667.007150] ? __kthread_create_on_node+0x530/0x530 [ 1667.012155] ? kthread_park+0x1b0/0x1b0 [ 1667.016143] ? lock_downgrade+0x910/0x910 [ 1667.020286] ? add_lock_to_list.isra.0+0x450/0x450 [ 1667.025212] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1667.030749] lo_ioctl+0xc80/0x2190 [ 1667.034303] ? lo_rw_aio+0x1e50/0x1e50 [ 1667.038190] ? __fget+0x472/0x710 [ 1667.041643] ? lo_rw_aio+0x1e50/0x1e50 [ 1667.045529] blkdev_ioctl+0x10e0/0x2120 [ 1667.049515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.055046] ? blkpg_ioctl+0xc10/0xc10 [ 1667.058932] ? lock_downgrade+0x910/0x910 [ 1667.063076] ? kasan_check_read+0x11/0x20 [ 1667.067246] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1667.072525] ? rcu_read_unlock_special+0x380/0x380 [ 1667.077468] ? __fget+0x499/0x710 [ 1667.080926] block_ioctl+0xee/0x130 [ 1667.084549] ? blkdev_fallocate+0x410/0x410 [ 1667.088872] do_vfs_ioctl+0x107b/0x17d0 [ 1667.092860] ? memset+0x32/0x40 [ 1667.096146] ? ioctl_preallocate+0x2f0/0x2f0 [ 1667.100558] ? smack_inode_setattr+0x290/0x290 [ 1667.105144] ? __fget_light+0x2db/0x420 [ 1667.109127] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1667.114660] ? fput+0x128/0x1a0 [ 1667.117938] ? do_syscall_64+0x8c/0x800 [ 1667.121913] ? do_syscall_64+0x8c/0x800 [ 1667.125891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1667.131430] ? security_file_ioctl+0x93/0xc0 [ 1667.135840] ksys_ioctl+0xab/0xd0 [ 1667.139293] __x64_sys_ioctl+0x73/0xb0 [ 1667.143180] do_syscall_64+0x1a3/0x800 [ 1667.147082] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1667.152023] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1667.157043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1667.161890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1667.167090] RIP: 0033:0x457ec9 13:58:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x12000000}]}, 0x58) [ 1667.170286] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1667.189183] RSP: 002b:00007f64c1904c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1667.196886] RAX: ffffffffffffffda RBX: 00007f64c1904c90 RCX: 0000000000457ec9 [ 1667.204150] RDX: 0000000000000003 RSI: 0000000000004c00 RDI: 0000000000000004 [ 1667.211408] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1667.218669] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64c19056d4 [ 1667.225929] R13: 00000000004c1187 R14: 00000000004d2b60 R15: 0000000000000005 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000028050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 0 (fault-call:4 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1667.297258] ISOFS: Unable to identify CD-ROM format. 13:58:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2300, 0x0) 13:58:01 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x58) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b9040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1667.463797] ISOFS: Unable to identify CD-ROM format. 13:58:01 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14, 0x80800) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/udmabuf\x00', 0x2) kcmp(r0, r1, 0x6, r2, r3) 13:58:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x6000000}]}, 0x58) 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000003060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xab00000000000000, 0x0) 13:58:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000da020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x102) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1100, 0x0, 0x38}, [{}]}, 0x58) [ 1667.729799] ISOFS: Unable to identify CD-ROM format. 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000082070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x600}]}, 0x58) [ 1667.884921] ISOFS: Unable to identify CD-ROM format. 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000041070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x3bc, 0x0, 0x844, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x8, 0x4, "a34de566fa5824d211ab7e6c9f6994f564fafa133bbce508c0d0d08a0c586873428b63ebc6b30afdd4f0ebc1732895692c045e90e9764545d37da54d80765f811790cb97eb17b9718fdcc1c1da8631b60a922ffc11f661e8c57b538b2f40c74059910f0574c0cece8451ac1b4fcb0b2dbe8daebe9684ca04af8b395af5ec6c7c625906fe6b439de22b101586e9a12eda7a6e6bf1bce1ed9d9a75bcd7b6cae0a58aeafea183d86b391e7bfadbddb7764735c1b4cc8e4e4f656031fca37adac0b04da7a1971c794d8844aff7794b666fbd43e8642e980cab737ffbcc6b966a8cb762b14e8e7d41c35ffb7f71acf226232ecd2ebe6250baaeecf1b4ca1069a1d8ac", 0x5e, 0x9, 0x2e, 0x7fff, 0x3, 0x80, 0x5}, r1}}, 0x128) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000280)) 13:58:01 executing program 0: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x7fff, 0x101080) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000240)={{0x8b3, 0x10001}, 'port0\x00', 0x80, 0x41, 0x2, 0x2, 0x76e28a6e, 0x6, 0x6, 0x0, 0x2, 0x7}) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x2, 0x4, 0x4, 0x1, {0xa, 0x4e21, 0xfe5, @local, 0x1}}}, 0x3a) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200, 0x0) mmap(&(0x7f0000ffa000/0x5000)=nil, 0x5000, 0x1, 0x100010, r0, 0x0) 13:58:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003e030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:01 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2000001100, 0x0, 0x38, 0x0, 0x0, 0x5}, [{0x4, 0xffffffffffffffff}], "", [[], []]}, 0xffffffffffffffbf) 13:58:01 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000400)={{0x6, @local, 0x4e24, 0x4, 'none\x00', 0x2a, 0x7f, 0x10}, {@empty, 0x4e20, 0x4, 0xffffffff, 0x1, 0x8000}}, 0x44) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x402, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) ioctl$SIOCNRDECOBS(r0, 0x89e2) r2 = dup3(r0, r0, 0xc7bde0694f3394fd) fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() fchownat(r2, &(0x7f0000000000)='./file0\x00', r3, r4, 0x1100) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r5, 0x610, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x183}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44080}, 0x40) 13:58:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000069050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x3f00}]}, 0x58) 13:58:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000026030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x2, 0x4) bind$rose(r0, &(0x7f00000000c0)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, 0x3, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @bcast]}, 0x40) write$binfmt_elf32(r1, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c4600000000000000000000000002000000001100000000000038000000000000000000000000002000000000000000000000000000f3ff00000000000000000081a94aee00000000000000a0000000000000000000"], 0x58) syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) ioctl$RTC_AIE_ON(r0, 0x7001) prctl$PR_SET_FPEXC(0xc, 0x1) 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c8070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1668.363054] ISOFS: Unable to identify CD-ROM format. 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000066000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:02 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x5}]}, 0x58) 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000020040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1668.563596] ISOFS: Unable to identify CD-ROM format. 13:58:02 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 13:58:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) 13:58:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000140)={0x3, 0xe1, 0x2, 0x0, 0x0, [], [], [], 0xff, 0x5}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x400, 0x0) 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009c060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000070050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:02 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x4}]}, 0x58) [ 1668.974164] ISOFS: Unable to identify CD-ROM format. 13:58:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000041020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3d4, 0x0) 13:58:03 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x2000) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000180), &(0x7f00000001c0)=0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x10000008}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(r0, 0xfde0000000000000, &(0x7f0000000000)="ba2c7d6114032446c21a7e90e651824d3d0a71680734c16f63929d") 13:58:03 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a5040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xffff, 0x20040) r1 = syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x8001, 0xa0000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x80000, 0x0) r3 = gettid() perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x6, 0x3ff, 0x7f, 0x4, 0x0, 0xbce, 0x12402, 0x4, 0x7, 0xfffffffffffff651, 0x77, 0x0, 0x8, 0x2, 0x80, 0x101, 0x2, 0x1, 0x292a, 0x1, 0x7f, 0x3000, 0x6, 0x8, 0x86, 0x10000, 0x1, 0x8001, 0x4, 0x5, 0x43, 0x20, 0xff, 0x7, 0xffffffff, 0xfffffffffffffc71, 0x0, 0x6, 0x1, @perf_config_ext={0x2, 0x6}, 0x24008, 0x10000, 0xef8, 0x5, 0x3, 0x8, 0xfffffffffffffffb}, r3, 0xd, r2, 0x2) renameat(r0, &(0x7f0000000280)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00') r4 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r4, 0x1, 0x39, 0x0, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000400)=""/4096) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80014008}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xb4, r6, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x20000000}, 0x4010) 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0f000000000000, 0x0) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a0000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1669.402627] ISOFS: Unable to identify CD-ROM format. 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x800, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080)=0x1, 0x4) close(r0) signalfd4(r0, &(0x7f00000001c0)={0x8000}, 0x8, 0x80800) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000180)={r2, 0x2}) 13:58:03 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x12}]}, 0x58) 13:58:03 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000140)='./file0\x00') r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/fscreate\x00', 0x2, 0x0) readahead(r0, 0x2, 0xfffffffffffffffa) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9df, 0x4001) 13:58:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000000)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1, 0x4) 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000019050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 13:58:03 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x101000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000000c0)={r1, 0x2}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240), 0x4) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000003c0)={@dev={0xfe, 0x80, [], 0xe}, @local, @ipv4={[], [], @local}, 0xe37, 0x9, 0x7, 0x400, 0x6, 0x2000000, r3}) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) [ 1669.740191] ISOFS: Unable to identify CD-ROM format. 13:58:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', '/dev/loop#\x00'}, &(0x7f0000000080)=""/67, 0x43) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004b010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:03 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x14}]}, 0x58) 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0xe2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000140)) close(r0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000000)={0x200000000000, 0x1020000000000, 0x2, 0x3ff, 0xffd4923dc3d069b4, 0x80000001}) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000035020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:03 executing program 1: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:lvm_control_t:s0\x00', 0x23, 0x3) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x100, 0x0, 0x0, 0x0, 0x0) 13:58:03 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x200000000000000}]}, 0x58) 13:58:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0x10000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000040)={0x3, 0x5, r1, 0x0, r2, 0x0, 0x6, 0x1000}) close(r0) 13:58:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cb070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2000, 0x0) setsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f0000000040)=0x4, 0x4) close(r0) [ 1670.140458] ISOFS: Unable to identify CD-ROM format. 13:58:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff, 0x0) 13:58:04 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0xa0000, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000280)={@loopback, 0x0}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000300)={@loopback, 0x56, r1}) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) close(0xffffffffffffffff) 13:58:04 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000040)={0x4d2, "84a1f1c9f13a2486fa507323b8a85da971cc2fdb9d9fdd96b7ce60fcf27b42c1", 0x4, 0x7, 0x80000000, 0x9, 0x2}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005e050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000040)={&(0x7f0000000000)=[0x5, 0x5, 0x1, 0xb7, 0x3b2], 0x5, 0x2, 0x1ff, 0x0, 0x2, 0x2, {0x24ee, 0x9, 0x7, 0x6, 0x6, 0x8, 0xd9f7, 0x4, 0x9, 0x100000000, 0x5, 0x5, 0x1, 0xf4, "8d50d8a98cdaa83546d2cc5acc3e7447106b8c3f88b120bfbe9b8bc1dd61dca6"}}) getrandom(&(0x7f0000000140)=""/153, 0x99, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x147102, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x8, 0x5, 0x9, 'queue1\x00', 0xff}) close(r0) 13:58:04 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x11000000000000}]}, 0x58) 13:58:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000400)={'filter\x00'}, &(0x7f0000000440)=0x24) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x4, &(0x7f0000000180)=[{&(0x7f0000000240)="43d7e0de3510b2833eed2a482bc1ce241e99a1c9ce1c36621e5e2e2c03830417a72cc00a49a2352e5f2c8040018283deeca8a89671a8dacd740b6f72ab74002deddbd18fdc828c2fbd54b82a8fd80ef440f39992eb6f97d7a35a9e9f912de898bf5e82d0e8b372064c99e7396398ba143cff5be59336f877efc9d3cfea9a463c40353124d7dfa19fc50966919cedf4a4a3a5fd22079acdb00e92a4242cd766421b3acf769ce1af8a38a7ef10fae353c3d43de0993846d513e16a3ac43010b331e0f3", 0xc2, 0x9}, {&(0x7f0000000080)="6eea99d31ebc", 0x6, 0x100}, {&(0x7f0000000340)="3472d7a1f6d9f5cccd5dc998a7d6feb82f610fa2a36c289c23963556b569d8e81ed4b4cc4ca38e4ac03097fcbaa846b248f3d24c8d78ba27dc6404359c029707b87040aea568031809f98006b89cc2bd841b80e781bc73e8966b3083b3dfa4319be8f70d801066b859e8e264bf792800faa0732853ab61854abf2bbe465e3899d62dc0a4b4e57211da32587a131d4954d1584871bcccdf54ac971d01d8b9", 0x9e, 0x5}, {&(0x7f00000000c0)="48d719d383f3b225e49ef65572c5cd17e964a218ed11d9cfd73f5a3431269f4508f49f4b13a6d56c048408235b0b449eab52bb77fd7126b26d6ce6bf5f39e86163b3461dd624f1d9122353b26fa3a38fce37553d3ad2274f340025d041", 0x5d, 0x6}], 0x94010, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x6, 0x0) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40700, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001e060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1670.487524] ISOFS: Unable to identify CD-ROM format. 13:58:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005c020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) clock_gettime(0x0, &(0x7f00000000c0)) setsockopt$sock_timeval(r1, 0x1, 0x12, &(0x7f0000000080)={0x0, 0x7530}, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) [ 1670.663242] ISOFS: Unable to identify CD-ROM format. 13:58:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) setsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000000)="fb9d5f9bd2442bf72273cf1e5eca7b781f1d7d7920deea2639176d1f07bdd76be5b0e1691c59a626ab144c8215d2c19eb80d0adebe00df57e03cabd8746da55c2b9d61cef8e176860076ec65820a91aa7cfc27964a8068b3ff844cf5c0", 0x5d) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:04 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x400000000000000}]}, 0x58) 13:58:04 executing program 1: execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440), &(0x7f0000000500)=[&(0x7f0000000200)='%vboxnet0self\'\x00', &(0x7f0000000240)='iso9660\x00', &(0x7f0000000280)=',*em0(\x06\xa4\x06p^\x87\x94', &(0x7f00000004c0)='u\x88\aV\x00', &(0x7f0000000300)='vboxnet0cgroup\x00', &(0x7f0000000340)='\'#\xa0\x00']) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000f050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) socketpair(0x5, 0x7, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000040)=0x200, &(0x7f0000000080)=0x4) 13:58:04 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(0x0, r0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x40) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x1d, 0x2, @thr={&(0x7f0000000080), &(0x7f0000000240)="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"}}, &(0x7f0000000100)) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f0000001240)) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000180)=@bpq0='bpq0\x00', 0x74c) syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x2) pwritev(r1, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/icmp6\x00') 13:58:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfb02, 0x0) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000002c040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0xfffffffffffffbff) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) [ 1670.973356] ISOFS: Unable to identify CD-ROM format. 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000067000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x14000000}]}, 0x58) 13:58:04 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000100)=[{r1}], 0x1, 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101000, 0x0) 13:58:04 executing program 1: getegid() r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) connect(r0, &(0x7f0000000200)=@x25={0x9, @null=' \x00'}, 0x80) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_int(r1, 0x0, 0x2e, &(0x7f0000000040), &(0x7f0000000080)=0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000140)) 13:58:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e6030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:04 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000080)=0x3) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000001c0)=0x2000000000000000, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x100, 0x0) 13:58:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7b00, 0x0) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000240)={0x5, 0x1fffffffffffffe, 0x9, 0xee, &(0x7f0000000000)=""/238, 0x19, &(0x7f0000000140)=""/25, 0x97, &(0x7f0000000180)=""/151}) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000036010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:05 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x400000000000) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x210008, 0x400000) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) readahead(r2, 0x8000, 0xf41) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:05 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x15}]}, 0x58) [ 1671.379573] ISOFS: Unable to identify CD-ROM format. 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000000)='\xfcwlan0\'system\x00', 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40080, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x0, @tick=0x2, 0x7f, {0x2, 0x7c1}, 0x100000001, 0x3, 0x7}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000140)={0x1000, 0x8000, 0xa, 0x0, 0x0, [{r0, 0x0, 0x40}, {r0}, {r0, 0x0, 0x800}, {r0, 0x0, 0xffffffffffffff6c}, {r0, 0x0, 0x7}, {r0, 0x0, 0x9}, {r0, 0x0, 0x5}, {r0, 0x0, 0x8}, {r0, 0x0, 0xfffffffffffffff7}, {r0, 0x0, 0x59c1}]}) close(r0) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005f000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) [ 1671.563569] QAT: Invalid ioctl 13:58:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:05 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x111002, 0x0) accept$unix(r0, &(0x7f0000000040), &(0x7f00000001c0)=0x6e) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e8030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1671.586356] QAT: Invalid ioctl 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x200100) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x44, r2, 0x8, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x8000) close(r0) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10000, 0x800) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000040)=0x4) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000280)={0x3, r3}) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000076070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x414081, 0x0) 13:58:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 13:58:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x2, 0x400000) socket$inet(0x2, 0x6, 0x6) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1671.746894] ISOFS: Unable to identify CD-ROM format. 13:58:05 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x2000000}]}, 0x58) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f0000000140)=""/214, 0xd6}) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000040)=0x1, 0x4) accept(r1, &(0x7f0000000240)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @initdev}}, &(0x7f00000002c0)=0x80) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005a000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x7, 0x60000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) r1 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3, 0x80000) r2 = getuid() r3 = getegid() write$FUSE_ENTRY(r1, &(0x7f0000000140)={0x90, 0x0, 0x6, {0x0, 0x3, 0xc19, 0x10000, 0x40, 0x3ff, {0x80, 0xbd, 0x1f147b19, 0x6, 0x101, 0x1, 0x9, 0x5, 0x3, 0x2, 0xa3c0, r2, r3, 0x75, 0x8001}}}, 0x90) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x500, 0x0) write$selinux_attr(r4, &(0x7f00000000c0)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000001, 0x98040) ioctl$BLKRRPART(r5, 0x125f, 0x0) [ 1671.928465] ISOFS: Unable to identify CD-ROM format. 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cc070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:05 executing program 1: unlink(&(0x7f0000000180)='./file0\x00') setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:restorecond_var_run_t:s0\x00', 0x2b, 0x3) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0xffff, 0x0, 0x0, 0x0, 0x0) 13:58:05 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x1000, 0x22040) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(r0, 0x0, 0x13092ea07518724e, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000000)={0x1, 0x1, 0x7fff, 0x4, 0x81}, 0xc) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)={{0x10b, 0x10000, 0x1000, 0x2a7, 0xaa, 0xfffffffffffffe01, 0x284, 0xffffffff7fffffff}, "0067010fe872734472b09d011a94b10321e1ed3b135d0e8c5ef73810e35b050ed6f46ac9ac3dc192542cb5ddf501c510942a558ba61e5674c076770f748f3c64ee9cc35a8cf506685165a2975b24afd051497129b2087c259b1ee0c92933edb5128f87c428a29895532ffe56f050acd678e638b2fa55289e23ca00210d4d80103b3d973f04f1bd3a42bf8c686a5da610473462a07a21f4c511de", [[], []]}, 0x2ba) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x48000, 0x0) connect$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x7, 0x4, 0x9, 0xfff, 0x806, 0x6000000}, 0xfe}, 0xa) 13:58:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) 13:58:05 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x15000000}]}, 0x58) 13:58:05 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) eventfd(0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000040050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) setsockopt$inet6_dccp_int(r0, 0x21, 0xf, &(0x7f0000000040)=0x7, 0x4) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x109000) semget$private(0x0, 0x3, 0x210) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x7, 0x4) [ 1672.266845] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000035030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x4000000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) [ 1672.395411] isofs_fill_super: bread failed, dev=loop1, iso_blknum=32, block=64 13:58:06 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1200000000000000}]}, 0x58) 13:58:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='map_files\x00') fchdir(r0) quotactl(0x2080000201, &(0x7f0000000200)='./file1\x00', 0x0, &(0x7f0000000080)="2dfd") syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x410, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}}, 0x4000084) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000040)='./file1\x00', 0x0, 0x18}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="a7f7eeda9d2c83", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x1c) ioctl$KDSKBLED(r1, 0x4b65, 0x4) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) sync_file_range(r0, 0xe3, 0x40, 0x3) close(r0) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001c050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0) 13:58:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000240)=""/213, &(0x7f0000000040)=0x1c) close(r0) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fb010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ec040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) syz_execute_func(&(0x7f0000000000)="c4e1f9ea987a8b0000c4a3d9790e0a663666460fdcffa015a462d55ac73230400fba3820c4e27935959ecb7573c4821d067706c4420d932c368f084896fd348fa8589f2e7e") close(r0) 13:58:06 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x3f00000000000000}]}, 0x58) 13:58:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff00, 0x0) 13:58:06 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) connect$packet(r1, &(0x7f0000000280)={0x11, 0xf5, r2, 0x1, 0x1, 0x6, @random="6d10afb15917"}, 0x14) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r1) pwritev(r0, 0x0, 0xffffffffffffffb4, 0x0) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d6050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x20000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) [ 1672.929916] ISOFS: Unable to identify CD-ROM format. 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009e010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000042070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r2}) write$smack_current(r0, &(0x7f00000000c0)='\x00', 0x1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1673.111907] ISOFS: Unable to identify CD-ROM format. 13:58:06 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x2) 13:58:06 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x11}]}, 0x58) 13:58:06 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x1, 0x4) close(r0) 13:58:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009b020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, 0x0) 13:58:07 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x80) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e23, 0x9, @empty, 0xe5}, r1}}, 0x38) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000400)={@local, r3}, 0x14) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r2) 13:58:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005c030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10) [ 1673.456324] ISOFS: Unable to identify CD-ROM format. 13:58:07 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x3}]}, 0x58) [ 1673.597440] ISOFS: Unable to identify CD-ROM format. 13:58:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000072060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f0000000140)="d1e3462fcd4bd68e0aae802a137c1703c3276ef97d11a88d3431d841b4113fd216a539b003f2c9639c", 0x29) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x0, 0xfff, 0x80000001, 0x8e}, 'syz0\x00', 0x2c}) 13:58:07 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x88, 0x10000) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x6c16ea64, 0x7, 0x3000}, 0x4) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000013050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x9, 0x200840) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000100)) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) ioctl$SIOCX25SFACILITIES(r1, 0x89e3, &(0x7f00000000c0)={0x39, 0x0, 0x6, 0x5, 0x6}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={@remote, 0x24, r3}) 13:58:07 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1600000000000000}]}, 0x58) 13:58:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000, 0x0) 13:58:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cf060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x94, 0x100) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1674.038660] ISOFS: Unable to identify CD-ROM format. 13:58:07 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x14176b49, 0x40000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x4, 0x0, 0x1ff, 0x3140000, 0x7}, 0x14) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000db010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x9fd, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000140)={0x263}, 0x4) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) sendmsg$can_raw(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=@canfd={{0x4, 0x5, 0x8, 0x8}, 0x3e, 0x2, 0x0, 0x0, "a7cf36f4db0408d004c9505b0b0c7ef946f548db9bc1de3194ba92272889b0755f86b1acb27dd4e91b1218a3d4c741382adf045496a288476a9b04fc81345086"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000050) write$P9_RREMOVE(r0, &(0x7f00000003c0)={0x7, 0x7b, 0x1}, 0x7) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f00000000c0)=0x1) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffff, 0x0, 0x0, 0x40000, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000400)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000300)={'broute\x00'}, &(0x7f0000000380)=0x78) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x0) 13:58:08 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x600000000000000}]}, 0x58) 13:58:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfb02000000000000, 0x0) 13:58:08 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000040)=0x6) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0xfff, 0x7, 0x2}) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000046040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0xa0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x45, "3aa81a0212d2b62ab52398c01514e27e8ce5f2606040071ebedfef06c747aea264e0238a11622e53c1e06cbfb3d48eddf52aac18acc6bfe7818393b3398f68fa02bb01f313"}, &(0x7f00000001c0)=0x4d) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x1, 0x10, 0x8, 0x0, 0x7, 0x8000, 0xff, 0xc5d, r1}, &(0x7f0000000240)=0x20) 13:58:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f0000000040)=0x4) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000046030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, 0x0) 13:58:08 executing program 0: r0 = getpid() r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) perf_event_open(0x0, r0, 0x100000, r1, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl(r2, 0xd98, &(0x7f0000000040)="1338711197cf22f750fc56302874bb6a50c2f40b45276e30ba1bb11136b32a610761620a22b9fbbb076a64db7f1e4356abe72734184b76b254900535242116a113861bb5bc2f424258c26c01267ddb4491ccd2f1fe27748c678c3487056240acf3e9504b5a2d77bc1ed02b20f4146e2ee017465fef224f01d48b7fd0d97e7004faadbf3733df0a202f867a1e509ca51575490eb8ce05c3041f7305281d37610c1d878c46d82a75d4ad1804852a4e9b23e3") getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000100)) 13:58:08 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1f00000000000000}]}, 0x58) [ 1674.604462] ISOFS: Unable to identify CD-ROM format. 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e5000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 3: socket$alg(0x26, 0x5, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x300, 0x0) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x100, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x11f) r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) r1 = dup(r0) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r2) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="657865632075736572757365725b25766d6e6574305af1367f424fa8f2e96d6e657430766d6e6574312b006d4eb1041fab9ed3ab4e508c2ec88fc7a597102b60b80a5ee2606b9eb4c46df38f7244f9a889808b2b4d36023ab8d24d79b9b60d919deab28448aa18b1ab5edc8461a53cd7b84d"], 0x23) sync() r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000080)={r4, 0x29}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000140)=""/138) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) close(r3) 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000008b000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0xffffffffffffffff, 0x1, 0x5, 0x0, 0x3}}) [ 1674.800146] ISOFS: Unable to identify CD-ROM format. 13:58:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) 13:58:08 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0xc, 0x6) finit_module(r0, &(0x7f0000000080)='\x00', 0x0) 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f2040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r0) r1 = socket$inet(0x2, 0x6, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x8000, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@empty, @multicast1}, &(0x7f0000000040)=0xc) mq_unlink(&(0x7f0000000080)='/dev/dri/card#\x00') getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x8) 13:58:08 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x3000000}]}, 0x58) 13:58:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000024010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x21) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x2}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r2, @in={{0x2, 0x4e21, @rand_addr=0x2}}, 0x1, 0x0, 0x7e02, 0x8, 0x44}, 0x98) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:08 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x2}]}, 0x58) 13:58:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x3, 0x401) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f0000000000)=""/185) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000dd030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 13:58:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001580)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000015c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000016c0)=0xe8) r4 = getgid() r5 = fcntl$getown(r0, 0x9) r6 = getuid() getresgid(&(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)=0x0) r8 = fcntl$dupfd(r0, 0x406, r0) r9 = getpgid(0x0) fstat(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001b40), &(0x7f0000001b80)=0x0, &(0x7f0000001bc0)) r12 = getpid() lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000001cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d00)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d40)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001e40)=0xe8) r17 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ec0)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000001e80)='/dev/dri/card#\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) getresgid(&(0x7f0000002040)=0x0, &(0x7f0000002080), &(0x7f00000020c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002100)={0x0}, &(0x7f0000002140)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002180)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000002280)=0xe8) stat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r24 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000002480)=0xe8) r26 = getegid() sendmmsg$unix(r1, &(0x7f0000002600)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001500)=[{&(0x7f0000000140)="e0aea5f64ed08c5b419a7c69a2bcaa0e62bd748277a01eaefa013b8602773b84e097564684f02e7ce9ef5a6fadc925ed0624e939fa19e63ad45fe2b7d2c6f0afc7ea284d7cffe2b04eb7c3d507c624d0b8b5e9141c7a675c789987aee31020e849e322a930cb8eb120535ebbd1fe63c4b85d856cafb067f3223cdc01f36de3f5ad8c0047b39d359acde7bf64c154f6083f5e038adb393f6fc7fa9d58790fa4e8ddd43f912281b17d9f6fee7ad5e00e6cd5afe68ad47c08f603ea987c94f5f6aac0cc25edc8feeb983aa6fb900ceff138aefa2ca594105201474be4b642afaed360cf5b423789176014", 0xe9}, {&(0x7f0000000240)="043cd6eb47dac543dd3814d00083b1ff3320198def031c6c402a2b1e2cc448fc084a94dce9c1e81620e38a1612958e81780450f37142f66fe3e84ae7a8c29904661a79ab8769f1257010169c7d573e0c73cd74c4c0b17339c529e176017af7f2e2337ffa0daa4a93eb30c4633b7a05fad8427ff61e327c9f21ad97510efce131c794bb7fc5cd45c8e60884dc29f96130668920c1c0763502d9a33fda381be565b41380226550a69024a534f38b3b3a", 0xaf}, {&(0x7f00000000c0)="5efbe6531781e5cc70beb116a39042b762e70fc2b08fae2e81e416a4e638a8d5023b6daf6339d7d52b8a3bab4546", 0x2e}, {&(0x7f0000000300)="c5cb97afd91250e5d0ab8173a0d7b8c424c14550482f78017a4d1ff5eb3734032b2689d2749b536a39f2a438a694acb51f5c3fc0087fc5992f5af22d8b268f7526e74dc3f45610f02b29709767c914ba0636f5880f3d073fefaf9a37d4a7cd022c4050f63f992a12bad2d0d853a37eb55f370a8dde74b50e94ac75201b560f9fc13d44b5d1b18a0770b39baf35cc6b1c5fa9b3a09864778b05fdb8e3a7b78251e1b392b4f4403f5c92534a83e4a903199c161b14cab914846dcc84680ff98c7626e6a9b0301cc0dd143a1b", 0xcb}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="110852845ee3b9eedc0cdf6a401144eae789bf5ffe25d5bc78dd804f2087d863c6b4e29e4958deb480d237466f5005d0e84de616f8c47fef7cee4328477309c8dc3fdf5fa4bf66d092c4eb7b527e637eeaf207fdff8f50f1fbbdd2b7f777d593abc4d14832fac8c06f60c691ec3633ca518245eb8cf5dfd53b407efc61f0d1531e739a4b58bca2233c719aeba11c1f5203a1aadb4c2abed0bc3a49e344027088b4ee671ff554dd41606b01369f4fbf6d924c49a573d0c1742a667d4772845e23a895811522418ef7a80b2705733bad112f9d473a2dd031329670", 0xda}], 0x6, &(0x7f0000002680)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0828310d8dfa813d491c30fcb30660c34dbad48d935d54b0cf7f886fca000000000000"], 0x50, 0x40001}, {&(0x7f0000001780)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001800)="4cc5e57f7da00ae6a36d6348cf6812f7b8a819f505de408d9078e1ab23388c290336f464a2c4b7b920bd235cd2ef8752caa878effe9f145fca9ff1ce819f8d2d3b20ee9d9fd82efb2e2434252ea9c411eb424ac243cb98dc292349f94abba0757ab2ea1514be35d0f58245dc08760d468a67c46c32a792c5b9ceb4200b2d02f90e7fc5c0ccf5e03dad8feb73b93042a7daca8350ddfd7269363ec611b908b6e46144b34c6a8f6657a950a801d0", 0xad}, {&(0x7f00000018c0)="dd1bb3d9a75428c75a1f658c9e00ee499b00f039d07d95a45e80919575e735aa05a511d4d35e56905fdf59de209492e5856e7b92664c8d965f3d119c4bd7459e0ba4d0eac1e93b390c0a2066b302b76cc69341c2e8b82c2ad150ddb95b9040418d6de3b42f7da447332535af24b89a9f82823dfa231248cca79def4115a44adbdf2c11066cf549159dd9abff68b15ac8640e925f78beff12849f5c6aab02eeadb41384b451827678530cd9b5f865f03361f012320f2ae291a1a813c6e88ee3e7e9837bc755f41ed9905b52d7a1f4f25fc4eee5ae5f39a59254", 0xd9}], 0x2, &(0x7f00000024c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r8, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r12, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="2000f700000000000100000002000000", @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r21, @ANYRES32=r22, @ANYRES32=r23, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r26, @ANYBLOB='\x00\x00\x00\x00'], 0x138, 0x4000094}], 0x2, 0x0) close(r0) [ 1675.281329] ISOFS: Unable to identify CD-ROM format. 13:58:09 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f00000000c0)={0x9e, &(0x7f0000000000)=""/158}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1675.468667] ISOFS: Unable to identify CD-ROM format. 13:58:09 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x15, 0xc05}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000280)={r1, 0x6, 0x2}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_cache\x00') setsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x3, 0xfff, 0x7fffffff, 0x1ff}, 0x8) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000002070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:09 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x82040, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1ff, 0x5, 0xfffffffffffffff7, 0x2, 0x50}, &(0x7f00000001c0)=0xffffffffffffff46) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x5) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r1, 0x2}, 0x8) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r2) r3 = dup2(r2, r2) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000200)=ANY=[@ANYBLOB="7f01000000000000c20400010000050200010000000000002c9330c9704edf770b0a68c9d904a06cf3045717d934c351d6c48051f2d81caec16a3f84fce673fd073653e7138991e54e1c2a834692125670e1edf0018f4d535674656272f28042b841440eb08426c198789191c29bf774bcfdaa993f9807419fbc4927e16313560907382f42947492b9fd61d923f3dff14e316643af36c064ab3454413ccfa23dd20c27f3baa695a60639e11aa5bd480d045ec069a1d2dd9f32bb123728db4cc976fa88a263b9c32752a59dae1c46e971698ca1f900861aa55d8c13692ee8fba81803c9d5b7d0c62a2929e8d1abdcb5f36be1aed40672c25d9429996d88f3798c59c6a069"], 0x18) 13:58:09 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1000000}]}, 0x58) 13:58:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x3, 0x40}) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf0e, 0x0) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000079040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:09 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x200000000000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) 13:58:09 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x680040, 0x25) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000001240)={0x0, 0x5}, &(0x7f0000001280)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000001600)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000001380)=0xaa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000080)="feb21d9c718479710a30056e0e9129aea30e1793d96762c4d366fec91b750c82cd9bb934f058212b961bc01251f2d26827f47e8c61059d9e476fc63e9ac15dc35dc2215592f51a0884e2e9ded3b8f041518dc57eb6868f82352d6fbc50d912b6514004b152d30230217d9b60818da9b36c4e9c1e4a864004e8ff2f9e", 0x7c, 0x100000000}], 0x2800000, &(0x7f0000000180)='/dev/loop#\x00') 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004b030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1675.759541] ISOFS: Unable to identify CD-ROM format. 13:58:09 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x404000) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000080)={0x3, 0x1, &(0x7f0000000040)=""/19, &(0x7f0000000140)=""/142, &(0x7f0000000200)=""/231}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006d060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1675.947767] ISOFS: Unable to identify CD-ROM format. 13:58:09 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x5) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x36, 0x20000) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000040)={0x2, 0x9d7c}) 13:58:09 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1f000000}]}, 0x58) 13:58:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 13:58:09 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x58, 0x180000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000039020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x1000040000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) fstatfs(r0, &(0x7f0000000000)=""/91) close(r0) 13:58:09 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f9030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:09 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x100008000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000440)=""/144, &(0x7f0000000300)=0x90) connect$rxrpc(r0, &(0x7f0000000380)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x24) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f00000000c0)={@ipv4={[], [], @empty}, 0x0}, &(0x7f0000000140)=0x14) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000200)={0x0, 0x1, 0x8, 0xf1}) bind$bt_hci(r0, &(0x7f0000000180)={0x1f, r1, 0x3}, 0xc) fsetxattr$security_capability(r0, &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0x6, 0x6}, {0x4, 0x3}]}, 0x14, 0x2) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000003c0)=ANY=[@ANYBLOB="800000000000000047000000000000000200000000000000", @ANYRES32=r0, @ANYBLOB="00000000ff0f00000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000001010000000000000000000000804d1481464424fc0000000000000000000039"]) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000340)=0x1000, 0x4) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r2) fcntl$getownex(r2, 0x10, &(0x7f00000001c0)) acct(&(0x7f00000002c0)='./file0\x00') r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000040)=0x8, 0x703ebf7e44e86ad) 13:58:10 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x24) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getrlimit(0xc, &(0x7f0000000040)) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000092030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) [ 1676.337032] ISOFS: Unable to identify CD-ROM format. [ 1676.582522] ISOFS: Unable to identify CD-ROM format. 13:58:10 executing program 1: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000001c0)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20001, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x16a2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) 13:58:10 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x300}]}, 0x58) 13:58:10 executing program 3: open(&(0x7f0000000180)='./bus\x00', 0x40, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = accept$inet(0xffffffffffffff9c, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001100), &(0x7f0000000500), &(0x7f0000000540)) getgroups(0x6, &(0x7f0000000580)=[0xee01, 0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00]) getgid() fcntl$getownex(r1, 0x10, &(0x7f0000000f00)) geteuid() setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x0, @empty, 0x4e24, 0x3, 'lc\x00', 0x29, 0x101, 0x1}, 0x2c) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffed7) epoll_create(0x1) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x9013, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) close(0xffffffffffffffff) 13:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000d000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:10 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000000)={0x1, 0x22b, 0x3}) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff000000, 0x0) 13:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1676.768107] audit: type=1804 audit(1546351090.521:54): pid=30377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3432/bus" dev="sda1" ino=16801 res=1 [ 1676.844409] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 1676.864509] audit: type=1804 audit(1546351090.531:55): pid=30377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3432/bus" dev="sda1" ino=16801 res=1 13:58:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 13:58:10 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x500000000000000}]}, 0x58) 13:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000022020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1676.978911] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 1676.988906] audit: type=1804 audit(1546351090.531:56): pid=30377 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3432/bus" dev="sda1" ino=16801 res=1 13:58:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x84800, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000000c0)={0x2, 0x1, [0x3, 0x0, 0x100000001, 0x8, 0x5, 0x2, 0x0, 0x826]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 13:58:10 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000240)=0xb2, 0x800) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xfffd, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000003c0)={{0x100020000000005, 0x6515619a, 0x4}, 'syz0\x00', 0x27}) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f00000001c0)=0x3, 0x4) getsockname(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, &(0x7f0000000140)=0x80) 13:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004e010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1677.298433] ISOFS: Unable to identify CD-ROM format. [ 1677.413016] audit: type=1804 audit(1546351091.171:57): pid=30415 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3432/bus" dev="sda1" ino=16801 res=1 [ 1677.475130] audit: type=1804 audit(1546351091.201:58): pid=30405 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3432/bus" dev="sda1" ino=16801 res=1 [ 1677.551874] ISOFS: Unable to identify CD-ROM format. 13:58:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0x1000, 0xf000, 0x1fffc000000, 0x9, 0x2}) close(r0) 13:58:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 13:58:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x801, 0x7fffffff) 13:58:11 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x402081, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'hwsim0\x00', 0x200}) 13:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000060030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:11 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1400000000000000}]}, 0x58) 13:58:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000039050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) [ 1677.930542] ISOFS: Unable to identify CD-ROM format. 13:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000047040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:11 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x100000000000000}]}, 0x58) 13:58:11 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) ioctl$VT_RELDISP(r0, 0x5605) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="3b96fbd5f3bb94a310f1e2298b7a7413e94f9d3382b17edf5ea5263c2d76d7ed2dfb5d12a7c8f04aaeebb0105b879d34301178b5f1eff96b7097091b973537b420f7de14eac4d8ce5fb51e62283c26c1a1f4fb6d2956491f31a23f3b7bed3d7ef89cc7cfe6fc0442914d8f9a6cf7446f5aeddac127c7d3268561ba8c487320ffc019b7d7be3cd1f713e109370edcc07bdd15ebd603849642e188574b8af8252ab9a3c02bfe311f8683976f04b5d928b548f7e9ac3f30a7a735b4a1f8f28515e1e56365bf", 0xc4}, {&(0x7f0000000180)="85b95a244574184697401fe4b1e1ea9725936037778293791c75734ebb37bec082b7fd4ddfae95e47d855b371f2c186252", 0x31}], 0x2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x7}, [{0x2, 0x6, r1}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x3, r5}], {0x10, 0x2}, {0x20, 0x4}}, 0x4c, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000040)={r6}) close(r0) 13:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000015000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) [ 1678.220042] ISOFS: Unable to identify CD-ROM format. 13:58:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) 13:58:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getsockname$netlink(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000180)) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a9030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x300000000000000}]}, 0x58) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000089010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 3: sendto$llc(0xffffffffffffffff, &(0x7f0000000040)="410a116a6d0fa8d8e61e8ffa2f6fe618a73a2f0434da543e324ae0714c321e20445412ac0ebd95ac5e28184f34e94b2e3ca7ad830ca6d63e913082776e26d63a75d72f9c51d047cbb131eb7553c4dd98227e4caa74593efd97cf181dc2237768ef1d7aef2ba243301eecbe9fee4d7e3e4e07d5ef786bea91560f492177", 0x7d, 0x4000, &(0x7f00000000c0)={0x1a, 0x30f, 0x6, 0x0, 0x1, 0x1f, @random="d0d92d4f5559"}, 0x10) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7b000000, 0x0) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000048000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x100000000404009) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x842ace1aaab76b52}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x8, r2}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1678.582206] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 13:58:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x59c1, 0x0, &(0x7f0000000180), 0x104010, &(0x7f00000001c0)={[{@balloc_noborder='block-allocator=noborder'}, {@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}, {@usrquota='usrquota'}, {@usrjquota='usrjquota'}, {@conv='conv'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vbi#\x00'}}]}) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000040)={0x4, 0x4944, [{0xa5, 0x0, 0x4}, {0x0, 0x0, 0x10000}, {0x4, 0x0, 0x7fffffff}, {0x7f, 0x0, 0x5}]}) 13:58:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2f010000, 0x0) [ 1678.736658] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 13:58:12 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='9p\x00', 0xa000, &(0x7f0000000140)={'trans=virtio,', {[{@cache_fscache='cache=fscache'}], [{@dont_hash='dont_hash'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'iso9660\x00'}}, {@fsname={'fsname', 0x3d, 'wlan0+@vmnet1^'}}]}}) 13:58:12 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1500000000000000}]}, 0x58) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d9010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000080)={0x3, 0x0, [{0xa, 0x2, 0xfffffffffffffffc, 0x2, 0x100000001}, {0x7, 0x9, 0x3, 0xe034, 0x3}, {0x8000001f, 0xf4e, 0x3, 0x18000000000, 0x5}]}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{0x2400000000, 0x6, 0x14000000000, 0x4}, 'syz1\x00', 0x37}) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000020060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x4, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x109040, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000040)=0x7) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cb010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:12 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000080)) socket$inet_sctp(0x2, 0x1, 0x84) 13:58:12 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, 0x0) 13:58:12 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1600}]}, 0x58) [ 1679.109811] ISOFS: Unable to identify CD-ROM format. [ 1679.113283] QAT: Invalid ioctl [ 1679.123288] QAT: Invalid ioctl [ 1679.136612] QAT: Invalid ioctl 13:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000052020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1679.159122] QAT: Invalid ioctl [ 1679.260911] ISOFS: Unable to identify CD-ROM format. 13:58:13 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x67cc, 0x2000) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x754bb192c79f1afc, 0x0, 0x1000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000340)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x3) utime(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)={0x81, 0x2}) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x1, {0x7, 0x4, "6518fee52a221e7ea2f7d7fdc1199afe6477a751ca49c4f28b7e6f2634b1cc16ac2aa4087e5083ae5b1051c5ae66792ed92a14cbb0d21ccde1dfc75ae7e323ab20e70044463c768b90120ce0c4aa185e284c04262208314ab7bc339407fcb10b639df8c66905841b8716804af5e831891f3a76f91c6741528c3b3f4ed0dfbe8441cfaa073ca8b07d8756e7c83118025ef3ff1b15201740ff4ab206cc3ebd4d2cb26722444cee73327749bf2faaf6f68a5cd448ce6253a6d237adc086144896f13509b8e08cba4c759689c6048cc6938a64a6385d43107c98f5c649ee6b3f82bdc6ea8250a634f5db501ab57d7a6969b330d20b26096ea58ebccf7ff709ab0a01", 0x3a, 0x4, 0xffff, 0xa00000, 0x35, 0x2e7, 0x0, 0x1}, r2}}, 0x128) 13:58:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) delete_module(&(0x7f0000000000)='/dev/dri/card#\x00', 0x200) close(r0) 13:58:13 executing program 0: getpgrp(0xffffffffffffffff) getpid() r0 = gettid() r1 = perf_event_open(0x0, r0, 0x1, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0xffffffffffffffd1, 0x1) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009a050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x12f, 0x0) 13:58:13 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x500}]}, 0x58) 13:58:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000003010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='highspeed\x00', 0xa) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x101}, r1}}, 0x38) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x200000) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, 0x0) 13:58:13 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x301600, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0xc519, 0x8, 0xfffffffffffff801, 0x4, 0xc0}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r2, @in={{0x2, 0x4e23, @local}}, 0x7, 0x20}, 0x90) close(r1) openat(r1, &(0x7f0000000000)='./file0\x00', 0x482000, 0x0) recvfrom$inet6(r0, &(0x7f00000001c0)=""/75, 0x4b, 0x2040, &(0x7f00000000c0)={0xa, 0x4e20, 0x2000000000000101, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x182}, 0xfffffffffffffff0) eventfd2(0x6, 0x801) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e1030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1679.656970] ISOFS: Unable to identify CD-ROM format. 13:58:13 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) 13:58:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x349, 0x0) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000de010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 3: r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x0) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000280)) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e22, @rand_addr=0x8}, 0x10) close(r1) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8000, 0x0) getpeername$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x1c) [ 1679.802892] ISOFS: Unable to identify CD-ROM format. 13:58:13 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x1400}]}, 0x58) 13:58:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7b, 0x0) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000005050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000040)=0x9, 0x4) close(r0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f00000000c0)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140)={0x1, 0x8, 0x4, 0x100, 0x4, 0x81, 0x20}, 0xc) 13:58:13 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x38) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000be050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004e030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:13 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x6}]}, 0x58) 13:58:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0xfffffffffffffffc, 0x6007c) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000000)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0xc1}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={r3, 0x5}, &(0x7f00000000c0)=0x8) close(r0) 13:58:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000069020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1680.235027] ISOFS: Unable to identify CD-ROM format. 13:58:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)=0x100000001) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b9070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1680.368833] ISOFS: Unable to identify CD-ROM format. 13:58:14 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9, 0x400) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000140)=""/231) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80000, 0x0) sendmsg$tipc(r1, &(0x7f0000001500)={&(0x7f0000000240)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x3}}, 0x10, &(0x7f0000001440)=[{&(0x7f0000000280)="d62253ff339ad08962988f411c7942d020729bd01640a0398c9827a9089a465a16b3b6dc4c90563f18d687d4f18635bd91014ceaf1b34ef1f9f2c406ccfa7485e9ff18cb7d0937b258adc9fb421bb6bb42ba59bb2473be7213b957b68f5553478f3c2e1cacd27c37d870213c561d855d5758f6ef076d644093261c81266c785a8b84259ecf1ddcc62446197e01be716324e56f99f5d8e8e2913a038d70acaa6fa5bd3b7bd0ce469eb7392c8d1b45dc4210194379ca19766307d4e0d4687b487f0ddf84a6e9bca69fcc200e0b5825a1fbaf3c2799a6ca26ae9aff54166409fcd0abea791153b387f2f998c2f499f85b1f5bb2afc240de221f9da12585692ce82b44a5a5dfa41e41753e56240cfdc8ae24b3e024554c5ddb35883db1d7881c767b262dc7a8359a8cac0172bfdd5b0485081d2d35cfac28cde9b159c80cae982f18dfc420390abb2a14e77566e7460fdd7313e2fa39e13f36eea4db1a3409ed53886faeb89b7733de381b1bca1afe28526dff0711172121a28ecc22e2374bdffdba94951f04367a15d3563fe1c430fdeffe457dd7190bd1a36dc23ea96ddad51e0811bf22e31422b02aaeb7b74c01f392cf40991d0ad1e49e85743dd3167e71a0832d9c83b817a1a7186402e4cc03cd1d9b1a8c742b89937aab66bee68d2eeb6ac9e60762547b4cb3b134a01919f9a396b7ad33bb2b42d153801f3c0101059d4b27362215a6f457f783cdfac0e19e3e43d2258eb91ab7e197bbb112018a28e42f5459177d359b6e3d8d130818f3d0cd01cd6ad3da42d2e383a8d601446e4a0f1fb6fa198392a125907933e7a840775e736a0a8e963253768adbab37a2b09e6117b39566e12dd4b2c99887331d36ad4cbd73fb0a7fcedc176d6ad043c5d2b445826821b6e45ea77760bb6554f6d3be809d8ebbe07f11b8846c0fc51a45adbfa583d9fd5d4855234283fb1a8c3aeb89909161c26a7b4757d295c3e4056d46a2553b210c6fb5c9dd4d1b77f5957a293304cff8dc248b8b257be13b3e80830b397c28a81f3f2b4448655a9ef1803ce74c9f4e8eae56a1572d642e45ec382e8ac6a3123c75e8ae8bfa886f0bba4bca1c46e1e05c40799ce0bf6bbaff58adcf285ce7bd50b2a934a2d75e8063dbc01e5ab0cae0df9181b12300c21cd88c671f7dfccd9dadb8e3e42df559d57c4198f5dd66a62f7b69aadcc371c3442e1b596c116d608ab80fb06d3b5195ebc931d044a0794c85cb94babb2e8bafe751d6380ba55324c8e4a1c3b3b46869c46edd902121d63a4da09657869087756011142e60a46ced987c52db1989cce29953842c018cbd9c1896bbf8972a955a3127d735c044d9dc19010f7a06f27a350bb0dfae1f6c6ff4c23a291e87d6ea7fdce799d8cdc50930be638dfb29c1063b4e387a2045b408297a6d25f7593716ebd31ddd9bed16bd6aa8604dd139b579dd8edcfca485307d587353d592f28070980de4488d61488ee6650ef8c331b38266831f013c7ad2f57982d8dd27d4bd365109e721c24e4c461a93c7e7f3d62c6fb3745179a580182092854ae0740f26fe49d9f4b94399fb7bb2cd659d7e51d11b68461229db3a0b50b132af46c9ca251ce8509ddc335a6c85a9a1dfe211ef579cc93dfb5aef2bdb7255f233b77b058598ec129a6f21ff6b31f6f048ba19e927b618ee93f9bc6fd703e058a30ae90e6c0057be448b26dda0eed550aefc9d266bdd5ff2b95af46c6e919750140c8e48e30ae89fdcf4a480d4b1f15de4f10d7c2e4e4a3a423c90ab8c46a6be79430c0de146734a1453c0ce04598b0278ca6e4d7c7a99e7eda9178776a74fcb6acbc91891880ea073e16aeb2785b87a7fc28b5bcfce8b10037ac3b7944d5ddf4132844f562e64a1c29f8548b44e1d21a118096b1c2390effb675ea99bec95a8411e884b03909ef96089a82f46bc33cefa338f0009ae6e549340835fe0dc5b0e0ede395f103cd6689ec0f80396f30d01e5587a6ba2849d4b2b5dfa8e0a36658832609435f01ab9a1c9627a6d27a81002ab169ba9fbde6e68533365ff6612607159f396dd5aebfb4609ec65cedd388d98675378245f01ec20f014cfc756ed73a0e468b8cbb21bc5b1c9f16599bf92597bf1d8bf42b14ccf567c6c15c6570efe91f33b779e04a3ae5c4e719c35187adf2311545c96dac4e0c6ce40554d8ba17221bd716198e2d6abc0be236a5c6053c050dbe4d2bb93c693bf802101d65a1b48f3a39d4962464faa73a9db4888c1c40bc06c3d5c4655917c9c1ce2e53a50ddc98a479871408208f6adcd965575670694f5f612583ec4e01f7af5050ed8ad9f2f87a48c250f70a2bc539d21a2cceec6426a07d210ede277c0f569db3acbf91075e5df0c2d38a1f48e846dedac47d424c92d6f2636c1a5a38e0a1b6fe3938eba2e5ae31f26c1a744b8622297cc607a18e0c50fd84467f8c3310d6fe426711e8e6b3dde301e9d41475289fd246f3b4cff8e5283f65810687b58c00bb91d410c15858c326ddd45db9e5e69c69e6c81f74dff474c0c259f551c9242550be07438f8d2822dfb63c99632822452f51df53b60f1201e5b98cd7642c9651bb28fd8edf7a3d45d692db5c67b666fb425a1d5874b792ce5b11a78b09189edaf3a87d4cf67838403794a3d8cc8dc90efdcb0ea94dce04255b5e5eeba1bf0e457e41ecc1cb6d2ffc1bf2be9c6d381935c5ff0365d6619ae4a30e8f5ddfcb2bfcd60d937194ba5839c8b21671b46198295ef23ee1a163117fde8784a5b32e48aeccc97473469cd0b4bf8713952439cef94c39f2a4fc189288d731f2f7016994ca3a5f6ad3dd627eea4493855a4ce2bd0cd68e8bd642c905096599cc022de937de7f7b27971b288c1b3172b482a221d2123862644ea1c1730a3cd16d9244907b29c2c9ed29457bf593ae2ea808a50629c2ebbdabdacc6903ad6a520c2cb8252723921bc74e2ae01d589d7264ae83bf39356814c4f6b467295ac1dabdf0195d2e2dcc9ebf9e486dd6c685d4f1e1c5fedd85e4c6f9f4eae8b95d9600f25016c8faad1442a3c8b06fe9db4b74ec8c566dcaf08c2417e20dc07ade3937abeaf5a9301b45e354a52a65abd4c93922f44886f5b9b16e99afc240b12c0f8d176f998e235657a2974cce3a179b06f29fa5352e0b1204241fe4dc85ec31ea336361a72be92f4a39b4dc97f492db5b3838fd22c69376d4571e4737f412ec0b4361acc64c395ac0833e1cdda116f5cc3923eb5b063016b933f869e3bdff7e8ead9d0ecb92c38910619b5ff1877fb4fc98fbe1ddcac2949698d18ea741ccf327f4ae243bc5ed281552df84b18036f6bf443610a1d0b5096a95c0973710184cbe1e78fc641fcfe4d73c35964f0d3a4028a62867d60fe9881484be247e4cd29798efca43aafa143e43fc0a8982131b9903d2aa5578491e19fef39659d7c271cf94c85c40a8fcbf861979b2e75c3b164161148413a15ca47265634bd96cbd3406e660c43c0ce761f9623ebb9027fa90f8b0b365e3ed529d2121564bd50ac26f72e965ee315433738963f0f5db41fc72082498cfd0a9b051bf2e5d9f8b3e22e935d9ea8608b84ec3798477c8a301903ddbae21c5161e5e65885cff74df8fff20f57d40eee70993a50cd02db73ef6b462aef59242b1489a9c1fb303168778840056e6ef9ffd4b7284fce4016caef1263c1186bd4eeb16f8c2c3a69139224dc689ac907b565409e9bf3474922cebbfc32b59cf72a12b1e3621f8474b8ad767c207772186386d084129bc51f1adf39073e080c640e87f59d4bd0ffbefd6d6f285b075fb1fff628aaf7cb025c631b149e52b0f41f976d00fe232279aee70675e8585e81c2f04ad60cf8a611124f184374383b9dbd8429a2aea7d56c05c339688d1583709a3137cbce7ffb163c52efc44e4adaae7c5f234af2f23ffad7bd2f3abcccabb3fd083c589d9cb979282f2b9f0e9f7a27f0cdede9fbe0884d82e179af3b2bc4d68c5815ea431b4bd3af44c3319a78a27f80ce6141504a5b920e01283c4e2f64ce26903e9dd21b9e64967dfae8c0b6f6b9f1fecc2c3def96953f258a4a304124764f85a052740539346d4be06c364bc55d5c466a16a49f078786cfc1099af31b9f75c816ccde1bf4269e29b8c6ed77704001d681637cad5c055238055356d67087574651435370cc252cb749857398c7fca2130a1434fa8e745f65d78c16231e92dcaf5daffcfd70963c074cf7488d5be9e4496eabd5a57aef5cf496fd119eb2ca9a62bfd844f28b142cae5b5b9946a6c09a4088bc5daf1fea50a1ef6beb6b432633416ab316ea54d6950533f2ec20e2bdfc3e435222e5c30fade5c6f6724e0ee033338ebc601b76ab383be3f9594bb7d00ceb97eb13152d61376c956f5891a739dd64e4a57888e09aa16cb648036eb1ae5b249ad9a2ee0e833d8f31dd1653139462528950197587dd12c955a44d0efb0692a1e68639cd8a092bbb43e05e46a39a6c4ab60350f46c0962fabf2c4fc5e375c3a1dc9f769f17255806a04007f3e6de3a01ab398ccb7b9c1c1d2817b718efdc5b45f7c1d07faa3638bfdc25ee0d62cfb10853a8af2742d7972d20d3bfcbc015bcee6141121c81e44eea7ec817bfff734d6a19f2be716b990a3b2e9d3b19ab16d822575d2314f14a119a1d83b7a1a557c0906832b328b27b4d6cb68ebe9c5f63bea14168d6386303be9c7b1c4b4aa2a4ad4615504bc9f6d65ec6293a2eaeeccc655cd63c6335877b6e72a3710eddbb520144b6666b0f2c69b32731e3b9323f239801afd698b783b858d0a67214af22afb6987c38765c6736b3682e3f7d907a04624f3c8530a1c209bf8b7991d011e5885fa88b2aa185a1394defeddd5901c52468cd8b064eac867b0a8b360e5bb4930a05023eafbb1403aea252ef60f6fdacd8dd062de9282261bac2a7675959db8e3e62fc986cc60ab41881192b1270b36abe151b1ff748b6aec8a75837bac7db6b36ddd3bb405c0643200d06b06c408700014acece959f1a77bdd2108f8573aca1025c2a65abcef03a1e015a20901c7e9d486acba49c2c419d12e025f8ccb1dc2e3b121b503e6546cea00b0a93c4a9a63387ee1bf1eaf5c5b853caf4c43ad9e178862e25341a2eef49b42ac9cd3cb8b49d5692890013158af97d0ba3931c4ffd59736402b4c5c1ed8e18bd8bc39293f76c1eedfaea9f1d3a6b151c795fa18e8b71ae37f00b9ca0a64dfb45a384d2dc87e1f174f7939f40cfe6d8a6e25e456e003aa3884d72038f2e4628e7c1d33a7d0d62ef2e9fdbe19dca98413dd43005b30a920e2a6757465eb0007384174cb56755e221df4883d23a5113dfd4c5fa8a58134dd608cb1f70ecb4c011c36785877faa502fd7ba7331df742b9b27ad47b75f26663b02f6075a601bb794dafa28469d6389fd4854eb362b792773ddde800e9d7e4e4e51be7454c46f19343f00f8b89872f1eb2a745c625be72a1d8b89d3ab83a81a80f2070eb05b615fc38ff991005484f750a88683582e20395b4e474d85de5e0c5ee6fbbcb43cc80647e9c13151b8af601715a66a8bfd25f04cb539a70edd369c1a64034a35681310cadc45b48e4f7a57d70b0d2d6fd12722bb6de81593af98dae2362b5dffae6d399affd7c61877ae24d2a437240bba12e69ff98e33e7e99fbc1987abd7513d05004ca96c13ad962e0ef45e67ec87e821b9c0fffea81cc64ddd41c96b732557db8b61cec1a2538b1e37b6a494d26d1c7230cb9cf976e13b13b4553116692f46e322ceee160d3eb50cfe44422fdf307dc1d6793b425381222ca1eb", 0x1000}, {&(0x7f0000001280)="b240df92a88c09f0f0c2083c636a70b6bc0b7238c08c77bbbf9303a8cfbfe6b4b9699e0738243bf5143384aa654fc09caecad31e31d31e7e05acf686547a0e325149693f3bb66ed769047ba6762a8b98e9f5d9dae66ce18ee32de7eb733366e4cfd1ccc5fb5749fd50b511bd8a3656ed40fb2167dabea0808e6fc70086fc40285c5e1bdb4c853b25cd474dee6c6c373e7289a8ea443e93f41615d12289d559fde5f8482ba42abc21c6df56beaa13714af48ba91a1cc5080da23908dd46e469038d", 0xc1}, {&(0x7f0000001380)="ff6383d085a4a83e52385d0bb4f43eb431432d061153c6c1c0041798", 0x1c}, {&(0x7f00000013c0)="9b178c6f33f3ee9e02e3f40cf807f9de2460a21f1cc149471a29ab99763ee07d355b9088f7bbd6044d81347db3fb0354bf666e8693490410df452f89e0a270cb84fb2712fe3b6ae333808a3317942d943a2ee56cf3553b9ac0ac5b571afcca8167f92c", 0x63}], 0x4, &(0x7f0000001480)="35f3cea866455dca70dc1d19367d74e852c9f7359ee05c580e0e1ae7659a26551fd316e78fc93fb7fcea50852bf481f9cf92af91450749a15be4f6d450a0d5126618a90d7f98577c97762a94d3c0032b54acd56828eb7b3b8fefd3066fe4adc575e8382f3fe4fa0a", 0x68, 0x4000000}, 0x44000) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x20) 13:58:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:14 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x11000000000000}]}, 0x58) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b2060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x3, 0x0, 0x10001, 0x7e8}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x1000, r1}) 13:58:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x50f, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009d070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:14 executing program 3: io_setup(0x40000000000e93, &(0x7f00000000c0)=0x0) r1 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000440)=@full={0xb, @remote, @default, 0x0, [@netrom, @netrom, @bcast, @default, @rose]}, &(0x7f0000000480)=0x18, 0x800000000040800) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x248200, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = eventfd2(0x3ff, 0x800) io_submit(r0, 0x2, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x798, r1, &(0x7f00000001c0)="0b3751ee1a649ca2a684f7ee56dc55cb397c578f9064349b33e4d702b2745ea8d08554eed5ad6ea4210885ece1358f7fd3a0a9a794b14fc45ad5f45c761cf313ae8ec0a8730fba8558deecb0d64753a0a51f18", 0x53, 0x100000000, 0x0, 0x2, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x3, r3, &(0x7f00000002c0)="e37cf6846ba4bf02c5d8a7ff9fdc9508f94bd1c50a7982ba2f72d4272566c10ddc40494d130fc3a1bbba2263a2b8fdb2b20869c7c23bdd014a2e6fb390b98b2454fe59c158a22715a47f18896139b52e070dff80d8603d5a6baf315d0979af2a93e66f0c9d63abf2b62fd1ad8147993032da55ba94e004816867daba115933afcab2a8929b8d5c5149f1f426c1f477a4d34f7818c12075a11182b5f3ab0b92f925d4dfecfe12f2547fc55473652cab2c4f5c", 0xb2, 0x8, 0x0, 0x3, r4}]) socket$packet(0x11, 0x2, 0x300) openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e20, @rand_addr=0x2000000000000}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffff7}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x101, @loopback, 0x7fffffff}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x68) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x40) close(r5) ioctl$ASHMEM_PURGE_ALL_CACHES(r6, 0x770a, 0x0) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001b000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1680.819549] ISOFS: Unable to identify CD-ROM format. 13:58:14 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1100000000000000}]}, 0x58) 13:58:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff00000000000000, 0x0) [ 1680.985018] ISOFS: Unable to identify CD-ROM format. 13:58:14 executing program 1: setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "e85411d9d5b451f18ae77816801d7e8b757d955c"}, 0x15, 0x2) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0xfff4, 0x0, 0x0, 0x0) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fc050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x6, &(0x7f0000000080)=[0x5, 0x3f, 0x1, 0xfffffffffffffeff, 0x5, 0x8], &(0x7f00000000c0)=[0x1, 0x5, 0x0], 0x52, 0x4, 0x80, &(0x7f0000000140)=[0xfffffffffffffffa, 0x6, 0x6, 0x8], &(0x7f0000000180)=[0xbc, 0x96, 0x7, 0x4]}) close(r0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000200)={0x6, 0x7fffffff, 0x785, 0x6, 0x14, 0x10001}) 13:58:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x23000000, 0x0) 13:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ba030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000001300)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000014c0)="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") getsockopt(r1, 0x10001, 0x4, &(0x7f00000015c0)=""/109, &(0x7f0000001640)=0x6d) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r2, &(0x7f0000001280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100001}, 0xc, &(0x7f0000001240)={&(0x7f0000000140)={0x10f8, 0x34, 0x304, 0x70bd2d, 0x25dfdbfd, {0x1}, [@typed={0xc, 0x3c, @str='keyring\x00'}, @nested={0x4, 0x18}, @generic="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", @nested={0xcc, 0x17, [@typed={0x8, 0x2c, @fd=r0}, @typed={0x8, 0x21, @pid=r3}, @generic="26538b8dc4088b3a8d8b3c", @typed={0xac, 0x5, @binary="019a61b41c9402c74b3f631e4254be8fb68e77f4a1510f3ed8b68bdfe6c6c8cae005dd31e8dc638f84a6db8f69c500aa290aefab85fd4eb7c49dc2b6d3dea09db6140a6b9cf1d1db10f622e7d7f5f132e311b0760e560b7854edd9b3c57fa45e4128d86b36df8c7b4ff98d4d822e4ab4f51f64537d61d05dac6128b031f1dd3f5eea93c14516c2cecb9068311341e3d09175dd5e89ff2e374b9886f4fbbfead078eab12f2ade"}]}, @typed={0x8, 0x71, @u32=0x7}]}, 0x10f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004000) 13:58:15 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x100000000000000}]}, 0x58) 13:58:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x3, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040)="d1aa0bc6e37f3c1efa41d10584f898fa6799", &(0x7f0000000240)=""/255}, 0x18) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a6010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) r2 = getegid() fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) r8 = getegid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f00000003c0)=[r1, r2, r3, r4, r5, r6, r7, r8, r9]) 13:58:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000740)='./file0\x00', 0x2) write$selinux_attr(r0, &(0x7f0000000780)='system_u:object_r:file_context_t:s0\x00', 0x24) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000140)="fc15a09620f49df33a4e1f396496f4625e7750632944f3aaa9613ade03db3b8797bea0fba33c807c88480a21edaf6918863c5c1969260a27407d24b63368eb5aebcf90cf9b91a2252e2afeef93fc9c4932debe350e8c7b3f2806a434e16f2df3d11cc08db71552564dcb99ba93b73fd1e1c0bcd32d996b3dc57fd1cbd6600012e15515765cb594521294b1e91b9e140fb6c7d0e4ec29db238110b905a77a9b9da3d470763297e20806241d17dc287c6d37f0909e76c50d465ece0bebf8acbb08e6610c721747fd205c4fe2006ebff50e1a9c9f272d51c78636745155cbfbd8c1eadf2717f1d7da5806bbcd9e20e2942550947c99a1b7", 0xf6}, {&(0x7f0000000240)="6747067e74f85c98498bc0f9bb2f222de529fccb9b72649260b0b8228f2891e2d951022d718ffb5c3d9cb0054860b4f4f07c638a9d52796815f4fb8c2b333c528c958c556b62651bda", 0x49}, {&(0x7f00000002c0)="f0ba532b515c6ae6bd488dcab6538bf6ad90de8f125d7e79c6143077c719ed1a7a80d17ac2c65090398a2abd5383b9b9b27b6fbf83be6763f9fd9c9b529cd9ec6317e0251748c90074415c6af063305dc14fbba83168c7d0ab6854c7b3b1216a171e5c1d50a26997ec81e43ffeb8664b8338b81b6c3dc6245cc1d3eace67ba324a861171b27ae0", 0x87}, {&(0x7f0000000380)="37437651df79872baae6d1381a2faea4f01803317f05ff1dc682b1e5750329a28bc986521e796b6e3874979ab5f232bb69daa28506811aceaadcc8f2bc8313d1b17dc6233fc90302ade2a47f8ef5f4bdc5d81562455fe2e646258d91db91fad0c40856686b7dbb1513a54c2cf5f422beb0d902532855c5d0f24506d2ac79fd0e6d3caa9089eb98cadabb6718e044e8b345a26b4d738094a0", 0x98}, {&(0x7f0000000440)="4bc2156d2872a8c72a42310e252933b4a1c92ccbc021e95e4e26f63a2f03b7c9a4ac17cd1183d9f86b0500f78b575d4ace7c31ebce2c2cfabffec200e67ee5a621fbc46cf59a3385e8c0ade5574662c18584d9c4e05200ff8c707b9dd98583b427d07e642da393a7a295539e874c90437d50415432798c59ecad940dd93d3f98bb54b944bd5bb8e9e81ea9e0229ed63cb78def9ec7465f3afd85b65c74745d91af77de6f9ff35a6a40fccc8e602c", 0xae}, {&(0x7f0000000500)="ea693f1bb7138a383b86c7245efdc4a5ed4eea02d861773c8f9627681cbb77e35dd669bbbaa42f6d594258131bce72ea4dd889470f45569bf5e07f851a598c0c50217159a7b7c86a89451abaf7c0e464e37bb74d46a552247002a92683a57eb17933a46984af4477308a92c2191aaf182b677e452836dd5ada52297681904d55f9177a322d5dd5bbf3f5bb4ab6a8bab4b43a7a7999e37f86b6ab53de769042249ac1d89d6c624c72033b2db7d109291116bd63ef", 0xb4}, {&(0x7f00000005c0)="b94523f60d9909411c8ac97b01c9f530808ef96b7eac64d80d7ec583b19d6aef894a6fe4c9816fa8608b002198850e690a5236c73c40ef79a54e7a7083064418a04808ee148fe09a57d4d39f428ac2c2257346539fd2dff3c9080b01765f2d6469b1c2b2720b3035dfd59bf2db1bdc93f7428fb3edebcda1ece68779f48541f74ee6c5b0", 0x84}], 0x7, &(0x7f0000000080)=[{0x40, 0x118, 0x96d, "62e24c498f64f222d76ddb08348c48c79c9c3f735ad8397d255b07988352e8f04b1037594273046971db"}], 0x40}, 0x20000040) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006d070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x8, 0x1) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000180)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getpeername(r0, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0xff, 0x6, 0x7}, 0xc) 13:58:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x100) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) 13:58:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, 0x0) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005b070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x5000000}]}, 0x58) 13:58:15 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x68001) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4e) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x5, 0x2, 0x4, 0x5000808, {0x0, 0x2710}, {0x4, 0x2, 0x2, 0x3, 0x9, 0x7, "4e3d7d90"}, 0x2, 0x0, @fd=r1, 0x4}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) close(r2) [ 1681.556935] ISOFS: Unable to identify CD-ROM format. 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ed050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) 13:58:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3b3, 0x0, 0x0, 0x0) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005d040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2f01, 0x0) 13:58:15 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 13:58:15 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000200)=""/182) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r1, 0x2, &(0x7f0000000080)=[0x9, 0x4], &(0x7f00000000c0)=[0x200], 0x10, 0x5, 0x5, &(0x7f0000000140)=[0x6, 0x0, 0x1, 0x1000000, 0xbd], &(0x7f0000000180)=[0x0, 0xd0e2, 0x3, 0x4, 0x4, 0x0, 0x1000]}) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r2) 13:58:15 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x200000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000180)=0x8) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000400), &(0x7f0000000440)=0xfffffffffffffdcc) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x10001, 0x5, 0x101, 0x1, 0x9, 0x2, 0x100000001, {0x0, @in6={{0xa, 0x4e24, 0x101, @local, 0x3}}, 0x5, 0x4581, 0xcf5c, 0x2, 0x5}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)={r2, 0x8, 0x7, [0x2, 0x1000, 0x9, 0x80000000, 0x47915944, 0x2, 0x0]}, 0x16) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000340)) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000240)=@add_del={0x2, &(0x7f00000001c0)='team0\x00'}) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000079070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x12}]}, 0x58) 13:58:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x6, 0x238) close(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000080)={0x8, 0x80, 0x1}) 13:58:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0f, 0x0) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ed010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:15 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x101000) perf_event_open(0x0, 0x0, 0x0, r0, 0x2) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1682.068328] ISOFS: Unable to identify CD-ROM format. 13:58:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x44) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f00000000c0)) 13:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000094040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) [ 1682.220865] ISOFS: Unable to identify CD-ROM format. 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000005f010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x4}]}, 0x58) 13:58:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40000) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff, 0x4, 0x10}, 0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlink(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)=""/242, 0xf2) getgroups(0x1, &(0x7f0000000240)=[0x0]) r6 = getegid() r7 = getgid() setgroups(0x6, &(0x7f0000000280)=[r0, r1, r4, r5, r6, r7]) 13:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffd1a, 0x0) 13:58:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b5070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 13:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x40) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x17, 0x6, &(0x7f0000000000)="3f3f3e5845e2"}) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x1, 0x5f, &(0x7f0000000140)="ff02b92f3ccdfe3dc5e87e1c447f9f152b8a99ac5f244f84d5a3973201f1b0e5a23d1c598ebd3853af5e3482feab8ded0d753408572a7cd773b18df54a9909f10fa4d7503e5a0c7c3f57b604c8ed4e9e9083d3d2a9e019da597a8859e4e97d"}) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'veth0\x00', 0x200}) 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000059050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x105101, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1e8, r2, 0xa, 0x2000000070bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_BEARER={0x94, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x2a}, 0x100000001}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'nr0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @empty, 0x200}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xea11, @loopback, 0x100000001}}}}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA={0x34, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf424}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:16 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x58) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7b00000000000000, 0x0) [ 1682.722203] ISOFS: Unable to identify CD-ROM format. 13:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000000)={0x6, 0xffffffff80000000, 0x3ff, {0x77359400}, 0x0, 0x9}) 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000072070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x2, 0x1) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:16 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x16000000}]}, 0x58) 13:58:16 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x5, 0x5, 0x9, 0x403}) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000140)={0x0, @ctrl}) 13:58:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2f01000000000000, 0x0) 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fe070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x2000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0x20) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000140)=""/4096) 13:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000008e070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x80045104, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="c09a9d8fd7d0d8b3dddf858a9b7c1986e73f62779aa2d83a0d5ece36bee0adc01f4784c0ad984ba3e24c7babce46a4b4be3f2a83c6abb2c7d0c3187d790c9b878f51adeabf") 13:58:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) 13:58:17 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1100}]}, 0x58) [ 1683.244178] ISOFS: Unable to identify CD-ROM format. 13:58:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) getsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000034000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1683.402161] ISOFS: Unable to identify CD-ROM format. 13:58:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x42) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x6) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e3010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x307, 0x0, 0x0, 0x0) 13:58:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x101000) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000040), 0x4) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r2, 0x6, &(0x7f0000000080)={&(0x7f0000000140)="c6871d62540b4457d0ca353fef843e3693daa0dd56d83c03487c7ed0b4ee4a805a8d330069130653b5dd3023b11aad3a93364e1f149211513bfe7699ce802fdaee0f1d76953e90f0858bd307a2ab", 0x4e}) close(r0) 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ef020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x1) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x1, "9b2072645d7dbc60"}) [ 1683.683832] EXT4-fs (sda1): resizing filesystem from 524032 to 6 blocks 13:58:17 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) 13:58:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000002c030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:17 executing program 1: r0 = semget$private(0x0, 0x1, 0x38fe7dbd1ff183c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000140)=""/151) [ 1683.751823] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted [ 1683.790726] EXT4-fs (sda1): resizing filesystem from 524032 to 6 blocks 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a8030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$cgroup_int(r2, &(0x7f0000000040)=0x4, 0x12) [ 1683.820109] EXT4-fs warning (device sda1): ext4_resize_fs:1930: can't shrink FS - resize aborted 13:58:17 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) socket$tipc(0x1e, 0x7, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:17 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)={0x0, 0x5}) 13:58:17 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) 13:58:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e4050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:17 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x15000000}]}, 0x58) 13:58:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) [ 1684.095017] ISOFS: Unable to identify CD-ROM format. 13:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000024070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 0: perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(r1, 0x0, 0x599f3dd1c8bf14c8, 0xfffffffffffffffc) 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="d76a214a13d96168db62e053d1ee1a3c54477209f8ac76618587639197b87824eb0aadc99576dc51359fbbe5106e31feb1685bd8249c70ba2aeec50af6764e75e4fa82e6259844231c7ff5dc4a6a4fb09f77e5b410cd3cfd74aefaf995255086950d688161228597c236d364547c2711032f93392424e190ac0ece508e96675bba781dd51a783bac2203154fcc63d14a5339ed04f017267cf46ff0feb34bdf5b20a03425ee411ae1bc932d4f9195af59144a3ce9f6b88b3bc062cde1650125b674428ad52b5cf149773ef7befeb8a6849a15338a803153b13b73ac1ee4a3d2be83d9819b", 0xe4, 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x204e00, 0x0) keyctl$get_keyring_id(0x0, r1, 0x5bea) close(r0) 13:58:18 executing program 1: socketpair(0x11, 0x80003, 0x7, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000240)=0x7) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000040)={0x6, 0x6, 0x7, 0x10000}, 0x10) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="298000000600000002b4fa4bbc42b7b55fd8b22335fdd8335dcd577b8a6074c4f5733e80f57270c7cba0d2c0087b32993321c1b4e326a429c2dcd247556fb2dc6d5a6345d59cb783c1c8242e65a6be4364426ac159e040ae738396150c94e121914b0600000000000000b1d3cd417417ac6971490f13041c1dee1c29c9d04892ef7a2edba33a28931b622404e29596674e8dad40eba18f60e1e6c86d9f2599a97e1f6c8da0a11009551e837df4e2ad0a5d143adc"], &(0x7f0000000180), 0x0) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000040010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x14000000}]}, 0x58) 13:58:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, 0x0) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000003020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000000)={0x3ff, 0x3930, 0x7}) 13:58:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x1, 0xfffffffffffffffe) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0xc643}, 0x1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1684.490316] ISOFS: Unable to identify CD-ROM format. 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000002e030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) sendfile(r0, r1, &(0x7f0000000000), 0x9) r2 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) close(r2) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001c040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 13:58:18 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3000000}]}, 0x58) [ 1684.776115] ISOFS: Unable to identify CD-ROM format. 13:58:18 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x3, r1}) 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='fdinfo/4\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x230, r2, 0x923, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffc00}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9fe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x397}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x28}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}]}, @TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x100, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xccd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa65}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30000000000}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}]}, 0x230}, 0x1, 0x0, 0x0, 0x40}, 0x4081) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000140)={0x8, 0x7fe000}) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) close(r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r3, 0x28, &(0x7f0000000080)}, 0x10) 13:58:18 executing program 0: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000180)=0x200000000, 0x8) ioctl(r0, 0x5, &(0x7f0000000000)="854d1e1e9438afde7c8f7d02efb79bd2912d91ed19adfd0ed243657399088658a5c2bd1b806182ed2c74cf19b1a4a57e576f6041e79d5bdf833d91b6011122a7830a104db339642356951d00da2e538c3aac3f760f78776bcb3c44646ab96569455788bd3cb5e4011dbbe6ceda97519add0724c8d457f552c9bf0b3f37868a25326524fce9fe8be17986636111e177b152857c9fba130c7a7f58d1ccd70fc3acfa252961ef03485578fdfa6b1736c8a3867a798c86c140dbd0a8548068b00afd221a8ab744") pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ce000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = getuid() lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0x8001, 0x3f}, {0x4, 0x1f}], r1}, 0x18, 0x2) close(r0) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000081070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() lchown(&(0x7f0000000000)='./file0\x00', r1, r2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) 13:58:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffff9c) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x2}, 0x28, 0x3) 13:58:18 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3f00}]}, 0x58) 13:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b0060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1685.096295] ISOFS: Unable to identify CD-ROM format. 13:58:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000040)={0x3, 0x0, [{0xa, 0x7, 0x800, 0x80000000000007d, 0x5}, {0xc0000019, 0x1b1, 0x4, 0x400, 0x1ff}, {0xd, 0xfffffffffffeffff, 0x2, 0x1c0000000000000, 0x3}]}) close(r0) [ 1685.299048] ISOFS: Unable to identify CD-ROM format. 13:58:19 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x2367, 0x40) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x101000, 0x0) fanotify_mark(r1, 0x85, 0x0, r2, &(0x7f0000000240)='./file0\x00') mount$9p_virtio(&(0x7f0000000000)='posix_acl_accessselinuxeth1*em0vboxnet0.\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0xe0000, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB="2c6d6d61702c61707072616973652c00893352b26e72704b57964d2bef88372da73b1f2700e760f30da2"]) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000a080000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'ip6_vti0\x00'}, 0x18) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) 13:58:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x101001, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xab000000, 0x0) 13:58:19 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x600}]}, 0x58) 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000008d050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20000, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) getsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000003c0)={0x0, @broadcast, @empty}, &(0x7f0000000400)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000500)={@initdev, @dev, 0x0}, &(0x7f0000000540)=0xc) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000580)={0x0, @dev, @remote}, &(0x7f00000005c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000800)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="8c010000", @ANYRES16=r2, @ANYBLOB="14032dbd7000000800010000000000000000", @ANYRES32=r3, @ANYBLOB="7001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400510a000008000600", @ANYRES32=r4, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004006c00000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000700000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000400000008000600", @ANYRES32=r6], 0x18c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) r7 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r7, 0x641f) prctl$PR_GET_CHILD_SUBREAPER(0x25) close(r7) r8 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) write$FUSE_OPEN(r8, &(0x7f0000000040)={0x20, 0x0, 0x7, {0x0, 0x2}}, 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={r9, 0xffffffffffffffc0}, &(0x7f0000000280)=0x8) 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003e000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x10080, 0x0) r2 = dup(r0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000180)={0x717, 0xf, 0x4, 0x40175000, {}, {0x4, 0xb, 0x2, 0x0, 0x1, 0x0, "79b62cb7"}, 0x45, 0x4, @fd=r2, 0x4}) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r3 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x200000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r3, 0xc08c5336, &(0x7f0000000040)={0x1, 0x8, 0x8, 'queue0\x00', 0x9}) close(r0) [ 1685.625394] ISOFS: Unable to identify CD-ROM format. 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000008060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2f6465762f6cb4791c214a5eb03bdf636f703000"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x1000000, &(0x7f00000001c0)='(\x00') r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x101000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) 13:58:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0f0000, 0x0) 13:58:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:19 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x11}]}, 0x58) 13:58:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000060020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$FUSE_STATFS(r1, &(0x7f0000000140)={0x60, 0x0, 0x7, {{0x2, 0x6, 0x180, 0x2, 0x42, 0xffff, 0x8, 0xfffffffffffffffb}}}, 0x60) close(r0) [ 1685.980145] ISOFS: Unable to identify CD-ROM format. 13:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b9050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:19 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000006c0)=0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x3) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) prctl$PR_SET_FPEMU(0xa, 0x1) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x200000000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) sendmsg$xdp(r1, &(0x7f0000000680)={&(0x7f0000000080)={0x2c, 0x1, r3, 0xc}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000280)="5936ab9f6a68f0dd5036a3496369504d43a1515801e9ae7b5799d11aa90ffd2fbd0d71f377d61c24b59b3c2f8b271440e1e5e2f7ed37a33d0890bb02bf6ba9c1a62b3a77e9ad70b74972ef8d42238d7362627a0bc28f28e8d682866c2963424e4dddfc224273a75ef1f847ae301537f097b082e1a13bb8fe79c45fe40fbffdae8c0a2f", 0x83}, {&(0x7f00000000c0)="37dd7c4b71ca98a38289d217a24fbeeae5ba2c0757466e4f3923f3119278c00dfeb374ac63192de6a9f36f4f4b1d2b76", 0x30}, {&(0x7f0000000100)="26ebfb3d00c91f5a7d7667f4bfef95e924c7b5d80f5e9ed0434e67242dd66878c2", 0x21}, {&(0x7f0000000340)="06d315be64a117359a2f8ab22fad872b911bc4962db8c4b0d88d7c6a223a20e11112de3c8cb3a0ddc0af51326280cad9720b48c7a08246df6bc5b4e3f30721b6dea8c921602e1a665d8991e2e18ef952e336d0d66af780ccbae2ef7a622d0d81b07be0330f648e1e9f76681a180e09920346811fa524c9779303b6f5ffb394ee162e8a7993284a2f00ba447b9e0afaf2997059c6010713b8fcf66f4825a3a641e336c342d5f2b28fedf60dd7d8015105497ada9c43ed2f1f61acf31645084639ed71ac54", 0xc4}, {&(0x7f0000000440)="faa4d1b0a5c69f8ef7cf8469220781c2b9ab65ee74c937b69303fdf7f363c41206103ecd6c88dd3b98aaa536f307186a0d1b3b29e40c396027142e3cdbfcaaa32fde80af6c31f6301271ea6c30cb5972d185a3228762183da861c4b52cb23b728b951f1c16ca8232c53898386051b7b38433714e8ec2082a047a5a500b4d4a28b9e6d2a5cb4b6587782ce2f85dbf1670782538a97bbd12faebb689614045a3d213dd", 0xa2}, {&(0x7f0000000500)="f7bdc4a6d3664653f81c7be9ef6927dee7ce668a24879fb8cb458e31677153ec984816fd3f64722ccbec2934de7b11dd4cb8b409f0c82d6638f57fe9d420ab0b85542ece552317a925cde0ea322bff9d93dbc0bcaf0a2105d6bad7dc9018f66506", 0x61}, {&(0x7f0000000580)="c660d30ecf0a2032238da7332b32c8f23a1dd1461e2ac436600a56e7bb7867cbcbf494a87644654dbe0fb791cc6decfa965932402394389a44f9b77555d6d204aa9e00547d4b688e1498adb6c37864804b94dd7dc3431a7fcf3818cfeb7c46245155330577cf66e838", 0x69}], 0x7}, 0x1) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) socket$tipc(0x1e, 0x4, 0x0) close(r0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140)=0x1, 0x4) 13:58:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000, 0x0) 13:58:19 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) [ 1686.147739] ISOFS: Unable to identify CD-ROM format. 13:58:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {r1, r2/1000+30000}}) 13:58:20 executing program 3: ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000068060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x80, 0x8, 0x5, 0x7, 0x8, 0xfffffffffffffffd, 0x0, 0x6, r3}, &(0x7f0000000100)=0x20) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200002) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(r4, 0x0, 0x0, 0x0) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ab070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000011010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) 13:58:20 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1f000000}]}, 0x58) 13:58:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) 13:58:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x103, 0x6, {0x9, 0x99fe, 0x9, 0x401}}) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000077070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1686.554357] ISOFS: Unable to identify CD-ROM format. [ 1686.712709] ISOFS: Unable to identify CD-ROM format. 13:58:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1a3, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0xa000) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x2710}}) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000055000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 3: 13:58:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8000000000002) getsockname$netrom(r0, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @netrom, @netrom, @null, @remote, @bcast, @bcast]}, &(0x7f00000000c0)=0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) 13:58:20 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3f000000}]}, 0x58) 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004d010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 3: 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001a010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') 13:58:20 executing program 3: 13:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000062040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 13:58:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x2, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000000c0)={{0x1ff, 0x7}, {0x1c000000000000, 0xa04b}, 0x7f, 0x2, 0x4}) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@local, @multicast2, 0x0}, &(0x7f0000000040)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@remote, 0x35, r2}) 13:58:20 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x12000000}]}, 0x58) 13:58:20 executing program 3: 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a3060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1687.271546] ISOFS: Unable to identify CD-ROM format. 13:58:21 executing program 3: 13:58:21 executing program 3: 13:58:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ed000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x4, 0x8000a, 0x1f) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000040)={'netdevsim0\x00', @ifru_flags=0x900}) 13:58:21 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) dup(r1) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) sendfile(r0, r2, 0x0, 0x20) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:21 executing program 3: 13:58:21 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x11000000}]}, 0x58) 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000088060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:21 executing program 3: 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000057040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) [ 1687.722731] ISOFS: Unable to identify CD-ROM format. 13:58:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r0, 0xae9a) 13:58:21 executing program 3: 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000b020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:21 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1500}]}, 0x58) 13:58:21 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x6, &(0x7f0000000540)=0x4) r1 = geteuid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000140)="7656561a6e428c553b74687784050ab2a3133c918b424ed51b2cf787f53d371e85ec8b1c8bebe134da5bb968740df3a71c19feaac21535d5bab09a7bac0d4b11b5039edce2b26d86054b94e93b0b04bcfb72ce9d53ea5ed458df12bfc94956efc00c6dfd2396ea8224e72f2bbc8beabfa44b60756ef1d31743334ca6b7ac3c2f3d3e90645623dadac972a8903e34138bdedd1bf1bddbfed6119f8997e5bfcbd1321ebaf0194049b1e673770b9b7bcd6fc229d59c6bae9c38f094c3", 0xbb, 0xffffffff}, {&(0x7f0000000200)="e191609babd8d2caa348ddf8983a3326d5163fff59b8f95e354b83b047de090c29becd06b1ba530ac5eb1b0032e8fd1d309015e2ad6e7b6ea28a07b0aede107ab4b313489417dff9b18dc1e2bc5db74a27105a44dd4a6962e6674b1c2fb9255a03209746b3a9e410f8c89c656b05e2fbcccfa68d34bc964d00024ada41815c106119523ccf89c10db09064306ef802e97165c3149938ae31b3b7ed758cf8d51758914e", 0xa3, 0x5}, {&(0x7f00000002c0)="b4f3c870b9e09d1be7ebe8a24183cfe150568dba4885d3fa25001122c699df3961b59a3062391933670be1fa35ed4118504ada903b352d76c8d6e4dc91f96c5ef530af25e16627c2931660fcd344cb833907a852a2ad2e2ba29c19449329911fa055133e730fed6c381954aac1699ac22167586279fea3cb098eabad9fe6fe381ec2be5fff0054382e3e7c7108adca20f336bea9f88d7f8d157479470c67475dd7bac2eb1cef63aad7dec7b92f36a28554f5c4f46f2e73e4260ac207c56755146c4b7e4453b6bbbe29", 0xc9, 0x8}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='rescan_uuid_tree,clear_cache,enospc_debug,nobarrier,compress=lzo,noenospc_debug,rescan_uuid_tree,clear_cache,compress-force,check_int,pcr=00000000000000000051,fsuuid=s\x000ua\x00f5-db31-5{\x00\x00-760w-6addt\x00w0,obj_user=,uid<', @ANYRESDEC=r1, @ANYBLOB="2c61b846e07cad03576300"]) 13:58:21 executing program 3: 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000059000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:21 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x80000) r1 = getpgid(0x0) getsockname$unix(r0, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) r2 = perf_event_open(0x0, 0x0, 0x10, r0, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r3, 0x1, 0x39, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x49516cc9c0dc89a4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000080)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x2000020, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@privport='privport'}, {@cache_none='cache=none'}, {@debug={'debug', 0x3d, 0x38000000000}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@uname={'uname', 0x3d, 'wlan0'}}, {@version_9p2000='version=9p2000'}, {@version_u='version=9p2000.u'}, {@fscache='fscache'}], [{@pcr={'pcr', 0x3d, 0x2d}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@smackfshat={'smackfshat', 0x3d, '/dev/loop#\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r3) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = msgget$private(0x0, 0x1) r7 = getegid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000480)={{0x9, r4, r7, r4, r8, 0x110, 0x1f}, 0x0, 0x0, 0x6, 0x0, 0xc, 0x100, r1, r1}) 13:58:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xebffffff, 0x0) 13:58:21 executing program 3: 13:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004f010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 3: [ 1688.202203] ISOFS: Unable to identify CD-ROM format. 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000c000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, 0x0) 13:58:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netstat\x00') sendfile(r0, r1, &(0x7f0000000100)=0xffffffd, 0x4007ffffffb) 13:58:22 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3}]}, 0x58) [ 1688.434752] ISOFS: Unable to identify CD-ROM format. 13:58:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x4800, 0x4) 13:58:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d2020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000003180)='gfs2\x00', &(0x7f00000031c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f6040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r2, 0xe2, "a56297b11ea377366d86d33a7f649dd325a1956afadd6f91c6a3eb1ea8737416f716cccaab11daaf6289a22a5180a00eb111a551dc0bcf1285ceaeffe4fb1cf041263d6a62803d5f69583cfc4e42bc6871e44a91f1a9a6a202ff2b5d8f3e17f84b2ac1e3aa363a53721821a864c20afb88e8fa232688a0d15807fbb5ff5fc8e8d97c79cd8244db85b23af186525fdfe7325ba425617a0548737ae5244ef3b88f9f69150f49e572bd4bf77a0c6612db1f020f32b4be6279fdf6b9810c2e5a6b650e2eea5c61e739e9ec7b077dc04242a5b0889abefb95aea2f8605d2f2e1591928a26"}, &(0x7f0000000080)=0xea) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(r0, 0x0, 0x0, 0x10) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f00000000c0)=0x6) 13:58:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xab00, 0x0) [ 1688.686348] gfs2: not a GFS2 filesystem 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009e060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1688.740920] ISOFS: Unable to identify CD-ROM format. 13:58:22 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x2}]}, 0x58) 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000009d060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0x1e, "4a88674030939769dfd9fcaa14d872d8d5aefc79f14752b38a763a070407"}, &(0x7f0000000080)=0x26) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x200}, &(0x7f0000000100)=0x8) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:22 executing program 1: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000100)="7d4062f28ab45fb3c81f78780ab0f1948aeb922de9c754f9c39446a0714d08383e0e398186429849f364969a82db984aad228d81f2ed1a1381717381948a5340c24f5913720c847eddf00bb8db9dcaeecc9cc624ec469f6973b84e030b5ab80fbc237eaaaf9c53a505a89727e6ba614392c187216efcb41579b18824f7b61626f6fdc020e4fd2d5a3f13f772200ccf989b8e9b0bc403530796ffcb843783ea0ef6ddbcfd9ad328fcc0ea7c18eef8289080a981ada27886f7bf2eb0e39afab975c1df77dbd3", 0xc5) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) [ 1688.889674] gfs2: not a GFS2 filesystem 13:58:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = fcntl$dupfd(r0, 0x0, r0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x1ff) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000040)=0x7) 13:58:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) 13:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f8010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:22 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x3, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)=0x2, 0x1) 13:58:22 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x4000000}]}, 0x58) 13:58:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x1a6f, 0x1, 0x800, 0x20, 0xffffffffffffffe0, 0x7fffffff, 0x0, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000080)={r2, 0x2, 'nW'}, &(0x7f00000000c0)=0xa) 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006e010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f00000001c0)={0x3, 0x0, [{0xc0000003, 0x3, 0x2, 0x64, 0x9, 0x8, 0x7ff}, {0xc0000009, 0x497, 0x7, 0x0, 0x7, 0x101, 0x8}, {0x80000001, 0x0, 0x3}]}) [ 1689.265737] ISOFS: Unable to identify CD-ROM format. 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ef050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 13:58:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e23, @multicast2}}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xc, 0x20004) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x20000104) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x02roup.stap\x10>\xe1b\x88\xa8%\xf4\xa0iuP\xeaym\x1d+\x01\x9e\xdb\x8c\xb2\xcfHc\xce\xbeg\xe3Zw\n\xd2\xb1>q\x1b\xe2\x03\t\xb9\xc3Y\xbc\x99#*\xc5\x1a\xcbai\xb5vq\x8d\x14\x12O\'\xfcd\x15>+V1*S\x01\xe0\xf9I\x86}k\xb3\"\xd46a\xc1k\xc7i\x05j\x9d\xe3\x91\xdcFK\xa2r\x14\x1d\xf5\xe8a\xac\x04\x93\xb8{\xe05C\f\x90\xc4\xc6S\x99\n\xc9v\x8c\xe6\x04\x1b\xc9\xeb`>\xdfM\xd8\xbd\x7f\xda6\xed\xf9a\nr\xc7\x98fC\xa6\xbc\xef\xdde\x8c(\x92', 0x2761, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) [ 1689.464391] ISOFS: Unable to identify CD-ROM format. 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a2060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x300000000000000}]}, 0x58) 13:58:23 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x80000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x4c000, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x1) fanotify_mark(r0, 0x10, 0x1, r1, &(0x7f00000001c0)='./file0\x00') setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='GPL-\x00', 0x5, 0x2) 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ec060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) close(r0) 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000069000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$cgroup_int(r2, &(0x7f0000000040)=0x4, 0x12) 13:58:23 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fchdir(r1) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xab, 0x0) 13:58:23 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x6000000}]}, 0x58) [ 1689.836191] ISOFS: Unable to identify CD-ROM format. 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000069010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$cgroup_int(r2, &(0x7f0000000040)=0x4, 0x12) 13:58:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) write$cgroup_int(r2, &(0x7f0000000040)=0x4, 0x12) 13:58:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xd403000000000000, 0x0) [ 1690.083090] ISOFS: Unable to identify CD-ROM format. 13:58:23 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x1}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000640)={0x3, 0x0, 'client0\x00', 0x0, "dce2c0c9da10fa72", "67eff291d75d32c988686045db81f1b49a72f176dc8566de340d10cdd4f48c33", 0xe24b, 0x800}) renameat(r0, &(0x7f0000000400)='./bus\x00', r0, &(0x7f0000000200)='./file0\x00') write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000140)=@null) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x40002, 0x0) r2 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0xec, 0x8040) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r2, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r4, 0x8923, &(0x7f0000000180)={'nr0\x00', @ifru_data=0x0}) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080ffffffe0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2842, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000002c0)={[{0x3, 0x20, 0xfffffffffffffffe, 0x0, 0x1, 0x81, 0x8001, 0x3f, 0x1f, 0x3, 0xfff, 0x2, 0x1}, {0x8000, 0x96ab, 0x7c2b, 0x6, 0x9, 0x80000000, 0xffffffff, 0x7, 0x1, 0x42, 0x1, 0x6, 0x8}, {0x5, 0x3, 0x4000000000000, 0xffff, 0x1, 0x3, 0x100000000, 0x2, 0x91f, 0x3ff, 0x1, 0x0, 0x8}], 0x8}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080), 0x0, 0x9ec}, {&(0x7f0000000140)="a4dba4b4fea609a6f6ce4f3d231b3cc944b708299ee031e3c1ed3ab5d2be10c90df8c32e7d921a71", 0x28, 0x3}, {&(0x7f0000000180)="dc891f8cb2da391608fd693ff240cf12e078d1c3874436e73ed5b0a1c3c22785a644afbb68976878a2cbe39f2c4aa4dfcf60b2696fc471e8472e3d217bfc6243c942a0b87835c85bbd22238a723b652246dcb60e086c1c005340e0950cd66caefb1383877e2891fc78b749e3960918ecb134032853c006090d9271b9f8e22d1bda66118495699032580f45373786b6d5184ee1246a2153cc42fcbbeb26a1265f725b0c37c8eecf4427d908591f208b5cafd5bffef819baecd161312ac1f14c5b740d1ca2eb1c88", 0xc7, 0x3}, {&(0x7f0000000280)="b80d4e3b4bf42421bf71ad7f57c67d48f7c3ca15ea7b0e27b7f50db250865ef94699e778e10bad2e477759c97c4f7e47934531370aadd8a72f1b3f692a47772dd458e7c1864ce6f1ed3088290939d78dce6a1ea47b25cb1d", 0x58}, {&(0x7f0000000300)="baa0e4834117d8b82981e49091c30b2facf3258d71d839612ff322cce229f6973ddcda1e9df7ebcafe6e10831fc15b92747cdab124949659a4d324611770fe19c74ae817b4f01db4f72caf92189e1f3340ffd6fc00759355b6626b3cde2ef5cc226cd2d17d2d53d04dfe1bc62d22ed55f59076c5204d0fcb2950baa292c12dc8d61b759c77239b45f2e8070f1c401956c78d0d7a5766c49e07737497d72f8b075f552aa71ef39f73ab93ba6176b042d6", 0xb0, 0xd38a}, {&(0x7f00000003c0)="7ca8106e014a8e6908ade415b60cae20af5d983303812695154c270761036625ccea3fc0794c3aae75b90fa4c369d9d9c94c9bc0b12b689e975867ca1c4ce691ea83b78594d433f70ff9492f237126eaf73ac595becbf76a293b494177985b64a67ecc78deeebdbc32853506b6f4496496fd3360cd3005b9643d29a9c50314760dec5fb39c62875c5383e71bda8f8c11f912b934c1414df02dc77059b41d6fcf7b75b8ca6ad71fcf37ae6ae457c69eaa9a79", 0xb2, 0xff}, {&(0x7f0000000480)="a68899a8bc3de9b89528ba17d7527c2f557ce82aa4fb8227cd04348517881ffea2c4d6ef60be59ffd7236eb33e427d7fba85a4118007", 0x36, 0x2663}], 0x40402, &(0x7f0000000580)='iso9660\x00') r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80, 0x0) write$9p(r5, &(0x7f00000005c0)="a900c515e5ad038650d5fab7b6b8538fddd66ad54a20201bf03887fe1501b1c6a8afbc915cfbc0", 0x27) 13:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000d6030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:23 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x800) r1 = getpgrp(0x0) perf_event_open(0x0, r1, 0x1, r0, 0x8) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(r2, 0x1, 0x39, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x541281) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r2, &(0x7f00000006c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000800}, 0xc, &(0x7f0000000680)={&(0x7f0000000280)={0x3cc, r4, 0x28, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3900000000000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x53}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xabf}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf86b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc6af}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x86}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xeb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x693a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc678}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xbb3b}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'netdevsim0\x00'}}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xa4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffc000000000}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x100, @dev={0xfe, 0x80, [], 0x29}, 0x10000}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x2, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'irlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x110, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}]}, 0x3cc}, 0x1, 0x0, 0x0, 0x48010}, 0x840) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)="5b310b815c8038fc4fb4907be66a74b4fc033d1df6d65f4c0bd42d11f943cd7c057ae35579ebf5002ca25116fd630dea8c1be14f94f289d402d5e6e6de26458452f4e339ed29be05db0ee15b3bfd3485a3107e86f4dd9d9f1ca89cb66e899f79d730e7242a4564cb71cf1ad6633da6e3ad4778fe67cb274a60974f517db14fe7f71b794faa168d11d6fb2d3a029295f2967d7bd02c5261d8ef7d8c79e59707aa9f0c8bec7de61abefb3779eddde75d39b6f381941306b7d2ed0a76b0144b2e290b500e4ff20daeedb567f77d10ba696f20337f35d4ce0a792a8424929186811c04cb7d196fadbc2abc38286a6723", 0xee, 0x20000000, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) 13:58:23 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) pipe2(&(0x7f0000000000), 0x80800) 13:58:24 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1f00}]}, 0x58) 13:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004b040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:24 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) close(r0) 13:58:24 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='/dev/loop#\x00', 0xfffffffffffffffc) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='/dev/loop#\x00', r2) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:24 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ea040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 13:58:24 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = getuid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000100)={0x3ec, 0x0, 0x1}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0xad, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="99e564cc11c7873c4b4dcd7e7c70df39c9137de2dd684e03ccd3430d8c4ba226d65d2acb90eedf0b1c810ebce06ec6db69f653cf27642cd728199dcb9d3bc89cb2e2df45c24d86a7083d7becbc86b418b8bb97f36c0ce45d5225d16fd060b7ee6fd0a83b891a96c377f0a6b737dc70477403114fff93ebf2659aedb14e15fe883085831b5f5c5ed4cc6a5593e5c57d7a2a429face2b22334026dc97bf485f1fb38334e199e31887dbcf9a0f517a011a762fec1b9ef2a4389cbfd26786fca1dec10f09df284e130121c488e0a4a91a7e927e717945a9f011ca2fbfe07822659d30740b62983b2f661480477e68d1a95ef524cdbc683c40c7951f751", 0xfb}], 0x2000, &(0x7f00000003c0)={[{@nobarrier='nobarrier'}, {@uid={'uid', 0x3d, r3}}, {@gid={'gid', 0x3d, r4}}, {@force='force'}, {@creator={'creator', 0x3d, "f23ca963"}}, {@nls={'nls', 0x3d, 'macromanian'}}, {@barrier='barrier'}, {@barrier='barrier'}, {@decompose='decompose'}, {@uid={'uid', 0x3d, r5}}], [{@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}]}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1000) [ 1690.519334] ISOFS: Unable to identify CD-ROM format. [ 1691.210521] ISOFS: Unable to identify CD-ROM format. 13:58:25 executing program 1: syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="aa2bdbfe444b09a495c9fbe71288fa4f0c8cbb6c8041944e1d9dcb793cb399f18581795d7833172345af3eb710d570e70f4e5f35fe5e4ada074cadbe0c74d6071fa41aec9402dc5a037fb6182a04851737e6c170665c0d2c9d4578e8b12a9fec8e60f23ad10d7fe09c572dd199e828938f8710b6891c6007f150ceb030cfa65406ce02c84483f297e672cacc887603d88e3b3c22b04b7f5cf6a0aaf1102b6405fb1591357bc4a5b6997a2a0a11a8fad6e3dc9f6ee34797fb20a9a903e2f77787bfd9d66880f6d6f6402045e2b5a75d82451e20589dbb0b7462dc9e4afecc245f0888324de86c34e6cc4e0b7b8516c1de9ba87e2db75fd7", 0xf7, 0xfffffffffffffff7}], 0x8080, &(0x7f00000002c0)='iso9660\x00') utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x20000000002, 0x9}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x44100, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000003c0)={r1, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x5, 0x0, 0x3, 0x7, 0x2, 0x7f, 0x5, 0x7, 0x8001, 0xa1, 0xffffffff, 0x1, 0x34d59bd, 0x8, 0x5]}, &(0x7f00000004c0)=0x100) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4000000007f, 0x0, 0x0, 0xed543ae1f5334a4, 0x0) 13:58:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(r1, 0x0, 0x1cd, 0xffffffffffffffff) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x800) 13:58:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x5}]}, 0x58) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a5060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, 0x0) 13:58:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000077060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) fcntl$dupfd(r0, 0x0, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000000)={0x80000000, 0x100000001, 0xfffffffeffffffff, 0x7}) 13:58:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000004020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1500000000000000}]}, 0x58) 13:58:25 executing program 1: syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x7, &(0x7f0000000600)=[{&(0x7f0000000100)="c584cfe77c40ad6ab2e051da02584d0c51d637560ecf3e71f24b7a3601b7f5963b0ba87ee9594cde90a4a8b2718f04655627d209223f791b9e4008e4338d4674b0b385791f6d38f7c7be9734e2291de5088cb8aa9f5bd11e8b6152bc2c3d0e6e67f6f93c769fea2ad2b9ae2f0fa0a12a24678610c6a932252918c1e25d96e682fb069d8774", 0x85, 0x7}, {&(0x7f00000001c0)="e54016e60f41f32a5bbd09b28c67132ce4c9b708ae652c2ec8aed92d67ed106dd5a467ba3e004016", 0x28, 0x5}, {&(0x7f0000000200)="dabad6e95e53c653721e2163d1cf9cff8f798c6cd5a5f74ab416a01f076931478178e68c08717a1156537910b60cc73e441c60e73f075ba4a025da4cb8162e0a13efba6bfa6dcbb8ad3337af940f73f1b5cc124f5efd4c44a9bee5c1a440a820721fe40ef469d31c5576666dfa7d66ad57d54cb5c2bb9b1431b13642b8127671f7beed141b2634c27a884ff7d9f2d35b3818aaa4e5340e6205e2de9176bfb44605f6dee041e9c2fa70c3d90cb2cb1c623b090f40fc86ee5800dcec402cadb4f9f8944b7392fb2d288708f9d11530600a3e4005334f1f0a98474fd3ab7e8dd8e175e7c9a5abf58e044fb82e3fc66f8098", 0xf0, 0x6}, {&(0x7f0000000300)="215f98b1eb44bef93036d24c2eddbbcd4c8cd0bf4293d19fcecfb0676107eb8ddbea03c0ff5b22aad48299ebc5a6a92b391b29c5512d18155ff90e7c0edbfdba824fca24d2d02a3424f9faacfffbf1bc37996e6ec71b0c98ba0f6365e69d", 0x5e, 0x7}, {&(0x7f0000000380)="45a24e1ecef1d211f2a1e3601c85425c5b044f563a76b153b07785ea72b5e2f3d84220d81d2ee8ee0b6a462fb902a5a7ba29ab3b2150105f0af0f6c78c46d4c770abfef76aa67e30696a03f6df4590494356108e485d43eb321820180840024bfffd465264f2fea67c072f6c415929cad0d156666a8899b0c9b9cd364ac78214705639453ecb8779e302a484b7b487cb723d240dc39e05aeae37ad39a4aa8a4dcb28c13dc5a8", 0xa6, 0x4}, {&(0x7f0000000440)="fe82dcbdfd6c293fd67376534442dd133603e56bac93812b6596ea5d0e89144fb692bf282d7bd3b9c3afd2d5e79c5595d93378dd942c4243c3c585bc4129e94afda35139be3aa2fa9e62673dfb31d304ca0cc434cafd7274e54cc3396312cbf845ecb976e1a2de985a5da8b7eaec9776bda449c58c4bd1ce2102bac52b89dc3eebc598ffa08065f57d1527f5670ee755934e5ebde834bf2b", 0x98, 0xfffffffffffffff8}, {&(0x7f0000000500)="c3f669d6e39cb3c47cf5dd2db5aeadb4c506348aec7782ad2d6c37550534768f6fadfcc866ab9e28b0a8c061171c611e789be2dd46434d25579cb4d6fd7c48be9abf5b0644b2715de9706cadf265aa669645fd8b27832904a27e469770311efc7eb73c18e88afc46d5e833c08eacee77843eae8971f665be8b4a0571806dc9e60c081915ccb6d2c13199e60967a7d0642262114d010ef0ba82685ac763ecec0dc419fae75e2d966a0efa237a1b628881fbe9e70f33ee717446cd3f220a48bea3c40ca096d398cc22dc4754afc63efcceb84547dc21b5257783200452e22307c13c0ed261dbeb45df4b2fdeb77fadd8a663be96c233c57a60a17d", 0xfa, 0x1}], 0x8020, &(0x7f00000006c0)=ANY=[@ANYBLOB="636865636d3274de6c617865642c6f76657272696465726f636b7065726d2c756e686964652c736d61636b66736465663d6367726f75702c00"]) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x400200002, 0x0) 13:58:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2fb, 0x0) 13:58:25 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000040030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) creat(&(0x7f0000000000)='./file0\x00', 0x24) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:25 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000c8000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) 13:58:25 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000080)) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cf040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) 13:58:25 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000000)=0xfffffffffffffffb, 0x4) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000065070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:25 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) 13:58:26 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000038030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 13:58:26 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1200}]}, 0x58) 13:58:26 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) [ 1692.424543] ISOFS: Unable to identify CD-ROM format. 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a8010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x264000) r1 = semget(0x1, 0x3, 0x80) semop(r1, &(0x7f0000000040)=[{0x4, 0x200000000000, 0x1800}, {0x1, 0x800, 0x1800}, {0x1, 0x4, 0x800}, {0x6, 0x1, 0x1000}], 0x4) setsockopt$inet_dccp_int(r0, 0x21, 0xc59a112e61a87482, &(0x7f00000002c0), 0x4) write(r0, &(0x7f0000000340)="04572ea867e0d71b89bdd4208ebf8b232236bb36dacf8af54e1c61ab61dab41241d18b0ae05dc626ad17fd9c145cf8fccd5a0da3cb0ac8c7cf6259dd16c4379929ea345c6093294175792b6cd23abddb8cc1e6a1d8b47b5e1643f9ea7876cd59e75e7c079883c5bc800007134f8f18b12681cd1cfb0cb16a4f33e1bdcc4a5bcb1a2e07ad300d02f817f7c596ce74bb", 0x8f) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x4000000001ffe, 0x0) r3 = perf_event_open(0x0, 0x0, 0x200000000f, r2, 0x2) getsockopt$SO_COOKIE(r2, 0x1, 0x39, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000180)=0xe8) r5 = getpgid(0xffffffffffffffff) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r6, 0x7fff, 0x8}, 0x8) prlimit64(r5, 0xf, &(0x7f0000000280), 0x0) socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f00000001c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r4}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) syz_open_dev$cec(&(0x7f0000000440)='/dev/cec#\x00', 0x0, 0x2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = fcntl$getown(r0, 0x9) syz_open_procfs(r7, &(0x7f0000000240)='stat\x00') 13:58:26 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', 'iso9660\x00'}, &(0x7f0000000080)='iso9660\x00', 0x8, 0x2) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000002d030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, 0x0) 13:58:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x500}]}, 0x58) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000b5020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) [ 1692.795608] ISOFS: Unable to identify CD-ROM format. 13:58:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000100)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x422d5195, @ipv4={[], [], @rand_addr=0xff}, 0x3}, 0xb) ioctl$KDSETLED(r1, 0x4b32, 0x3) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) bind$isdn_base(r0, &(0x7f0000000000)={0x22, 0x71, 0x3, 0x6, 0x7}, 0x6) 13:58:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, 0x0) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000042010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) [ 1692.982068] ISOFS: Unable to identify CD-ROM format. 13:58:26 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0xfffffffffffffebe, 0x0, 0x0, 0x0) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000017040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:26 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1200000000000000}]}, 0x58) 13:58:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 13:58:26 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/236, 0xec, 0x100, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000019070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:27 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x1417e, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x10000, 0x6}) 13:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000002f070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in=@initdev, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0xe8) getsockopt$SO_COOKIE(r1, 0x1, 0x39, 0x0, 0x0) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f00000003c0)=0x4) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xb, &(0x7f0000000100)='/dev/loop#\x00'}, 0x30) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000340)=0x5, 0xeb4, 0x1) syz_open_procfs(r3, &(0x7f00000001c0)='net/netlink\x00') syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x1, 0x2) pwritev(r2, 0x0, 0x2e3, 0x0) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, 0x0) 13:58:27 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1400000000000000}]}, 0x58) 13:58:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xa) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x1, r2}) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r3) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 1693.476283] ISOFS: Unable to identify CD-ROM format. 13:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000088020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) 13:58:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000180)=@sha1={0x1, "006e850e5a483dc3e024b669ee7f930879dcc7bf"}, 0x15, 0x3) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000080)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) get_robust_list(r1, &(0x7f0000000300)=&(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000340)=0x18) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x29, 0x2, 0x80000}) 13:58:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) [ 1693.709705] ISOFS: Unable to identify CD-ROM format. 13:58:27 executing program 1: syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x42) r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) mount$9p_tcp(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='9p\x00', 0x4000, &(0x7f00000005c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@cache_fscache='cache=fscache'}], [{@fsname={'fsname', 0x3d, 'vboxnet1%^'}}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r1}}, {@measure='measure'}]}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000300)={{0xfe, 0xf45b}, 'port0\x00', 0x1, 0x1060, 0x7, 0x6, 0x7, 0x0, 0x3ff, 0x0, 0x4, 0x3ff}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x47, 0x8000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x6000062}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000826bd7000fddbdf25090000003400020004000400080001000500000008000200740000000800020004000000040004000400e8ff03000400080001000100000014000200040004000400040008000200040000001c0004001400010062726f6164636173742d8e696e6b000004000700"], 0x78}, 0x1, 0x0, 0x0, 0x4010}, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000100)={0x1, 0x2, 0x1, 0xffffffffffffff9c}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, 0x0) 13:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000cd060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffff9c, 0x1, 0x39, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x4400) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000080)=0x3104) 13:58:27 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1000000}]}, 0x58) 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, 0x0) 13:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000ee050000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x5, 0x3, &(0x7f0000000180)=[{&(0x7f0000000080)="1418378197564819bc64483a1a8ace65ec621e1fb51721a5dde309c16ee32a15be80b56bf43458177469caedb23fdde27cf8628cb495513ff8bfe7683815225872f5f4de5cd51c053f151c5699190b1f931a9bd2ca6b0a4364a2", 0x5a}, {&(0x7f0000000240)="c5d0f0940264373ce61e61470a99a758e8a943f522a6ec3e5ca11a0623b6eb89cd6f902b7d7b92a9f5a693a3b0744b6112d34929114a5906aceed3d2cd1c6ce805930ac3f4ada673c761e8d3d83e727516de50fa65a456796f6871a9e1615f1fb8cb39ca2441564555a26717f58e22a48620f394f2d09700404bc2e76d3979572b4ecdddab8893d686e9ce4fa29c", 0x8e, 0xf42a7b4}, {&(0x7f0000000300)="bfbc748035d4190734169ee3490ec70a40290f3aa2063395efd5578eaadc1644f6f32f1a09280aad0242534ea185b94398c62719a34237e16f5ea832a1bf3da885e95dd7c5efea2015781e78c3fa1f933ce5685092071a11c2306c960e5671c3c48f72c3cf90167f3adb5f3f228a1009241cdc6bf149f26794cc2dd66d8d9eb2bf7d", 0x82, 0x7}], 0x200000, &(0x7f0000000100)='/dev/loop#\x00') r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r1) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r2, &(0x7f00000003c0), 0x581) 13:58:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, 0x0) [ 1694.001105] ISOFS: Unable to identify CD-ROM format. 13:58:27 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, 0x0) 13:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000087030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:27 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40002) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000140)=""/150) 13:58:28 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x600000000000000}]}, 0x58) 13:58:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) 13:58:28 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x1}) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x100) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000640)={0x3, 0x0, 'client0\x00', 0x0, "dce2c0c9da10fa72", "67eff291d75d32c988686045db81f1b49a72f176dc8566de340d10cdd4f48c33", 0xe24b, 0x800}) renameat(r0, &(0x7f0000000400)='./bus\x00', r0, &(0x7f0000000200)='./file0\x00') write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000140)=@null) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000640)=ANY=[], 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x40002, 0x0) r2 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0xec, 0x8040) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(r2, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx2\x00'}, 0x58) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") r4 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_ifreq(r4, 0x8923, &(0x7f0000000180)={'nr0\x00', @ifru_data=0x0}) sendfile(r1, r1, &(0x7f00000000c0)=0x500, 0x8080ffffffe0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2842, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000002c0)={[{0x3, 0x20, 0xfffffffffffffffe, 0x0, 0x1, 0x81, 0x8001, 0x3f, 0x1f, 0x3, 0xfff, 0x2, 0x1}, {0x8000, 0x96ab, 0x7c2b, 0x6, 0x9, 0x80000000, 0xffffffff, 0x7, 0x1, 0x42, 0x1, 0x6, 0x8}, {0x5, 0x3, 0x4000000000000, 0xffff, 0x1, 0x3, 0x100000000, 0x2, 0x91f, 0x3ff, 0x1, 0x0, 0x8}], 0x8}) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x7ff, 0x7, &(0x7f00000004c0)=[{&(0x7f0000000080), 0x0, 0x9ec}, {&(0x7f0000000140)="a4dba4b4fea609a6f6ce4f3d231b3cc944b708299ee031e3c1ed3ab5d2be10c90df8c32e7d921a71", 0x28, 0x3}, {&(0x7f0000000180)="dc891f8cb2da391608fd693ff240cf12e078d1c3874436e73ed5b0a1c3c22785a644afbb68976878a2cbe39f2c4aa4dfcf60b2696fc471e8472e3d217bfc6243c942a0b87835c85bbd22238a723b652246dcb60e086c1c005340e0950cd66caefb1383877e2891fc78b749e3960918ecb134032853c006090d9271b9f8e22d1bda66118495699032580f45373786b6d5184ee1246a2153cc42fcbbeb26a1265f725b0c37c8eecf4427d908591f208b5cafd5bffef819baecd161312ac1f14c5b740d1ca2eb1c88", 0xc7, 0x3}, {&(0x7f0000000280)="b80d4e3b4bf42421bf71ad7f57c67d48f7c3ca15ea7b0e27b7f50db250865ef94699e778e10bad2e477759c97c4f7e47934531370aadd8a72f1b3f692a47772dd458e7c1864ce6f1ed3088290939d78dce6a1ea47b25cb1d", 0x58}, {&(0x7f0000000300)="baa0e4834117d8b82981e49091c30b2facf3258d71d839612ff322cce229f6973ddcda1e9df7ebcafe6e10831fc15b92747cdab124949659a4d324611770fe19c74ae817b4f01db4f72caf92189e1f3340ffd6fc00759355b6626b3cde2ef5cc226cd2d17d2d53d04dfe1bc62d22ed55f59076c5204d0fcb2950baa292c12dc8d61b759c77239b45f2e8070f1c401956c78d0d7a5766c49e07737497d72f8b075f552aa71ef39f73ab93ba6176b042d6", 0xb0, 0xd38a}, {&(0x7f00000003c0)="7ca8106e014a8e6908ade415b60cae20af5d983303812695154c270761036625ccea3fc0794c3aae75b90fa4c369d9d9c94c9bc0b12b689e975867ca1c4ce691ea83b78594d433f70ff9492f237126eaf73ac595becbf76a293b494177985b64a67ecc78deeebdbc32853506b6f4496496fd3360cd3005b9643d29a9c50314760dec5fb39c62875c5383e71bda8f8c11f912b934c1414df02dc77059b41d6fcf7b75b8ca6ad71fcf37ae6ae457c69eaa9a79", 0xb2, 0xff}, {&(0x7f0000000480)="a68899a8bc3de9b89528ba17d7527c2f557ce82aa4fb8227cd04348517881ffea2c4d6ef60be59ffd7236eb33e427d7fba85a4118007", 0x36, 0x2663}], 0x40402, &(0x7f0000000580)='iso9660\x00') r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80, 0x0) write$9p(r5, &(0x7f00000005c0)="a900c515e5ad038650d5fab7b6b8538fddd66ad54a20201bf03887fe1501b1c6a8afbc915cfbc0", 0x27) 13:58:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x4, 0x101000) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x297, 0x1) 13:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000001b060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000006c000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1694.442681] ISOFS: Unable to identify CD-ROM format. [ 1694.455523] ISOFS: Unable to identify CD-ROM format. 13:58:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file1\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 13:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000eb010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:28 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1f00000000000000}]}, 0x58) 13:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000051040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1694.730145] ISOFS: Unable to identify CD-ROM format. 13:58:28 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x8002, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDIO(r2, 0x40345622, &(0x7f0000000180)={0x6, "aeb0fdcf11f64f47b79268a5bc14253c9e898c20d8c6d5d0f642bda074dcf281", 0x0, 0x1}) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000140)={0x2, 0x4e21, @rand_addr=0x4}, 0x10) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000300)) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000340)={0x7, 0x401, 0x1}) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x4) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x3, 0x100, 0x1}) recvfrom$packet(r0, &(0x7f0000000200)=""/192, 0xc0, 0x100, 0x0, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000002c0)={0x200, 0x2, 0x6, 0x10000}) prctl$PR_SVE_GET_VL(0x33, 0x3a05) 13:58:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000100)=0x6000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) prctl$PR_SET_ENDIAN(0x14, 0x2) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000180)='\x00') 13:58:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, 0x0) [ 1695.074233] ISOFS: Unable to identify CD-ROM format. 13:58:29 executing program 3: r0 = semget$private(0x0, 0x1, 0x38fe7dbd1ff183c) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000140)=""/151) 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000003b030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x2000000}]}, 0x58) 13:58:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x204000) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, 0x0) 13:58:29 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) r2 = geteuid() r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000ac0), &(0x7f0000000b00)=0x10) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f0000000780)=0xc) r11 = getgid() r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r12, 0x8933, &(0x7f0000000a80)={'vcan0\x00', r0}) getresgid(&(0x7f00000007c0)=0x0, &(0x7f0000000800), &(0x7f0000000840)) getresgid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) getgroups(0x7, &(0x7f0000000940)=[0xee01, 0x0, 0xee01, 0xee00, 0x0, 0xee01, 0xee00]) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="02000000010001000000000002000300", @ANYRES32=r1, @ANYBLOB="02000300", @ANYRES32=r2, @ANYBLOB="0200f607", @ANYRES32=r4, @ANYBLOB="32000100", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="040007000000000008000400", @ANYRES32=r8, @ANYBLOB="08000200", @ANYRES32=r9, @ANYBLOB="08000500", @ANYRES32=r10, @ANYBLOB="2a000500", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB="08000200", @ANYRES32=r14, @ANYBLOB="08000200", @ANYRES32=r15, @ANYBLOB="10000200000000002000050000000000"], 0x8c, 0x1) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x362, 0x0, 0x0, 0x0) 13:58:29 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x0) connect$rds(r0, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) 13:58:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(r1, 0x0, 0x17e, 0x59) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0x3ff, 0x531}, 'port0\x00', 0xa1, 0x120004, 0x9e, 0x2, 0x4, 0xafc, 0x9, 0x0, 0x7, 0x1}) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)) 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000fc070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 3: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x58) 13:58:29 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1600}]}, 0x58) 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000a6070000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) 13:58:29 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x3) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8110404}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x900, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) 13:58:29 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x100) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) close(r1) [ 1695.662703] ISOFS: Unable to identify CD-ROM format. 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e1060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000060030000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000051020000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1695.888446] ISOFS: Unable to identify CD-ROM format. 13:58:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000040)) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000080)=0x6, 0x4) 13:58:29 executing program 0: open(&(0x7f0000000180)='./bus\x00', 0x40, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = accept$inet(0xffffffffffffff9c, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001100), &(0x7f0000000500), &(0x7f0000000540)) getgroups(0x6, &(0x7f0000000580)=[0xee01, 0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00]) getgid() fcntl$getownex(r1, 0x10, &(0x7f0000000f00)) geteuid() setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x0, @empty, 0x4e24, 0x3, 'lc\x00', 0x29, 0x101, 0x1}, 0x2c) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffed7) epoll_create(0x1) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x9013, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) close(0xffffffffffffffff) 13:58:29 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x14}]}, 0x58) 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000e8040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 13:58:29 executing program 3: open(&(0x7f0000000180)='./bus\x00', 0x40, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = accept$inet(0xffffffffffffff9c, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001100), &(0x7f0000000500), &(0x7f0000000540)) getgroups(0x6, &(0x7f0000000580)=[0xee01, 0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0xee00]) getgid() fcntl$getownex(r1, 0x10, &(0x7f0000000f00)) geteuid() setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000140)={0x0, @empty, 0x4e24, 0x3, 'lc\x00', 0x29, 0x101, 0x1}, 0x2c) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r3, 0x208200) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffed7) epoll_create(0x1) r4 = open(&(0x7f0000000780)='./bus\x00', 0x14102e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x9013, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r5, 0x641f) close(0xffffffffffffffff) [ 1696.068821] audit: type=1804 audit(1546351109.831:59): pid=31776 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3541/bus" dev="sda1" ino=17461 res=1 13:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000092060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1696.174032] audit: type=1804 audit(1546351109.831:60): pid=31776 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3541/bus" dev="sda1" ino=17461 res=1 13:58:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) [ 1696.303796] audit: type=1804 audit(1546351109.831:61): pid=31776 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir725690771/syzkaller.5xAFJB/3541/bus" dev="sda1" ino=17461 res=1 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000036040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1696.364182] ISOFS: Unable to identify CD-ROM format. 13:58:30 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x6}]}, 0x58) [ 1696.448078] audit: type=1804 audit(1546351109.971:62): pid=31789 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir156547521/syzkaller.2UMDR3/1452/bus" dev="sda1" ino=17477 res=1 13:58:30 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000042060000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1696.514017] audit: type=1804 audit(1546351109.991:63): pid=31789 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir156547521/syzkaller.2UMDR3/1452/bus" dev="sda1" ino=17477 res=1 [ 1696.536922] audit: type=1804 audit(1546351109.991:64): pid=31789 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir156547521/syzkaller.2UMDR3/1452/bus" dev="sda1" ino=17477 res=1 13:58:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, 0x0) 13:58:30 executing program 0: socket$alg(0x26, 0x5, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x300, 0x0) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x100, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x11f) r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) r1 = dup(r0) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r2) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="657865632075736572757365725b25766d6e6574305af1367f424fa8f2e96d6e657430766d6e6574312b006d4eb1041fab9ed3ab4e508c2ec88fc7a597102b60b80a5ee2606b9eb4c46df38f7244f9a889808b2b4d36023ab8d24d79b9b60d919deab28448aa18b1ab5edc8461a53cd7b84d"], 0x23) sync() r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000080)={r4, 0x29}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000140)=""/138) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) close(r3) 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec4000023000000f9000000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1696.727087] ISOFS: Unable to identify CD-ROM format. 13:58:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004b010000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:30 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x16}]}, 0x58) 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000004d040000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1696.880496] ISOFS: Unable to identify CD-ROM format. 13:58:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 13:58:30 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:30 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3ff, 0x40000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x7, 0x6, 0x4, 0x6358a3381e41e8ad, {r1, r2/1000+10000}, {0x3, 0xc, 0x9, 0x6, 0x7, 0x8, "d462f34c"}, 0x401, 0x3, @offset=0x2, 0x4}) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000032700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:30 executing program 0: socket$alg(0x26, 0x5, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000240)=0x14) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x300, 0x0) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x100, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x11f) r0 = accept4$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000340), 0x80800) r1 = dup(r0) r2 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440), 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r2) write$apparmor_exec(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="657865632075736572757365725b25766d6e6574305af1367f424fa8f2e96d6e657430766d6e6574312b006d4eb1041fab9ed3ab4e508c2ec88fc7a597102b60b80a5ee2606b9eb4c46df38f7244f9a889808b2b4d36023ab8d24d79b9b60d919deab28448aa18b1ab5edc8461a53cd7b84d"], 0x23) sync() r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000080)={r4, 0x29}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000140)=""/138) ioctl$DRM_IOCTL_DROP_MASTER(r3, 0x641f) close(r3) 13:58:30 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002f500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:30 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0xc0045878, &(0x7f0000000080)) 13:58:30 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1697.195969] ISOFS: Unable to identify CD-ROM format. 13:58:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 13:58:31 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1400}]}, 0x58) 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000033100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r1, 0x0, 0x30, 0x3, 0x7}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={r1, 0xff, 0xfffffffffffffeff}, &(0x7f0000000500)=0xc) r3 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) unlinkat(r0, &(0x7f0000000540)='./file0/file0\x00', 0x0) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x800000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0x401}}, {@blksize={'blksize', 0x3d, 0x1600}}, {@default_permissions='default_permissions'}], [{@hash='hash'}, {@subj_type={'subj_type', 0x3d, 'iso9660\x00'}}]}}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={r2, @in={{0x2, 0x4e20, @multicast2}}}, 0x84) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0xc0189436, &(0x7f0000000080)) 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007f800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1697.330640] FAULT_INJECTION: forcing a failure. [ 1697.330640] name failslab, interval 1, probability 0, space 0, times 0 [ 1697.387502] CPU: 1 PID: 31856 Comm: syz-executor0 Not tainted 4.20.0+ #3 [ 1697.394350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1697.403694] Call Trace: [ 1697.403723] dump_stack+0x1db/0x2d0 [ 1697.403748] ? dump_stack_print_info.cold+0x20/0x20 [ 1697.403820] ? key_task_permission+0x3a0/0x3a0 [ 1697.403852] should_fail.cold+0xa/0x15 [ 1697.410068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1697.410090] ? ___might_sleep+0x1e7/0x310 [ 1697.410107] ? arch_local_save_flags+0x50/0x50 [ 1697.410122] ? lookup_user_key+0x306/0x14a0 [ 1697.410156] __should_failslab+0x121/0x190 [ 1697.410173] should_failslab+0x9/0x14 [ 1697.440177] ISOFS: Unable to identify CD-ROM format. [ 1697.441744] __kmalloc_track_caller+0x2d8/0x740 [ 1697.441764] ? strncpy_from_user+0x440/0x440 [ 1697.441778] ? digsig_verify.cold+0x32/0x32 [ 1697.441795] ? strndup_user+0x77/0xd0 [ 1697.441814] memdup_user+0x26/0xb0 [ 1697.441830] strndup_user+0x77/0xd0 [ 1697.479203] keyctl_restrict_keyring+0xf6/0x1d0 [ 1697.483894] ? keyctl_session_to_parent+0xc20/0xc20 [ 1697.488908] ? lockdep_hardirqs_on+0x415/0x5d0 [ 1697.493500] ? __ia32_sys_read+0xb0/0xb0 [ 1697.497570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1697.502945] ? trace_hardirqs_off_caller+0x300/0x300 [ 1697.508100] __x64_sys_keyctl+0x2db/0x420 [ 1697.512262] do_syscall_64+0x1a3/0x800 [ 1697.516171] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1697.521119] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1697.526157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1697.531032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1697.536227] RIP: 0033:0x457ec9 [ 1697.539424] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1697.558347] RSP: 002b:00007f64c1904c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1697.566058] RAX: ffffffffffffffda RBX: 00007f64c1904c90 RCX: 0000000000457ec9 [ 1697.573344] RDX: 0000000020000100 RSI: 000000002a974e48 RDI: 000000000000001d [ 1697.580616] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 13:58:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0xc020660b, &(0x7f0000000080)) [ 1697.587900] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f64c19056d4 [ 1697.595171] R13: 00000000004c37d3 R14: 00000000004d6130 R15: 0000000000000004 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000038900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000140)={0x0, @bt={0x8, 0x800, 0x1, 0x3, 0x9, 0x10000, 0x4, 0x225b, 0x8, 0x4, 0xffffffffffff0172, 0x9, 0x7, 0x3, 0xa, 0x10}}) 13:58:31 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:31 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x300}]}, 0x58) 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x5451, &(0x7f0000000080)) 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002f100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) [ 1697.868061] ISOFS: Unable to identify CD-ROM format. 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000025400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aec9, &(0x7f0000000080)) 13:58:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:31 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xd4302, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000140)={0x3, 0x67, &(0x7f0000000040)="0413afee8beca2009802124ef63413ff124d2b57880be8e6d2b702b1676858aa21156b93cbfae700fbe3ae8dd72fd25a340226d92fb086a470521ffd11277855ec11d440eaf2f56cb9e41b7f94d5c91032e7679dce237a2fca9f526bf514e527481007f82eda6d"}) 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000028300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x40049409, &(0x7f0000000080)) 13:58:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 13:58:31 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x15}]}, 0x58) 13:58:31 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x14, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x5450, &(0x7f0000000080)) 13:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000cc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x5452, &(0x7f0000000080)) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000012c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1698.246802] ISOFS: Unable to identify CD-ROM format. 13:58:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x16, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0) [ 1698.394108] ISOFS: Unable to identify CD-ROM format. 13:58:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000001, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @remote}, 0x0, 0x2, 0x1, 0x1}}, 0x80, &(0x7f0000001640)=[{&(0x7f00000001c0)="77eb73f2b4ac44d0ddf8f45980ccd3164c09d867520f7ef75ae96cfee09d223b2000d3a63f14f64a9ec397a07113ef1dacb78ce39efe70aa60bbf6d463d1b99e997f5f2e02a1cc7437c3070e4c6e0c83e1ca954d7d1aba7f4b234c87b3ee993bc22399f1ff54a66678783bc197d3cde848af8f2f0ba418d30d3b456c50d0f3a3daae784bbd0f44a7af447527017e1b50ff4d5681e622885f08400d19403c574f2da617436b7a14f30dfb4a532714776a4ab2f0ec06de850719989650156903a752c882c2dba5f9fd8c35ca90598499bd4faa81aa0e7784bc791dbb4af9157876003a305c46aa", 0xe6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="2194d7b570a38c306b132c98c22d820dbfca62c77dca2d3d21c2862e1807f69264ab1817847ad312aae0c3d17eb634b4ef21d4888b0fdd8962b598eaf7a30d68654fd0e1763f0a9505c42d19bcf6d6ee8f775ca0d9148ebe112d7fde07d8923c32cdce989601d958cf16c3df103f", 0x6e}, {&(0x7f0000001340)="c7e449387963a5680ec116b46bda3b75fd98923ba4433c2b2035938472a9dbeda818a54e8f02699a87a86bfa9e02020a527a03e8a39ed2717815f342ae24b3dadb4ab0bc28876546b1efebd97e3ae73a097bd4258ba0c4b185301bcc87dcc3809dea59a08f7b459a8a0074d1aa15389d695be4e8b4cd78453cdc1c31ab19d0d5a4c2a76a63252cbf85e2f2b3fa351acdf9c8e51266c373a20fef589129f4b7bbc254b3c825a66107a5e65f7bd5b47163e282cd69b5", 0xb5}, {&(0x7f0000001400)="b0973f41fa96be3857cb166d073463c240dd2335d55c1741fd50cc34a9dd4749b3c6447c4d07204b4013e36b88d0d173656e996d1d9598fe58287fc086c75a70b45e9da2a0b9f681e10a49911baf61454d71c65a5ac173ec769033837dfca4a5f7cdba14fbb1ef70a1200b7cff03a1d44eb675b20ece8352dc58f87b8d8a07f6a6dda9ab69b9f4a33408f5903e6a12442434c64b87348861a3e549b5cdbcf791", 0xa0}, {&(0x7f00000014c0)="c05ecaa058335b709f8eab4baf5ede41047b92ae53b6dddce0bdd9d0579a3ed469931646842494591d0572184f09926062cce28b03db29642f050c1c07b0f64ab368093a281af313b2d463f84633735765acddeb8f69e21ffbb95db23167fc88f7fc245d9e3d57230ed93ff1ab59a97db5d562de542a21359c94605ad21e34d20d14dc775b51c2b7e7364bb22a94c185b2ecbc29b423f68386f7b83be4a0fd31c7f02a5463601fa549eec3e81df6e376a59833", 0xb3}, {&(0x7f0000001580)="f98ec3642d5942091ef07d8f0eb094c0ff1c4361065e593de1c45d2264163e4183974a879408650268736c89fc5dfbaf7d320c094b9c347685e4813da6ebc272cc9ef6699639290703450534c4e94f45ed1dc31873250653aa9b1f9a993f9df1c69715e2cad76ce4f162b3ae567f576c5b2c6ce2267357000539726c952099fe287dfdbcd8e49064fcd50f867fbc664d8ce58cb76a52cef79b", 0x99}], 0x7, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x2080}, 0x24000000) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000021800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x5460, &(0x7f0000000080)) 13:58:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x2, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:32 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x1600000000000000}]}, 0x58) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x2, &(0x7f0000000080)) 13:58:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 13:58:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xe, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x5421, &(0x7f0000000080)) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000062800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1698.642899] ISOFS: Unable to identify CD-ROM format. 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4020940d, &(0x7f0000000080)) [ 1698.911803] ISOFS: Unable to identify CD-ROM format. 13:58:32 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffff, 0x400000) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000140)={'mangle\x00', 0xd6, "80fca6b1fd9b3fc9c39b68db29e89b932536ad1d5f786e7a0a0e880672691aa85d71f81263a9ba90d2e4ff2bf2060757dce3eb507d2633cb3453071ae7019e397f8e0312c1e8b7ceda0fd4df8032928154c7e60e11cde54f209815236199376188a4914d5e2d30af375cd1b6a3457b12315ee361037ba57c3a6a20d72b46b0873fb97c79ddc2bbf144b2be45efdecb8a831d41ba56af7fbb1a40199c6acb9b52c526d876714436681cbb7344168895bc0ee4c35858e683333498800803a298d401b34f8fd332ba819b79c83298d3b5ec95aa15bd5991"}, &(0x7f0000000040)=0xfa) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006a500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 13:58:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xd, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:32 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x110000}]}, 0x58) 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0xc0045878, &(0x7f0000000080)) 13:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005e300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:32 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x2}) 13:58:32 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 13:58:33 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) [ 1699.220318] ISOFS: Unable to identify CD-ROM format. 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000006100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x20000080}) 13:58:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x6, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:33 executing program 1: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000040)=""/66, &(0x7f0000000140)=0x42) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002ab00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x200000000000000}) 13:58:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xebffffff00000000, 0x0) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002de00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x11, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:33 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1200000000000000}]}, 0x58) 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x8000002000000000}) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000046a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1699.603623] ISOFS: Unable to identify CD-ROM format. 13:58:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xc, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x2000000}) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007b600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:33 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="9a2675411dab695bcf846245f50db1676c44aa454542ea126960d9234724cddccf3ab32bf353622cb97fd9f0a3c83b6d3437c04aaa2a55b166f97c8ba85e2d1aa096f4e0af3b1653788327dc27d21ed3e44449d6e9", 0x55, 0x1f}, {&(0x7f0000000080)="bd3376f9fa66e81c598925fb9b169ea6637cbad63e7cc1b920baba3fc930215d87f8deab3259dbc00c289662ad8a", 0x2e, 0x5}, {&(0x7f00000001c0)="e3e36a0b6a003c147e214b170dda34963037598f4adf0dc26afbfcab949872d4690cc6710d6fc20427e5ccbb307e9d969cf540b515345c1f563fe1066150b289c33304e269d2d3ff34e0031734fef06d480d7278753798c5bc2560698309ed69a80ea656cbd1caa1a72e89409d7796fdcf1c7d6b0867ebbfdc088284da30aa46d7c8dd82ebb358bc4e8490b7df2121de10119991272ef5f845e260f44876f148f0aacabadcf056743ab3847b3bb0eebc904e0f817c1652c17f846a62d9f020929b91add7561d3c1e90b850bab966097bf6f348622b2655b766dc6b98d7", 0xdd, 0x4}], 0x0, &(0x7f0000000340)={[{@noacl='noacl'}, {@balloc_test4='block-allocator=test4'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_notest4='block-allocator=notest4'}, {@balloc_notest4='block-allocator=notest4'}], [{@subj_user={'subj_user'}}, {@pcr={'pcr', 0x3d, 0x24}}]}) 13:58:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, 0x0) 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x80000020}) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000011900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x18, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x2}) 13:58:33 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1f000000}]}, 0x58) 13:58:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, 0x0) 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007da00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1700.005541] ISOFS: Unable to identify CD-ROM format. 13:58:33 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x20000080}) 13:58:33 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x19, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000037f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1700.146556] ISOFS: Unable to identify CD-ROM format. 13:58:34 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1000, 0x800) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f0000000140)="e44e6f62d9287e9587c0f9166a94209f4127a7c9d0b8cb1042178aaa2c24fe11136bb7be561216d2037006780edd9b2ebfd1ecd4d0cb7d89b46124ec1318d14bcfb287c41746be7fb7aede545439003ce9fe3f18d12d01678dd9fe066221b0322bd87279494c5eefaf258a0365870fa05639c6c6555c94226f50c6b8d57893fbdd2af9024c76c198e78df718a5804a079037c965f68e01c49b9821fcc8c6c09fec241ab9508a837c3166d1c1799f4846c0fd006662b047fb08a6db7f82149d69b727fe114fc139dd5bcc8bff78ff8aa94868128eff5e47db787f93f3e883637dfee2a194e1655523f1464d037a3c307823ffbd263ee97182ef22471d4d9854872ace7e7d7e53aeb0a1839a97f6cd585fb65b486ac8c144d71fadbb942c083a831cfcfee6469172ebcbfd5653db4e828609f116ea1732d323fa99d3b403e59643e21374c9b8b43688f4b49d396a3563e959a9e71df54fa04ec996bca1bf5035acd081711481ddf37274fc9b022d48ee6b62aa7608163f8d1405e381a959a4691502a7ec50898860768b4123c5edb67cab2fdc1b664a5ae9390e1f25bdd4cae0b38a9a24330e0535578f6d62c2a4f650003d63ba17886d07ee849851909e8222cc21f1a7463d2a8ec9e7bbff97cd06a45549d948dd22615acb0489c184445b607ef2bf595a7ea92801b769d5082e9b08deb8afd05e252f74d6a007980e82fea6935114204fc1d09648d90c5e66ae05e90f4191d8fa74729c11dbc8d852fdd239f037922fb35d400d0aeb39a49b2f6e9ae8eef093b81014d1523f51ecea252657e1ad3b4e501f84ce7ce7f10a45366c3c807d17bcde8daba96e79afd572620cb84738c80bc04673e4270ec3ad2635e0ef77d4774b41cc4ded368afea7c8272b5901d71a68cd1b2c1190840b5c9086f5d329e7ee7bbc1b061115d7b02d37ddbf024b5db6a033ad09d9a0e8ec7479f6d507cab2cab2f6600f6cc2308d73c5e454297bd9afdd0463e75db6140e9cb718ad237806e7b7fca2d14cfd19ad74d5106101827f42db9553e3f94258fca167048e62f0b6bb2450e9806ec499d9659dceee3bf403d26821e8a8aca53c72c912aeca456790517a820008cb9fefb48ce17b4b6fa03740a328bbad4ff7dd67c75151877b825949212e12a41b858a7f2d8c1f92ec98cb8f84741d6637c2988c556726569e7be16a628c399007be9f2f0e58de8af4674ffc953b313c5b4bf21346cb40bb6b6fa38032d4828a4b04d4ca58da2f70640b73d25e91d33f39b833e0528316a9b262f3ee0480ffee4f0c2a58bf5f751c39b63c5bb83371528f06ca75e9986c41a85bf545d496824d57a337a48e34c92b82d74b23de34d45482e0bfcc90a10dd3bf8b264fb8f344f1fb629995b8f55b81c2251ff23841840347d83f3d73628c8c0c315e9ba926f03c1c07627db97632e541ec8bdbee32551fd7fd32fc9c09941eef7858beeaf18ef097313e8e036794d09766583898b8ac8ed2b35bef4c5ae820a1b9797f1dc589167854819feb0cadb2066d41b2a4a0d83ba6d3ef5f875b282771a4489beea9a4923cd8ca319bd765cde9f08f01ba235ccfd9e0cbfd96bd5ec79a35f828f70aadce4d3613ca65449d7aaca202d23390148f95373d79668748c95952fb068b6ea5a491780a1fcb78a96d8b5f9e413e2404cd6b37fd349df6cbb29db7cdf93a46de1ac008b59fe84ba42589e02400051a0967756667e4cac314b8a3564f9764ab81c28a0cdf6794b8cd66d597a58f1dd3205681806ef5263feb2eaaa9149baf544896181f886c7450218ed86ae8ffcf5630cadd05f4d7f7b04b39aff3b73ed24e42c1e2088ba6c1805ebd9ac92835c24ed8eba6ab3fda451b15b7499d4e10353b89f98ceb60d0c45dbbeaa221fc551570a88358d1502206ef9a0fa3bd2965038e2047ff40ac54fc564a631b7477b0bdd6515038794a93434aa2ab347a420a84ba2c286fc99558df1109ce67d1759c50b2b7fdc52a9ddb1cb7cc19fc05ec2401453530151fb76b06851a346224e27f7ba9d4dd672a055f87f1ce48e86cc900ce77b50b8c0a670c8d7b80c019ecb463346b823a66b31cfc6b280610952c6056d488a5556c4a30bfbef93478c41629ad2837eaba7bbded32eaaa627fc9c885aa0f1cc27062abd82d549b5c24e4e705cdcf20a6d79de3947105e191c9eacdafbc9552a4876d14aa820bc0dccd11fb169572a6a2c4a2a1d41b47ce541d49c019e129073fd34d4041f8d0a09dd7dd69908651ba3ed1d1cb29d33251e9c81b00bca57c05adc58bbb4e0a9939d4dcfc2e99179858adf744323c485e91753adc743261a24bc6e88176074dfbd81a39128db2dac23149fedbcab8e2b2c731aa87e1519361dac8305146c989e7c969d3873db790c4da81db04047f3ec62ead8bd9aac0d0291f3b11b5315ba137ecbfb739786e83242a478eec5708fec9eb421bf51214ab6de13acf707a7d824109a2b2b398fe94e6e9173b8ca9c3964607c38dcbbf1db51ccedc7c3385ddb8aa9418eddf6709c4ce14e92ea860e07623204ef9dbb2e03f13ae3b67e053827cbda9071aaa0eceb5d79fba19eed4f8744620797f2460927b40f4682dd0820969d4153529b5ef4f36b44a5dc054bb356737bbcf4781f2043fda995157f15a389d2453e0c23203008cfcaccf8bcb809246bae47384cfb36c6b66da1a8f00cfd8fec9bc4e0f0304a9f5af7a376d94c1514c68108f64d7609de7154c2ad5ea3c9a7d3f6eb1d4cb833766030a5d2101a269d07881d90c91b0a3bb1ee421801cb1597c941191c900515b7da67b70738a00c59febd998f4327b82f23e5053b65881afe810d2b9aaec6bae655d25dffffa0e559a390e229eb79fbc00da1c1a2d5a4315c91c613c25b2ad3f995ff1ac43a639e564aa79dd015aa867d73b83207539106c6df1a4e067e68f1614ab95e8a11afd50eea5c4b99d470b65a33d7cf426631e93b76e7b993d954e0ebbb32bafe4ebbdb4f4133694fff13b995f5277bbbf6c2ce98a0393dfb42f87bfd3608071ee3a86cb3d7fb61dca8fe1c095dea1343da075039e0696b2847fe649df11099fbc31d4eb1fcc1dda97d01de5d3fcee4e85add5b922ed06e86dcd67e7eea2541efca01310cdce2936cdd58829b36cb1cfe9dc50ac020a4d5ed53b2ac73c13ccdc65b259f9b80d0a4b6d3d32b2fdc96d64f2ea914dc1770613ab81e4564524874f2e81106362af427c418c3dfe0f3f26553046c4973c64a3e1a9dc6f3080db5bf81f31da82dbf8c9ed15cf727d69b99a02627502da1c5169301679c92c8c0282120ccd420e365934bfd67afb3a83f6e565581b987f91f748766c35469f4c8c55b781d027b5dabe310964fdb3042a8a8fa7e369c8765f882c247367fbff68743ca663204ca20dab518cbb670fc6d2829be85242bd0388e786d1c7d95e97973598ba231298e94abe8015d7e4126189d37a366f3e3b3dbf350247908720549a1e59afa241e33cf0ddbd4e695fd2a7c288f3ac0f56d8b13421afeb69d1d51426603b3c9a696f9666e77dd22e89a8952d172d5cdc358b57c3745c194f72e728627801daf8b33cdeb6d1076aea0c1ecc6c924f5c3a6a1c8ea3d0611648c4c3a402199d4857d3b09410be3db073597f2a4f65fcdc14d08b5617ed8992ed662af024e4290e8c623ba1c6f6ea5d6391fcbc6adc55396a8e7d2a1e0913dfac42286098a9d5e55f677132b99f19e72e0cf2467a68a78212c5e5f1d13cfa57bb113d4c631b36d34e1c4f2d20d8662d7f1ccfd23bec94b2df738cba94b28bb9734a7d2472686a3d024f92aba84da02418d33e01d41429bf1e41a65058c557beab26f3cd15b5835e212df32f51f6ca0238cb207fa612d9191bcf2a6d4084bd727df01ea50742f9e1e796221630eb3e7a7b4b926bf3c79578dd0f6c0d9dfd9a015114d287a736b6ea8db121ab24e14ff4ea6c57bb2451c78688cd6d5eccbcb9743851f30d6ec0b04bfd4d7be95dcc072febd0ee7710b4e98725a77fb29f5d1c13eb9d21bc3e1b42628f6dc943632138f7d01f1928b992481cf91eb0fc19cc0995de47e741e0f22c84ba7bf2dfd96186546be94138a0bffe062b23feae975d81c3c39e3c7321d660c6b4ed48c1e99b2910262e8fa605fe1e994950f66c7f89097ca648495bd5bdfea17f2182c314c97262346e85011b57cdc3599acf23a3f1c40d5a5e738b8e29ccab8f46f6800e8acebcbc5f2a1d57a45c66c8eaa452b87d1a3e6934ca89f3e3b83c3968723819921178d98db7f127a32a4b24a599abfdb7bc0653d9e22aa08b82b88b75f9b7cc1e1271e663765c5b226d2629c8efe1e02728df7b0ac0f2d97e016ac76b0a5e3c8a0a23d40af9b595626dc0a2d6ffb00a0cb87100c0e414d84bf184f0943ee69a1c2f4a9d93334fd36c781e981ac58db8bf3b8769b7487ca0ba6c40d036fd66cd2137f4a1fd1453d32f4e66efd60a95af3b77ce192f8d43523d0856dadbb80e6cd50df51d43c98cd91eb375963f435fae732e1677511eb38b2f0daafb84f2bd6369e66c0ea204b4372bf76930fd4ba1cc27a91ea45ccf1eaaf03d2d2acacd88c3bdd8f21a4ca5edf336abdf707537c8bd08e18acefaab8d398e78ab821817c42b1eaa9a5a38060675879597b0c62307eba54b84c357b2295992e12d9ab65142f89edcd5d992dbb73ec94ba0fa31c5527c24dcbe98d9318b11de808e541cf840d7aa2961aa9b896704b2971d39f2d94ae2f9fc8814f3b001f88f445556c5ec309b498633bc922bd7dc6ec4ce945da2dce3341e815f701adb86895605d0b9c6e96e07b325f4c1726cce6841f50e3d94c92387966f45950b8314847b4bb46ac06762b66a639e07a69df83bc52dfe5a8e576c89e9f8923fff08a81b8042e36083a681e76bfe36917ad845d34b06c9ab810c896cffc5b3f5e3e5a664b0b1e522dc2502537b1407e5956fdea9f76851297865e545809b9157c0c7c454fc60ccb9362163e61908b85da1b18c5727c1fb7984974d349a51e2a493dcc4742915b8328a37d15d077ff34958cd8127553ac76adaf433bcac36334d1d69e00b75dae7f1b1d4dd4be0991dc2f788306e444978f86fb0bef2e8929575257d4bbdeed185ac2bf2ddf472d516cbe4d8a423da68faf070e9e85750da0d9fbccb635e274f448e146efbf6a605e5d6cc76fdf3b07fcebf9aa61097e62e2fb5b44bebcfd20860189cd1542eaa6a7a3f4aa0e582441e22b41aca741a286b23821c7fe9e9c0b6c23c4028749cd4868cc68ed2742039195da8ed3b66bc6fd5b67e0d1a93b2141b3cc6124f2dc160a0c3c849b715f5cb9f88efb88b61792195449529e7ade6ffd1440937e53af33a9ede5be399e577c993a00f18e59591fc905ad6112ce099022346ee36e70034a0a8f3e758cb08bbdd591204d3565e7a7bacdcc26803bebe54800595f29eb20bafc682d83b11a08ceae64f1eba6eddbed5af93c9503017a819c76190bc9ace698c43ca9c7b9a04e1549e97a9b316972878352cc8f43d6a8650751e4c326988c42c296de856fb95aeff21800ae09193d8b53edf1662de547d82049bc600725039f891cab91db9fd82ed0bfb3a637fca50b6be5d2a40423029d79be30ee4b614fb4ee4fe4f5af9edaeb754136419245c931e33f7a7a1155cca2609d223915c4219e2639729ebdc82d4a72259d19035d6c330a635ce4b5e3b90417f0a49571a42cbdcbf9deb3321237214fd2bd361a46e24ebcdddde638bb466baadf423b69acc01903321d4ae56002c9fcbcfc7fac05400fa549ed7cd", &(0x7f0000001140)=""/184}, 0x18) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000056200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1b, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x200000000000000}) 13:58:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) 13:58:34 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x58) 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x8000002000000000}) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004b200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1c, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1700.427204] ISOFS: Unable to identify CD-ROM format. 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x2000000}) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000025700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x80000020}) 13:58:34 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) 13:58:34 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x58) 13:58:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 13:58:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x12, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000044400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002db00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1700.759202] ISOFS: Unable to identify CD-ROM format. 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) 13:58:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x9, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:34 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x11000000}]}, 0x58) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000028b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1700.930340] ISOFS: Unable to identify CD-ROM format. 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 13:58:34 executing program 1: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffff1a, 0x0, 0x20002000, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) r0 = getuid() r1 = getgid() lremovexattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='security.apparmor\x00') chown(&(0x7f0000000180)='./file0\x00', r0, r1) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000200)) 13:58:34 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004d00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:34 executing program 1: prctl$PR_GET_FP_MODE(0x2e) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005b200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1400}]}, 0x58) 13:58:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x7, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000030e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1701.366154] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000057800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0x0}) 13:58:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x13, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000d700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0x371d, 0x3, 0x4, &(0x7f0000ffd000/0x1000)=nil, 0xfffffffffffffffe}) 13:58:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 13:58:35 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1400000000000000}]}, 0x58) 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) r2 = add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)="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", 0x1000, 0x0) r3 = request_key(&(0x7f0000001480)='logon\x00', &(0x7f0000001400)={'syz', 0x2}, &(0x7f00000012c0)='/\x04\xc0card#\x00\x90\xba\x97\xa8}\xc1\xd3\x93\x88zx\x1a].\x83\xc19\xff^D/\x83\xf0\xb5\x98\xf5>i\xdcj\xfe\xaf.\x7f\xf4\x03\xfd\xa9\x90\x1fR,\x82-\xa7&\xf5(\x90&\x8al\xefN7NT\x14{ \xe9\x94r\xe9,\xf2\xb1\x02\xacT\xe9\x113\x1e\xc4q\xfee\xa2+$\xf2\xab\xe3\xf7oo}\xe4\x11\x81\x17O\xf2)\xc6`\xc7IP(\xf2\x88\xfd\x04O\xda\xbb\x86:.m\x04\x90R\xb7\xf8VC\x18\x93\xc6\x03\xf8fA\xddft\x15\xe6\xa0\x15\xd1k\xc62\xc7%\x1a\xc5Eq\v\x12\x1a\xdc\x91r\x00\x00\x00\x00lIm,\xad !R\x14\x01n\xeb\xc5\xb0jP_\xe4oE\"\x9dn\x99\xa5u\xb8\r\xfc\xc0\xdf,\x04:\x821\x82\xf0>\xb6\xa8xohgW\x0f\x12\x8f\xed\x16\xc4]\xa6\xc8\xed[\xb6\xcc\xc64\x96m\xbd\f7\xc3\xd3<\x91p', r2) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)='nodevppp1lo\x00', r3) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xe2, "8ca3ed28740a546a7035f244862c4a3f448951409ff64f8eb50cd95ffb0f60caeae2c219fe52cae2164865934ac5a028201076891a691a17ff84502257c5791464ba9be316e3a0083c0b6d51a573772e945289fd7ee0853b732f183804ab8ec7a744f2f1fe508a966d551cd7061e5cb0aea8faddd1da15f085e3fe1252bcae4a75218a7dd590d9e653a930133cfd285eabe56c68ea247a9ac806ea9361812f16f8dccd023298fbf1f5d08a3acabf12bf5296e0486cd2f3a2865ae9cb2fdfa412c933c2e8eb9b2af4e60b689f0f409853d3898f0d5b066eaf32cf91222a7572a4ff35"}, &(0x7f00000013c0)=0xea) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000001440)=@sack_info={r4, 0x5, 0x6}, 0xc) 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000fc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x10, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1701.707166] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r1, 0x0, 0xf, &(0x7f0000000040)='/dev/dri/card#\x00'}, 0x30) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000001c0)={r1, r0, 0x5}) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f0000000000)={0x10000, 0x6, 0x7a, 0x2800000000, 0xc, 0x7ff}) 13:58:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfb020000, 0x0) 13:58:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x8, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000037200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x40) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) [ 1701.880301] ISOFS: Unable to identify CD-ROM format. 13:58:35 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001b600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x6}]}, 0x58) 13:58:35 executing program 3: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000200)={0x0, @bt={0x8, 0x6, 0x0, 0x2, 0x800, 0x3, 0x5, 0x80000000, 0x4, 0x40, 0x9, 0x5, 0x1f, 0x7fffffff, 0x4, 0x2}}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8006020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r3, 0x0, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40000000000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xcc5a}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, 0x0) 13:58:35 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x15, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000fe00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:35 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x35, 0x4) r1 = dup2(r0, r0) accept$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f00000000c0)={0x4, 0x1, @stop_pts=0x89}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000049a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) mount(&(0x7f0000000180)=@sg0='/dev/sg0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x40020, &(0x7f0000000240)='/dev/dri/card#\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7fff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0xfff, 0x4d}, &(0x7f0000000140)=0x8) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000080)) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000280)={0x1, 0x0, [{0x60c, 0x0, 0x99c}]}) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r2, 0x5, 0x1, 0x401}, &(0x7f0000000300)=0x10) 13:58:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x3, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1702.234605] ISOFS: Unable to identify CD-ROM format. 13:58:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1702.382883] ISOFS: Unable to identify CD-ROM format. 13:58:36 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0a5c2d023c126285718070") socket$inet6(0xa, 0x80003, 0x800000000000006) r1 = socket$netlink(0x10, 0x3, 0x4) poll(&(0x7f00000000c0)=[{r1, 0x2001}], 0x1, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x15, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5"]}, 0x48}}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200100, 0x0) ioctl$CAPI_GET_PROFILE(r2, 0xc0404309, &(0x7f0000000040)=0x6) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:36 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1500000000000000}]}, 0x58) 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000ab00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0xff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={r2, r3, 0x5f21}) write$FUSE_WRITE(r1, &(0x7f0000000140)={0x18, 0x0, 0x1, {0x8000}}, 0x18) 13:58:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 13:58:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x0, 0x208000) r1 = dup2(r0, r0) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64IPIN\x00', &(0x7f0000000040)='/dev/dri/card#\x00', 0xf, 0x2) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000001c0)) getsockname$packet(r1, &(0x7f00000000c0), &(0x7f0000000140)=0xff12) 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000040a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xf, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) write$selinux_attr(r1, &(0x7f0000000040)='/usr/sbin/cups-browsed\x00', 0x17) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f00000002c0)={0x3f, 0x8, 0x3, 0x0, &(0x7f00000000c0), 0xc2, &(0x7f0000000140)=""/194, 0x53, &(0x7f0000000240)=""/83}) [ 1702.781130] ISOFS: Unable to identify CD-ROM format. 13:58:36 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) 13:58:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 13:58:36 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004e000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4900, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x5, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001f300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 13:58:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:36 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x17, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000060300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:36 executing program 1: 13:58:36 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x110000}]}, 0x58) 13:58:36 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x902, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r1, 0x7, 0x800000000000001, 0xfff, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0xb111abfa7e7a890}, 0x20) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 13:58:37 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x3, 0x0) 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003e700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x3}) 13:58:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='.ncrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000a800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) [ 1703.398196] ISOFS: Unable to identify CD-ROM format. 13:58:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x3, {0x80, 0x3, 0x100, 0x2597}}) 13:58:37 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x14000000}]}, 0x58) 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005a200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypt.d\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:37 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000540)={r4}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82000, 0x0) [ 1703.540659] ISOFS: Unable to identify CD-ROM format. 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007bd00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x80, 0x0, 0x0, 0x800000, 0x0) 13:58:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 13:58:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002ad00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000069c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:37 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x3000000}]}, 0x58) 13:58:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="000086dd03800800090051f70200aaaaaaaaaabbaaaaaaaaaabb8100290008004a1f005900670003048890787f0000017f00000101940600000004890df6fca02a376800a599cd4100000c00ebff0000000000000000000100004e050000002400000001000000040000000400005836c431598c4d53000000"], 0x79) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000300)={0x8, 0x120, 0xfa00, {0x3, {0x1f, 0x1, "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", 0xcd, 0xfffffffffffffff7, 0x80, 0x5, 0x3, 0xf7, 0x80000001, 0x1}, r2}}, 0x128) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000001c0)={r3, 0xa, &(0x7f0000000040)=[0xffff, 0x7fff, 0x5, 0x9a, 0x7, 0x1ff, 0x10001, 0x81, 0x5399, 0xcb], &(0x7f00000000c0)=[0x7, 0x600000000, 0x6, 0x15a, 0x111, 0x7fff, 0x6], 0x2, 0x2, 0x2, &(0x7f0000000140)=[0x5, 0x5], &(0x7f0000000180)=[0x5]}) 13:58:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001e500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1703.898507] ISOFS: Unable to identify CD-ROM format. 13:58:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x0, 0xf6a9}) 13:58:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000064d00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1704.038780] ISOFS: Unable to identify CD-ROM format. 13:58:37 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x8, 0x80000) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@md5={0x1, "0912a5783fffef4b852de7885334b940"}, 0x11, 0x2) mkdir(&(0x7f0000000140)='./file1\x00', 0x20) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:37 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) prlimit64(r2, 0x0, &(0x7f0000000140)={0x1, 0x203}, &(0x7f00000000c0)) 13:58:37 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:37 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x12000000}]}, 0x58) 13:58:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000019000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000040)) 13:58:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, 0x0) 13:58:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\xff', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:38 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x400040) ioctl(r0, 0x7, &(0x7f0000000140)="6dcde82d9d28ebbae9a08b2409dea233821fefce3f843caedf1882541c6398a2e6d2cffffb1689c45fe5b1a68bb1282bb28432ea381d98876b1d9ac9e86430d9f7a1d7981694bc8b08a78a6ea450b35c89f00bf9a0c23016468398b76725c2c8cbacdb93debbc6b8b3cad2ec9c45aba8d5c64b1315d8148e5c51bfa862c7466756fe674210cea76beaeb18e0aaa391d657aa2da86281223b1e3ebe41a9c30b8c27343448") r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000004a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1704.431241] ISOFS: Unable to identify CD-ROM format. 13:58:38 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x16}]}, 0x58) 13:58:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:38 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1100001, 0x0) 13:58:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) 13:58:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x8, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0x0, r0, 0x0, 0x5, &(0x7f0000000300)='user\x00'}, 0x30) fcntl$getown(r3, 0x9) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000500)=0x0) recvmsg(r2, &(0x7f0000000280)={&(0x7f0000000540)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000700)=""/138, 0x8a}, {&(0x7f00000007c0)=""/111, 0x6f}, {&(0x7f0000000840)=""/243, 0xf3}, {&(0x7f0000000940)=""/166, 0xa6}], 0x4}, 0x12100) sched_setscheduler(r4, 0x400000000000002, &(0x7f0000000200)=0x80) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r5 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4000000203, &(0x7f0000000240)=0x0) io_cancel(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x4, r3, &(0x7f0000000340)="df5d65e0b3f5f79d3c7041c8cb7dbdf7e969d7a849a7743f1772992e845518f3abfa8d5c74626bf466af954b249513e90fca7a4db987183faf27e1fbb469de8ac6a87ef19060ca42121ce7dde3d763eaf838a2bfa616d2dab82a712f22032c401c985b96f065329ded83c2f37865da857277c52d", 0x74, 0x8, 0x0, 0x1, 0xffffffffffffff9c}, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) r7 = add_key$user(0x0, &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000600)="f95e0139fa7af261f6ed534b45e15c3b90ef064a30515b8a92ddccfb83d9a7ea9cf8730f0bb5a208f067a3fc5fe3861130fe9653824b2a8a9dceed203d10ba3d991192c9fe9135f23e9caa900c617cbcfe040f3d52ff6aeb96", 0x59, 0xfffffffffffffffe) keyctl$update(0x2, r7, &(0x7f0000000680)="74d1f36114c27a1ed317970050e154f41c8d673f680ff5934c080a163d9ac030b66f7239e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bda4654a", 0x75) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f0000000140)=0x2c7) dup2(0xffffffffffffffff, 0xffffffffffffffff) fdatasync(0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0xffffffffffffffff) r9 = dup2(r8, r8) ioctl(r9, 0x81, &(0x7f0000000000)="a5325eb541008cf151935f325c3b0c243cf51d731ee9fa1cee025976506adf73c13ca9c2062097bf542624ef454add0a4593fdf1adde59ff99b416673c3b05977f477a105cb30a4f53be36f650e7cd9913985f8c5f16f7d209358861483bd7ce4924bb318120212c9a03d746a3879f19b3c45f431bf998591d0a58bd72130b77") ioctl$KVM_DIRTY_TLB(r9, 0x4010aeaa, &(0x7f0000000080)) 13:58:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004d100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x02', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:38 executing program 1: syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000340)="b0a9905f46eaf7b144403039162e8ff5", 0x10) r1 = open(&(0x7f0000000280)='./file0\x00', 0x200000, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x3) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000002c0)=0x6f9f45c0, 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="c00000001257f1d82af5e42d2cce60a85e24e4b48b9b05cd9611bdbbf63d49b2e48097db5ea3424eb904000000850ef132884353a87ac302009d7b5fad0c19ff70e0e7aa5be7c9ccd70b29aa", @ANYRES16=r3, @ANYBLOB="010026bd7000ffdbdf250e00000008000600990700001c00020008000500020000000800060001010000080002004e2000003c0001000c0007000a000000380000000800020000000000080004004e21000014000300ff02000000000000000000000000000108000b007369700008000400f8ffffff4400020008000400010000800800040020000000080003000400000008000700060000000800070017000000080006000400000008000600da00000008000400ffffff7f"], 0xc0}, 0x1, 0x0, 0x0, 0x4040000}, 0x4004000) prctl$PR_SET_UNALIGN(0x6, 0xffffffffffffffff) 13:58:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000017600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) 13:58:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:38 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1f00}]}, 0x58) 13:58:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000029100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1704.963803] ISOFS: Unable to identify CD-ROM format. 13:58:38 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) [ 1705.148348] ISOFS: Unable to identify CD-ROM format. 13:58:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001e200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:39 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x210080) 13:58:39 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@l2={0x1f, 0x4, {0x2, 0x1, 0x80000001, 0x4, 0x7, 0x5}, 0x7, 0xfffffffffffff0b5}, 0x80) truncate(&(0x7f0000000080)='./file0\x00', 0x4) 13:58:39 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x58) 13:58:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/d.v/usbmon#\x00') 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001ab00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 13:58:39 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000051400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1705.474619] ISOFS: Unable to identify CD-ROM format. 13:58:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x02') 13:58:39 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000140)={{0x3, 0x1, 0x9, 0x3}, 0xb3, 0x0, 'id0\x00', 'timer1\x00', 0x0, 0x3ff, 0xc1dd, 0x5, 0x8000}) dup2(r0, r0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x42000, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x7, 0x100, 0x2, {0xffffffffffff0000, 0xfffffffffffffc01, 0x80000000, 0x5}}) 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006d800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:39 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1500}]}, 0x58) 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000070800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1705.686552] ISOFS: Unable to identify CD-ROM format. 13:58:39 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) mount$bpf(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000280)='bpf\x00', 0x2000, &(0x7f0000001c80)=ANY=[@ANYBLOB='measure,uid>', @ANYRESDEC=r0, @ANYBLOB="2c617564697436636f6e7465668b6e1108c267c6c2c8f4bff8490465645f752c00"]) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="7275706600003be746eb9928853c354ad31cae7c484c4476e02b9aa665a5eb752419df23aea61cc762a24ac3dd1f76557d9c7a7cec07aef0142ad2838a9d20661ecb5128ccfc7e148e8ee406958785fc1309be3c96aea332681a9af2dd65b30ac7657a9b0877c37d6b7a8136aa98b65337b09251248ca64eb59c217a0c77bc851a00b5229c7c007d106c329f8349dfde7867d0f69d6b87301ef77a9620d977cd8f9c89430620517d352d85a603b3a72e4a5a0fe4efed9b04f5d9cee05db8c3fbfaba6e88d07c52fc023ea77216dbe2795f2734f442"]) r1 = openat(0xffffffffffffffff, &(0x7f0000001c00)='./file0\x00', 0x200000, 0x50) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000001c40)) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x81, 0x8, &(0x7f0000001a40)=[{&(0x7f0000000480)="8d0a2892953435490926a5271f48a72476ec995c2a0e87a73e3071a2ae8b43058a899f00bf1eadb9bf63d8bd9fecfda75eb751b321dfc835eaf6b9d49a39c3b613e1740f994a93168b3bb8785e41cb6df4f168987e78700a734444dd660b9a74ac4e0638e64ab3e9c785ed0168b31b62a05dee54860d0c8b89263a66d4397b8ba4777e4e2ecbd8da459b2160e82205f212a6ec29ca74f77ee2052899ff7f7ff0400c58ac24495e4943602e09b46d6340081793395c05c2188be1adb5a441ebff8745", 0xc2, 0x941}, {&(0x7f0000000580)="ad569b60a20cd3cc36890c2ae015cef285952cb5ee4798dee0a128de236175184d0b23e20054526e5085e2660c919fd9c3c885fba59c948aa82f7f36c968fdbc374e27f49d91eee9234dd8556ec8ab96700a4a2d60668d4af4b0e6e72568cedf962abe825621444f0994d617439513858de10351475b00511561731ea5244a24dfaa015a2ec316454e3e9121527381a31186c707a23ec48547fac1bc4fea246f780c713f5f217320170af959058fe8904c2c913bd8f5da8bce03f91339793b653957c419ac0a9506df", 0xc9, 0x1000}, {&(0x7f0000000680)="350fb14e3d9accfddc1119d4e38d4d0a46e46bdc14cf6fa1b5d9ca7a0bc7bf07a513d35a3b20dfabba5f3a06ed2572295b30b257288cc254d79a9d7a701f384f60c6ddb379066cb9d2eb09597d9ee82301b4e50d3e1275007aa0acb2fdff5c542c74603681d7155439899457ebaebdb2b620ff9a75626a05e74231c3226c4507cb79f1a0cf965c3928bbceceefdf8ab231c6d7b5e4a1d88295ed7dadeeca37ce4e9c3bcdd21517d3423e845c1a6bc2bc6a059d999c8a81b1b837030b041a32f96d8e655655ac7984879b47f79aa1ebb8ab3df43c9bef93cea1ffecc18dd2fbbb11fbc9ff22", 0xe5, 0x9}, {&(0x7f0000000780)="4d877c49d3eff22aa8fc6a9739e40af24ed59ffc0dd7fa20192f50735a45d3eb894b8bf8522a001ae7bb123d084f555eb24999e87ef3337214fb1a228a7c5eb87b747adb694570c2afc22eec364386756cc15eedb500a730a556589a2f1c35beda59423d41726dcadc437a6338b4f131f37d1e671441c03dba625cd44abe01dabcb26dbf95358bf470dedcd76dc56a420c90f0a8b23d66783fd467214af584a38cd0c2e1686d86c56c051f696409d09dc07575b768200e6f94c5430161b84ef3c63bd65ab14ff18d3c229bf93a4ed02335de3348b70fa1322345b900e881", 0xde, 0x4}, {&(0x7f0000000880)="0a20534079f951d9f663f28d0bab35e60ba382868f9f7ab6c767baa023fdba3d681c0d4f2cc715dc074ed063da69809b1b4af37bbe5ddeb5de0854172d80a0573c9a1165686de294acb8548e9ad15200f569c49f2eb6d3f9573a79cd2b560b27de14a6922c05137c900b4648c7a00b17423a4b4d7dc5270070bdc2daa6192206610a3d3685991232622c2208073e774cf2c1aa64a94156745289d4bf4187654c801dd50d290411ad14390ca17cb912d3698fc715508a9637a7cb58677fba4cd964958e0501293ebbe870f4c3c51f23a84621ffcbd8bff2546d624d3ca899766b4e2d4d820ac5bda20d6b4cf22290", 0xee, 0x8e6}, {&(0x7f0000000980)="cea6bbd2f390ea69b7aa16948d4ba1431945c26d0c4333d3e0abefea9db3220ca8c453d218bedcfcbdc188245f12346833745585d8f24c577835ef2367ff09546064683b2696d48538b4e77efd701515b8ea0c6e4927ee2fbc93f0bedfedf47ddba353f67a537d90f53104b333fd58d3e618c74cc9e66806f0de37d9d1f0c9cc396f58", 0x83, 0x6a18}, {&(0x7f0000000a40)="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", 0x1000, 0x7}, {&(0x7f0000000340)="f16f6c6d4a97b07e6d4f0ca38de409c4dbc34be6e764851fe876e194ffccd088e9fc1dec50b3c355e68f210a5143bf62", 0x30, 0x7}], 0x41000, &(0x7f0000001b00)={[{@commit={'commit', 0x3d, 0xc849}}, {@nodiscard='nodiscard'}, {@lockproto_nolock='lockproto=lock_nolock'}, {@nobarrier='nobarrier'}, {@localcaching='localcaching'}, {@locktable={'locktable', 0x3d, 'wlan0'}}, {@nosuiddir='nosuiddir'}, {@spectator='spectator'}, {@statfs_percent={'statfs_percent', 0x3d, 0x8}}, {@ignore_local_fs='ignore_local_fs'}], [{@uid_eq={'uid', 0x3d, r0}}]}) 13:58:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:39 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000640)=""/131, 0x83}, {&(0x7f0000000700)=""/247, 0xf7}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000800)=""/49, 0x31}, {&(0x7f0000000840)=""/167, 0xa7}, {&(0x7f0000000900)=""/160, 0xa0}, {&(0x7f00000009c0)=""/237, 0xed}, {&(0x7f0000000ac0)=""/32, 0x20}, {&(0x7f0000000b00)=""/97, 0x61}, {&(0x7f0000000b80)=""/71, 0x47}, {&(0x7f0000000c00)=""/249, 0xf9}, {&(0x7f0000000d00)=""/125, 0x7d}], 0x9, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000005c0)=0x397) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x10001, 0x1}, {0x5, 0x5}], r2}, 0x18, 0x1) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f00000001c0)={"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"}) r4 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000600)={0x0, 0x2}) 13:58:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, 0x0) 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:39 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "c25bda5ac7ae64cb2dd9997e8bba8740"}, 0x11, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200) syslog(0x2, &(0x7f00000001c0)=""/105, 0x69) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) dup2(r0, r0) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) 13:58:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000020900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1705.964440] ISOFS: Unable to identify CD-ROM format. 13:58:39 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1600}]}, 0x58) 13:58:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 13:58:39 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) syncfs(r0) r1 = dup2(r0, r0) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xffff, 0x202000) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:39 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1706.124299] ISOFS: Unable to identify CD-ROM format. 13:58:40 executing program 1: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x84) sendto$rose(r0, &(0x7f0000000300)="ceea60f75861721040cc66400f80c52c61917bb09d4d6ec36856db1e8b5882cbd70d85a2a320ecdd0ebc130a131055b2f2fa7962031052772e36d25315d93b6b4a4a4eac94284c3e09354ef3c21a456de832eec48971c88d10fbc67b036a2592adb37f4c54aa525285fc54d5e766e4d522eee05c8ec425acc1d6828ae92592906e78c933c5276588a40a42", 0x8b, 0x800, &(0x7f00000003c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="34000000ee73df2c2d14f2654a3313ad19c35d823f0c3579b5c35fa13096d006df8aac", @ANYRES16=r2, @ANYBLOB="04082abd7000f9dbdf250500000008000100000000001c00050029000000000000000c0006080100000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x400c1}, 0x40) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001d800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x100) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000140)={0xe8, 0x8, 0x6, 0x34b9, 0x18, 0x9}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x1) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000), 0x4) 13:58:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000049600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000000c0)={0x40002000, 0xfc}) ioctl$KDSKBLED(r1, 0x4b65, 0x3) 13:58:40 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x58) 13:58:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffffffffded, 0x0, 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x1000, 0x1) 13:58:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:40 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xf21, 0x20580) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000140)={0x4, 0x4, 0x3, 0x7, 0x13, 0x400, 0x1, 0x6, 0x1, 0x3}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x400, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x24b0}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20048801}, 0x4004000) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20000, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000040)={0x14, 0x13, 0x1, {0x0, 0x3, 0x6}}, 0x14) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup2(r3, r3) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000180)={0x0, 0xfffffffffffffffc}) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000006c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1706.516893] ISOFS: Unable to identify CD-ROM format. 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7, 0x200) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000140)={0x800, 0x97, 0x7, {0x7, @pix_mp={0x8320, 0x4, 0x20343059, 0x9, 0xf, [{0x0, 0x1}, {0x1, 0x7a}, {0x8000, 0x8}, {0x19c9, 0x5}, {0x0, 0xbaf3}, {0x1, 0x6}, {0x0, 0x2}, {0x8, 0x80000001}], 0xfff, 0x1, 0x8, 0x1, 0x7}}}) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000300)={0xba0000, 0x3, 0x9b, [], &(0x7f00000002c0)={0x9909db, 0x80000000, [], @p_u16=&(0x7f0000000040)=0x48}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000340)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) sendto$packet(r2, &(0x7f0000000240)="e2bfec3efbee9dcbc4e5278430536c89074a521058b0f9d0790d1c21d8fcfbea1087e202c49732ac155324a2230a94c132e5379e195db1c19364fc81764096dc7e419914f7dcefbcd1eb3d295b0a7b8bd00fe3b0299353e1ec3720ecf88eacd098fe99", 0x63, 0x4000, &(0x7f0000000440)={0x11, 0x1b, r3, 0x1, 0x401, 0x6, @local}, 0x14) r4 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000740)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8100000}, 0xc, &(0x7f0000000700)={&(0x7f0000000500)={0x1d8, r4, 0x810, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x75b9}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x81}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2880}}}]}}, {{0x8, 0x1, r3}, {0xc0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffff}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}]}, 0x1d8}, 0x1, 0x0, 0x0, 0xc001}, 0x0) [ 1706.657912] ISOFS: Unable to identify CD-ROM format. 13:58:40 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "c25bda5ac7ae64cb2dd9997e8bba8740"}, 0x11, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200) syslog(0x2, &(0x7f00000001c0)=""/105, 0x69) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) dup2(r0, r0) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) 13:58:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0xc0402) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000240)=0x10) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000200)={0x1, 0x0, {0x2, 0x26, 0x14, 0xb, 0x5, 0x100000000, 0x1, 0x13e, 0xffffffffffffffff}}) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f00000000c0)) 13:58:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\xff') 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000072300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000140)={0xffffffffffffff9c}) r1 = accept$alg(r0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x40, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x109003, 0x0) poll(&(0x7f0000000040)=[{r2, 0x1000}], 0x1, 0x0) tee(r0, r1, 0x5, 0x2) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup2(r3, r3) bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @reserved}, 0x10) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000080)) rt_sigpending(&(0x7f0000000180), 0x8) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004cd00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x14}]}, 0x58) 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:40 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "c25bda5ac7ae64cb2dd9997e8bba8740"}, 0x11, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200) syslog(0x2, &(0x7f00000001c0)=""/105, 0x69) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) dup2(r0, r0) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) 13:58:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f00000000c0)=0x3, 0x4) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000047e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "c25bda5ac7ae64cb2dd9997e8bba8740"}, 0x11, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200) syslog(0x2, &(0x7f00000001c0)=""/105, 0x69) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) dup2(r0, r0) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) setsockopt$llc_int(r1, 0x10c, 0xf, &(0x7f00000000c0)=0x7ff, 0x4) r3 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000140)={0x3e, 0xb4, r2, 0x0, r3, 0x0, 0xfff, 0x3f}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) 13:58:40 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000280)={0x6}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getgid() r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x40, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0xb776, @mcast1, 0x1f}}, 0x0, 0x3, 0x0, "f0a47c6a136dc75f8802eede3c0f27eae73190c60fb2ad2df92369336af677f23e94069e4307e0f3aca349b89139067abba2452b8b7b51fe4982abebddf3629a8f4eecc664572bccbf331637f6e11b86"}, 0xd8) 13:58:40 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1100}]}, 0x58) 13:58:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000072c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:40 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "c25bda5ac7ae64cb2dd9997e8bba8740"}, 0x11, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200) syslog(0x2, &(0x7f00000001c0)=""/105, 0x69) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) dup2(r0, r0) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x7) 13:58:40 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000000)=0x9, 0x4) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000240)={[{0x7, 0x6, 0x1, 0xfffffffffffffff9, 0x3, 0x2fae, 0x64, 0x60d, 0x1, 0x7, 0x6964, 0x8001, 0x3}, {0x8, 0xfffffffffffffff8, 0x4, 0x7, 0x4, 0x6, 0x2, 0x2, 0x1f, 0x7, 0x1, 0x80000001, 0x7ff}, {0x6, 0x7, 0x33, 0x3, 0x5, 0xe0000000000000, 0x2, 0x9, 0x7e, 0x1f, 0x80000000, 0x3, 0x3}], 0x720}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) flock(r0, 0xd) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000140)="cca33b98c22d7964bd4519e8ee446531b60c2f86d6d94aa1791978288e24ccd4f7ba057c7336f3146d34ce42ee7c94fc7d04787cee11dba66226d289d92b730d6b2975c4f4634f9346a2d65edc71bb428468ccaf48589f073e4c51b17e32ad0723bf73b7535d543b645c7d77764db92798bc2d12f371fad43b8741c90a52b99b78eb6c36f4c3b3450d927aaa460321e2e5d47c3531d6c43f7414f86f9ae373fdf8e9994da1eaa8530f9e0f9574ca7314b4380eeb7951d183082ee124c5796de1cce46cd78c2f8f6cce37817f6f") 13:58:41 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffff9c}) setsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f0000000280)=0x1, 0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000300)) r2 = accept$ax25(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1) recvfrom$ax25(r2, &(0x7f0000000100)=""/153, 0x99, 0x10000, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000340)={0x8001008, 0x6}) 13:58:41 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x2, 0x0) r1 = dup2(r0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x23fb0b45, 0x6bb}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x9, 0x200, 0x6, 0x5, r2}, &(0x7f0000000240)=0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003db00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0xb, 0x800) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0x5, 0x80000000, 0x6, 0x2}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x40}, &(0x7f00000000c0)=0x8) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000001c0)=0x1, 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={r1, 0x8000, 0x80000001, 0x802000000000000}, &(0x7f0000000180)=0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000002c0)='/dev/dri/card#\x00'}, 0x30) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x7, 0x800, 0x4, 0x9, 0x0, 0xffff, 0x4008, 0x8, 0x101, 0x1, 0x6, 0x5, 0x4, 0x3093, 0xfc0000000000, 0x8000, 0x20, 0x20, 0x7, 0xdc, 0x5, 0x80000000, 0x0, 0x7394, 0x101, 0x5, 0x80, 0x7, 0x0, 0x3, 0x8000, 0x9, 0x10001, 0x12f0, 0x6, 0xfd6, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000100), 0x2}, 0x810, 0xfa0, 0x542, 0x3, 0x6, 0xc4, 0x9}, r2, 0x2, 0xffffffffffffffff, 0x2) 13:58:41 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000540)={r4}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82000, 0x0) 13:58:41 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept(r0, &(0x7f0000000180)=@un=@abs, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000000)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002f800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x300000000000000}]}, 0x58) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x4}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x401}, &(0x7f0000000140)=0x8) 13:58:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clock_settime(0x1, &(0x7f0000000000)={0x0, 0x1c9c380}) 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002cc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e22, @local}}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmcn#\x00') 13:58:41 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000540)={r4}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82000, 0x0) 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000002c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x10, 0x1800) 13:58:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007cc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x688080) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x6, 0xfffffffffffff000}, {0x0, 0x3}, 0x4, 0x4, 0x7fffffff}) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:41 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10000, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d72646d612c706f72743d3078303030346532302c6163636573733d636c69656e742c74696d656f75743d3078303030303030303030303030383030312c73713d3078303030303030303030303030303030332c7375626a5f757365723dce7b2c736d61636b66736465663d2f6465762f7573626d6f6e23002c7569643e000000000000000000", @ANYRESDEC=r0, @ANYBLOB=',smackfshat=syz,audit,func=KEXEC_KERNEL_CHECK,\x00']) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:41 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x16000000}]}, 0x58) 13:58:41 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000540)={r4}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x82000, 0x0) 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002c000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) personality(0x410008d) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:41 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x101400) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 13:58:41 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$mice(&(0x7f00000006c0)='/dev/input/mice\x00', 0x0, 0x1) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000700)=""/229) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x42) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x96, 0x7, @scatter={0x0, 0x0, &(0x7f00000001c0)}, &(0x7f0000000200)="b8b5532f4fcf71195693993e4760beb1892ce87040d3a8c890099b4b1a37cde57a66f34d4ea2b019bdccc52d45365e3970610da05349e91707a479a57116bb871e47fe762749e07a5a6c639f7e99c3b68ae46c47e67f87d33a670301e906383a05c840f99168d0d360e6ad2a2ef2d6a0c7ab7686f061849d69862b152d8da2481646b07423d3cb61c5dea74f3bb238f0176bb8f17dda", &(0x7f00000002c0)=""/239, 0x6, 0x23, 0xffffffffffffffff, &(0x7f00000003c0)}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r4, 0x30d, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x4040805) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x14502) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000040)={0xf, 0xc00802, "1da696f62ef6e75b24b77501f9d0ae10fda822a02482d7e6", {0x1c, 0x2}, 0x3}) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e21, @multicast1}, 0xfffffffffffffe79) r6 = fcntl$getown(r3, 0x9) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x100000001, 0x100000001, 0x3, 0x1, 0x0, 0x3ff, 0x1080, 0x5, 0x7, 0x7, 0x6, 0x3, 0xac, 0x7, 0x0, 0x6c1, 0x6, 0x5f5, 0x8, 0x0, 0x7, 0x1, 0x1ff, 0xbae, 0x1, 0x8000, 0x6, 0x709, 0xfffffffffffffffb, 0x6, 0x9, 0x963, 0x8, 0x76, 0x6, 0x6, 0x0, 0x3, 0x6, @perf_config_ext={0xfffffffffffffffa, 0x7}, 0x4, 0x57, 0x0, 0x3, 0x3, 0x40, 0x8}, r6, 0x6, r0, 0x8) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000600)) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007b800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x2, 0x3, 0x6}) 13:58:41 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000540)={r4}) 13:58:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x300, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x80, @remote, 0x3}}, [0x0, 0x6, 0x15, 0x5, 0x676dd6f9, 0x7, 0xfffffffffffffffe, 0x4, 0x31, 0x5, 0x410, 0x1, 0x3f, 0x86c, 0x8]}, &(0x7f0000000200)=0x100) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000580)={{0x2, 0x3, 0x0, 0x0, '\x00', 0x6}, 0x3, 0x0, 0x0, r2, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x9, 0x3]}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = openat$cgroup_ro(r1, &(0x7f0000000880)='cpuacct.stat\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) futimesat(r4, &(0x7f00000006c0)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x7, 0x401}, 0x0, 0x3, 0x3f, r3, 0x3, 0x8, 'syz1\x00', &(0x7f0000000140)=['overlay\x00', 'vmnet1^\'cgroup%posix_acl_access\\{\x84\x00', '/dev/ptmx\x00'], 0x35, [], [0x0, 0x0, 0xffffffffffff7fff, 0x1]}) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[{@flushoncommit='flushoncommit'}, {@ssd_spread='ssd_spread'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<'}}]}) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a6"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000780)) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000180), 0x6, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x0, 0x5, 0x81}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xf0ffffffffffff) getegid() getuid() 13:58:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:41 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x6000000}]}, 0x58) 13:58:41 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000140)={0x1, 0x0, {0x2, 0x3, 0x5, 0x1, 0xafa}}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)={0x4}) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000040b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x20000) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000200)=0x4, 0x4) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f0000000180)) epoll_create1(0x80000) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x7fff, 0x9, 0x36546db4, 0xfffffffffffffffb, 0x800, 0x2, 0x8000, 0x5, 0x5, 0x3a, 0x2, 0x4, 0x1f}, {0xffffffff, 0x443, 0x32, 0x0, 0x0, 0x9, 0x3ff, 0x8000, 0x7, 0x200, 0x2, 0x100000000, 0x80}, {0xfff, 0x9, 0x55, 0x400, 0x400, 0x6, 0xfffffffffffffffc, 0x5f1, 0xbe8, 0xe302, 0xe24, 0x8, 0x3f}], 0x3}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000580)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)={r3}) [ 1708.348125] overlayfs: failed to resolve './file1': -2 13:58:42 executing program 3: ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000080)) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0xbc5) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000031200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1708.460445] ntfs: (device loop2): parse_options(): Unrecognized mount option cpuacct.stat. 13:58:42 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x58) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000015e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x280800) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000040)=0x81000) [ 1708.768405] overlayfs: workdir and upperdir must reside under the same mount 13:58:42 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 13:58:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x40200) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) socket$inet(0x2, 0x80003, 0x7) 13:58:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000000200)="abb9cd3a50a2796a31a45f6a486d6fc95d5e46130df246b4584ef05684786a0c58e1f3afa34a56e4cae69c8b288d80e7cc1a383802ead8cbef0f5bdf45aef933d92b86b8af7d3fd0dc08a126bc9e825a5fabf39940c057dbbb3807ba35a6c3383374bc7b8c9758dc54abe305957e133264400c1e599ec08c073c88cbebc01248b9ab2a843444176076f224632cddf738b80ae58af65f9cab6cd61ea4", 0x9c, 0xfffffffffffffff8}, {&(0x7f00000002c0)="3619dff5e5470a80199d01c5e219a13a9cd4594cd94b5946ebc6e473796ef3516d91890f542cba55f38d1426458b296aebc7edf0d97f9da5150fbc1006f2c5d7ae711b1ba00895835adab34d7da4244071254a850e8b90023987edd1ca830cfdb5b1b1cc60428940849758504c3516e4f55138c1919e26d29af6b10efb01cf3d8bca3f4b28aeed7ec13be7ba4c123e860b8309b5900fbc93aea397b5842cdc9d32b21cd6749962a84f1775d3f1a27dfaee07515b9bed6ceaccc2f1e3be565852e7c7839c04d52b52", 0xc8, 0x3}, {&(0x7f00000003c0)="2a4854808a0dc82a2cb86eaca9ba84df51533fabb1f3b4204f3c946def78e56e5727301b", 0x24, 0x6}], 0x801000, &(0x7f0000000480)={[{@i_version='i_version'}, {@sysvgroups='sysvgroups'}, {@bsdgroups='bsdgroups'}], [{@smackfsroot={'smackfsroot', 0x3d, 'nodevppp0-'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux%]-vboxnet0'}}]}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002ae00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000700)='/dev/dlm-monitor\x00', 0x20040, 0x0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000740)) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000200)=""/198, 0xc6}, {&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000380)=""/252, 0xfc}, {&(0x7f0000000480)=""/164, 0xa4}], 0x5, &(0x7f00000005c0)=""/179, 0xb3}, 0x2000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000006c0)="2913ff28e493b804cb75c3e9427f816b", 0x10) 13:58:42 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x15}]}, 0x58) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:42 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)='keyring\x00'}, 0x30) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x20000, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x30d, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0xec3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0xab, 0x0, 0x0, 0x2, 0x7}, 0x0, 0x0, r1, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x10001}, &(0x7f0000000200)=0x8) add_key(&(0x7f00000002c0)='cifs.idmap\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="6e5ffb42f8f06aa5fa100251d8888734b0ae37dfeb135dfa627968d386763a33c22692adfb40064953a2002c023fa34b070d52bae1fe55f583e2c9e49082e3fcefb9a6290c05e4ca59ac526ebd719860b6d23051076a59e325635b4a50d986079d341f3bded8a88cc17f6f91403606278f343329cc6670a6bbe50d639f9cdb2d675adf35612f9dc90917c522238e65b68dda016a5b9e45e920164d133dc460a88e234d5e7f7d72272432db90bf66eeac07d11d25c2e0294509a690024f937c27f5b31049e250f40024c3419e4b0e5fda6f7541e10c7d728e2ef144c86c301e01a279963f1caa21de045a622c1fa8", 0xee, r2) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=r3, 0x4) 13:58:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)) 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000001700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x2}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000040)={0xbf, r1, 0x0, 0x9}) r2 = dup2(r0, r0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc0000, 0x0) execveat(r0, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='vboxnet0\'$:\x00'], &(0x7f0000000200)=[&(0x7f00000001c0)='\x00'], 0x100) 13:58:42 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000180)=0x80) accept4$bt_l2cap(r0, &(0x7f00000001c0), &(0x7f0000000200)=0xe, 0x80800) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000ae00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:42 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) 13:58:42 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x3f, 0x0) readahead(r0, 0x10001, 0x3) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x80000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x1}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e22, 0x1f, @mcast1, 0x7fffffff}}}, 0x84) r3 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r4 = dup2(r3, r3) bind$bt_l2cap(r4, &(0x7f0000000040)={0x1f, 0x200, {0x6, 0x4, 0x1f, 0x81, 0x3ff, 0xffffffffffffff71}, 0xffffffffffffffff, 0x4}, 0xe) getsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000080)) 13:58:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x40, 0x7f, 0x3, 0x7}]}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x28, &(0x7f0000000180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x3f, 0x8}, 0xc) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000035f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x3c, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x243}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9b}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) 13:58:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$null(0xffffffffffffff9c, 0xfffffffffffffffe, 0x80000, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000000)) recvfrom$unix(r1, &(0x7f0000000180)=""/201, 0xc9, 0x40, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e22}, 0x6e) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003d00)='/dev/mixer\x00', 0x100000008000, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000001280)={0x9, 0x0, "9c2ffbc1eeb79b62d95cf820cf52014c585db2f24aebdbdb", {0x0, 0x8}, 0x4}) clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000001340)={{r1, r2/1000+30000}, {0x0, 0x2710}}) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000001200)=[{&(0x7f0000000100)="7e22d27397cd61c842d215672d02104b1a8cbcde8898b61d40a923210f5cf856b88b97b4096aafa17dfc24cd6ac8cb907b9c74b04b7d6d657bed9eb705d07fda1ae2f3193cb6b9ab57a535cccceca0d4a451583727b514bda53bf67edb027c6d51663261ddb320e20fd389", 0x6b, 0x5}, {&(0x7f0000000180)="9c7ac3c8556b4babf5f5b38e4baed017801439b648e85c37ee442d2e141bdeb990f07c33465ff4ec2ab9bb3f9e2a2275614807a1caf424153493cef10d11a3fc02c48e67ad53b9adb632a3482f66596cf62555c7a701a34e6ee84d9acd5dd17ab3b40f1950aa2961093ddc2929", 0x6d, 0xfff}, {&(0x7f0000000200)="4b5d8fd4ba613fe67a16ba5ea14830a619ee869ed841107006b79cdc7d6cfcbb8dc81f339a131320000623d435bb7737a9a467b602b912651417816cac8e6626e3d628e754d6c29945bd08f79e642c8a9da02cfe7e6911dee068247e2572432af4566f0d4c668920398e80297fafcf571918b6552bea251fcc55ba18488bfede632f5c428c89b3c3690f204d24e51f9df05e834ee80ea4c2e3871a62744c6ecb6cae06d19d4d10ce7379c8a55246423923927bc2232770888952790b2d9b7641aefa8c3dd8e04986bd07dda95f2f6e3715d86f0ac54fcff9ebafbec6db8588a770dcf442c290e2c61ca111315bfb62c7475b778136d87ea2ea0b6b5be942fca9e85bb666f912094afa13054e2a48e6bda60a942a374a79a47143f1a63b1cfe0f24d0c7d7dc9a8f2d72c27424c96b6e695fe8f5b6f58ba2e0591ae87a692fcc2674b8c73b3f33fbf417280078b99580e0a7e82c9c9301e6ddaa50a0ff17b28b5cbe17c17423ececea4ef5cd6b78d2ccc0b3264b5f70d3d207420c0218f6e07811292e80e3583c363fab883442b1fea83f8786516b9f84e06c4e01c32ab7d3879d99152cee16b49f205f583866e0e1b2eab80b660ca11d272ab06792045b0cf299df585f47aec4fb14dae18aa0c141581c7ca479673f554e9aedf068ba5c7f117d0a9f528f5f49d27766872a828e30f0d45365d2a7d10d3eb3de9cb54ae7a3e3beff369fa5b04bf35c5c7bfbe78e2fa1f195131471a5973d2cbf5b5c0ceff43c0bd3da9e621c445c1da174077f0de870b8bddb026b200b00e99a68e7caec716c12b7cdd14350c3e9735a0ccef794bad9f6887ef6a4656996adb37ccb6e19b3c3cc3e37bde6fdd2e860f465ae41484859a54b45b69ab6335cf2a2ead24ad7758d5989d35ae57383f4d20d66e137d46e1822b691e5829d6aa14a572df5e1d017258c16b06ea541611e252956f9628fe45e243dc513aa572892808884d75ed8240ba7402818b3722b3e61b9319012b42a630bb295ae8b32d4e3c86a94fad32bc020bc4cd8e705f1f318b8aa0e3d8ca07c1c02db8dee3b9e040cb6fe81ea9fcffdfb5c82593770f4e1dbb22ca64208912adc07517bf8c2cc21d37dafd587298305704feb2250ed52ee1efa339c04bb3c5d2b52e343e463b2eb3d47cd603ae3059690e095b11dc4fb02d21d8aab9942c54e39b36e2f4f081bcf65d37ec667b7399063c2513ee4f0b66fb391c0b9caf6b6ff716ad6d262f43177775aa4e50be95e47577d75121d93344560ceb5160f9bb546deec427e894f7115644eecf6e04b67a0948dda7dcc25b6995fb87357a5ae7651f8cd74424c01a7273ec975ca5610141b411d3bff3937974313e17555ef4f30a4e4bfcd8c8789874432816ebb4987f22d3c8c3a327906c768148f509ed6abd2d400a8439d44868ad16067b96d38f4602719b617077c04ef3d246b0e37e7ca8082e7b467e965d98e1c0c8b19beab9d1483c4bc60b0c2a786c836ae5e3976486bdc22edf464899042a1890beb9c57613b4dda36f236d244ad8462a4cff7e2c913f56ae3456858eed13ab5b0b93ff581e5a90d39e90dd4ff530f2bc24f7aaef6e7db82f8d565b08a88f49c72ec1dc5b9ebf20b444474347e388e9418ceac6519d2ceff1458777d3d9f352efa379ce0fb0c215995b913c2da125a88be5abbed740540961c0bd122328e4d4612353ec6bf623a1d360431294ad38f88332e240c9f586dc08c63f299ef6af436b5cc47a0c7c5bdfe6d932771fb0d7b1740e84ff31df60b4ff21d1fb5177168b26bbc467fa7c3f7601658b14386e7a9f689bdb2cfc8d9bf4b577b2ab2d32d82bdacefe695bfef8c2928dc809cd804cd7dc5bcaad060c7778e76520e3bf57c6990a042590ca1098b996ec6db6a7b845b5933192829f8dd584fb6c4e0717048b93a6025b996b1c70f52ed3c7dd84cd0acece157fb4786acc2b05eb4e2cfa121278cdb97d7a332fc582b6e1a26530279a6efcf0ff1d901161645ee8729d8e76976d56279098f6aaf63ae95c5763c79407252b9a6d0dea64a46d5c7c4081bdda9782e0785c27327056803e85bf0c2d9a141de07cbff357cbfd3a4f40866255ac14be92c193a0e6ae6b0eb369e8086cd35cbc2ebcbdbe2560ea4aa40ec1d77e31071c90436c89a5abe8a982a6fea446bb0d02125c362f5f6f8bbc4d558a5b2eaae26726c5414c3e4e31add8756b4614a1740643202df36c664d34cf6b4640a231d374eec810632c38d0403c9a8cb15025d90f8e13f1904de760934dc0c0a62f54ce4c212a1521d891ff70e66bd40e461ae6d2549980d841733aec4bad7a2566769dd3806a003995c0a707f100e778a566957d5eb140d1f0f0e1e451fd2a4b796a302b2da6c6752154ff14d37245a6e866bcb1ba5595bd2a2601a46f4fd1e650db3f5220cf99b52c44f577fbfd599086fedd53b7e8134b95a028861d84d0b7a4acd3db3cb2491b8206fca18e9693de55ee95664b8d87e54e138e6c544ae1cbe250264c6f987acd7ef78683a6354aef7893e993024bf243da09a54a7a3fb921cd2b8f6e256648921573016f2c90682ef867a3659a19060b31c52a4a6407aefa3cc3e4df53079a3a7fb846341df1e265f179f3478373b742428cedcf621e85de2866b10fcb527bfc0c8d5d61f8c8e5090499e436e80c5711af6496b4e8991701312e46b1a152f2dcd73a45dd7a13b737a5b34e7a3f5b0716361d399e6d11f4a6c06bff9f7174421af289aa88d0bfb3d203bf1fd36cc02955f306e9fa7111796cbb73fa62c415ff00d99b2b2088271d66b36baa0d77a074122fe8700b633a2a53a2a967ab1d2552566b5b22df67cffa10df3f1bc0dc2bdfe93cf37b4b99f1341244ed5bfb8ddc168e90444e77b8bbaea95fe97551d6dca665322354d2fff6c708ca1026da0b5e7324c43099e3c0294be6bbd1497fdad559a06e12bd40bfa2f2cddb1d2646372dc9eca9acc3dda45c100bdd9980139c10b5cf9b5a02ea42efc950970886938afffd6cee2b26706660b2dc992568c36bf171cb5b9839aab7832413b3e6f11afc2958855fe1126f3a43ef3ba2b52489d1df565f43147f1538b054596989283d324fbe234f065d7628e9d354cca97b8da373049002532ce859a155d326c20b410d81e201f7f277d056552fcf8792465efc44ee3084148766ddf25c83dd413f3a6777da19d2c6e0611c5ab2cfba3816b66c5e0753475d4f84dc921b637b1f6a39679291014e2c084ecddfa81c8901af0641238940a4a1e8adb79a91ff749f4ba6116081c2ba279b50c059875df7a773deb22e9a08d4ecb6a778a0d0e0838fac763223e0eba76ac43bd7438148bc607361c3bf1307f0380918289617f25c03d5ffac06ee34b711dda91f8ddf41f4809b88df8d33d7669375a0b02f82700828938e29b493974e5d07563b2fa21c8b574c9b23f2249a4a7a2b8666d94e2c0f878487816c09c61789589d172b1655c36cc0bba0f98200b03cd5bf84bec7fbbb7db936d01f6f112d6fc515b13eaa6a7d0af8e35d549391769ea760697d5660edce43e7b1ff21b57ad9e1f17a853a02372bbb6e857e9e10271c554d7310f1733bb9c7883abe7909ecf1d6103480641f228af2d6f980f8940828167960374c53808364631c303462dbdfc270d4d4f1456b2eacb3468572b1bb2a330e9afaad29f75f5281041484f553f7cc2e7762c1b02f9f4088a2021d2ddf12b65e3d1b65d636085c013dea3db34c3eafb1d3d73f77ebd155accc527c10581be4dd9fe686a9621b5aa6d742b1f817f07745c9fc063e5141a86e63835501a9fbadb7093dfd7d29a1ad73c8fdeede371e57dfd286d51bb58f9b10a8473b95101a639b8ce07bbd5e49f05babae56702bd6bd4c10479b61212441253851eabab9570a8ca8d5525e416e15f51ca5e9e37288fde1b458a90916124825b7085e64d9f9ef2ab1dedea38b6f58edae43a1ed2674828e374665ce2ca7476afb4f5e7b6d09ea3fb19a639ae12ddbf068eb92f0868ff87cde8006c3e5d6d260b7fa70c8776346a0732158de869a59043b209f55889b9b5f594dba67620e15beef1b67cc52937ca8b092c63cdf99d8b81b43035b49e761743dd527eed7d51e9d24c72ae25534ec574c65d6b4172777671d5e252647f36cb52717448e50d5fa1cd5715b86e4dea7efe6aaec99ce0dc7da92546f0c6c7e3784fa9a86a9edad036132dbf5ef0630368065fa89312f8b8f4727967be2a6fdc383296c32704df9d2dfe8df85cd0391876d7ba2c79389c4b27ae9dbe92907b0bd35bc4af1dda59e0949e73130346dae0f64baf284a8909aa9d991c0ce65fe22970645c824a2005c1af9d730445229fc34174d0f42114bd5de278a6a507bdb322fab7e6c04d095da012954fc7d098f3df061ea24e0e49239ce845fe9bffb925954b125ad339ffa41f8de82d930c661edd91e604ac0e6112996406d581554ce28b3b13924a1f8c7c270c23913d70b836050c1bb7a28b8624c483add6929f6c227b5b12c4dbb31e2b3eacdfc800fd0408af207afd4414bdda356fe215a76af8eb10d2f52b85b0c391e8679dcaf724e1f22cc64906060bcb239ae314b708f422da5f20a57a572650275384ba9a3a6d40e9bcb5379b005948b98a0aa129ad79dcd8ad7415981e118e5223315fe4eed9314a567c673a9c82b7f5311c247d61f7742c58de1eb901e3a383bbb4210cd55de8051ce13e6c18582ebf0b7b6a83da06038d748445ed86073358d0b1679651519d2e5bec870c0ba464ebbcf1dcf3eefff827d1fa4ca933df706ea5f858cae5e99e5817406900440ceff533fa72224b6673ae46c1064c608ed9d5894919fbbd3825ea858755b9cbf831693c2d9bdcc046d9b7bed2f41b24e0e8f44bd00254e21915a08c828e2851c41cc3bc825ee9be5886bebda4b456a3ba359e35246099926c942fb69bdb228e53aa601c6a1ccd00acc257096fa39c85f3891d0d6c3086662e4870a0d4e702e69999c79dc4599cec9fed77b50f27abe3e566a85b5862b6e11cc7c656acdec361baf26bcfcc57a6d4b5a114c3a6250fa53b5c882b4549e3db515a78945f3dc64c13dc5b782e2d89ca00ccc43d4e7701931c38cbec090962dfab401b034c3f7266bfa47e7f7e4e2628e2cca802b6b1372ae6fe44805b65f0f735dad91e1daa74f4bde91a0b3e1465b144cbc7c87c9deb4a6411b1a5d16e76686d0637f0ba91fa6e744c36b702efbe037aeb47e43c6d1507d556d27bd17c62ad5839b8bedd75432a6d0485dc90cf9e539b3fabeb9fdc616151683c51a4aff2f52477644fa3a9606505cdcf033cf9e2eedf4f206bc92e25411acfd26c40fc5a3eb8e3c863242645270b184da0bb42c226d250c3cbb398c2b504c5d7737c8d5a99f1a79c97300d6cbfa0c09c173e6e0921d908d7984cd76474244bdbd26d964fcab5a7cddb0cad2b1b705ff66c40fc52d8fd2cba993ada95ed9d3a2fe032c868f70be9897a74e9785adcd6c2d68e33b7dcbc83ed9019e45d84f512c7b0df623c005a2d232569f14db9e1db3060a4d8c7e76b6132b73dd6ab579740a4cf2d4ae9c2994ae8a907e8b64479231d2d0f54487d6bfa7abc35a71802a2cd1ce71f984110a0a947336c4979ba6bc013c358c46b62a5800bb30a86a9229adca97d355bb487f2f357ec549f206e51469c37c3c7fa5869d2bd2555f00aef3eda57191c38b71b14c9d5a7c182f91e72830cff071dbca0186fa19b583f4b2610ff631ea31025dc3c72dc455adbea87d2c8815ad2654bb320af64414c86b0", 0x1000, 0x5}], 0x110484, &(0x7f0000001440)=ANY=[@ANYBLOB="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"]) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000001680)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@mcast2}}, &(0x7f0000001780)=0xe8) r4 = getuid() syz_mount_image$jfs(&(0x7f00000012c0)='jfs\x00', &(0x7f0000001380)='./file0\x00', 0x2, 0xaaaaaaaaaaaa8fe, &(0x7f0000001400)=[{&(0x7f00000013c0), 0x0, 0x4}, {&(0x7f0000001600)="ddee041dc442e8aa53f8f59c2a904bdd5f6b7177daa99a7e360a9ab8210393f1fac4ffe991bf81f0c915aeeae03d9b11d138cb3a2aa6ae28945c10cac48c75b8abbacb4789", 0x45, 0x7}], 0x0, &(0x7f00000017c0)={[{@quota='quota'}, {@nodiscard='nodiscard'}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@uid_gt={'uid>', r4}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'root'}}, {@subj_type={'subj_type'}}, {@measure='measure'}]}) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000013c0)={0x40, 0x2, 0xffffffffffff5842, 0x2}) syz_mount_image$hfs(&(0x7f0000001840)='hfs\x00', &(0x7f0000001880)='./file0\x00', 0x200, 0xa, &(0x7f0000003d40)=[{&(0x7f00000018c0)="84cc381401a8b9c3666cf6e17523609f57a12fa7f92299f493f8b36dc825864c74bfceed4ba5d0f832a15e8809ee350ee1b78021c9ba7cbba4ad5c9b1c1170465ef306c6aa906ff9eb171e6c7b65056061a35774d99f23a4e63ba7a37e3658ac940d94692d6603706e648f15c463ed000265", 0x72, 0xd01}, {&(0x7f0000001940)="5612052a4a50994cbad2a69cc170163b720d531bae14410d2999f047d9710d6a7cf46e238f2943561162e272da6b031032326a1e0e8d75e7cd2dc37d16d0fc094e645993b1415ff1aed6fd27d7a124f51b13bd425a88fe5a15847b4ce3974c5ea06c8f76b558455dd3f5981a2b300121fd57d73d4030238ca37f9589d1b7ceae50708a296db7d2e1c26ed94d", 0x8c, 0x20}, {&(0x7f0000001a00)="1e3091be40c4581e55bae7581f3a774bb0cd339067f4c5f2063fd0bec7939b3ba71c242834b6b64023d2868a7925120cea8e93c97a3e91ed1f0b03df587434029f78696f47bf6abbd9cfbace55c2fe8131f658c131fcd6963026827eccc67307239f8af9b66e5a135631feaba9e72605bc2384fcea892ddea0dbf340c9e7b8468b7a26cf4618838ac58dda7d5ab8a714a4b16c", 0x93, 0x81}, {&(0x7f0000001ac0)="1673a52e2ae1655aa453dc37d95595cfb3233433", 0x14, 0x9}, {&(0x7f0000001b00)="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", 0x1000, 0x80000000}, {&(0x7f0000002b00)="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", 0x1000}, {&(0x7f0000003b00)="8527daa83e094536a6780bb951651f4ecc39da956542d6493ff3390b9becf1b2e9d9dd1552bb12a7909d76a5e2db393294c28f7886beb4e2289259e2eef382690fe2e65f01787fabc7a2123354030730f943c7e3e38f42d3f9645abd96d65e697a", 0x61, 0xfffff00000000000}, {&(0x7f0000003b80)="af531104a590618edf5e9f4846550149d1f2c46decb0e0bac53c1c1e73405f0e5abedb4619f31a38b72f8c4ff7fad2f231678821a45aaae173568c5446781c24bd5604e76d1402cd4416b9", 0x4b, 0xe168}, {&(0x7f0000003c00)="4994c4c78b0cff6dba7c1ac5e2ca4209a25566142e515db456d878d4180464ba18bd54aa0b43d606dc6b4cf5a19133c0abcb11689835e9e2671ea6bba0e6edde38b6503a513af884f4ce92fe720b2a6c54daf82fc0e07943f5f0e521d748dc58d0e4e72a918779316f36d149b781722a1dbaa0131ca093f3132e8f0f1ce139b6734e4662d6fbef5df089fadeb0e4f1f187760cd30aec8abd13b2a7d3d508ab588e9b689526af8965ec7de9ca9d9ed5109bd05a3494c0743c94ec985cb30f3df2fdfb11056ab8bd68fe57da2344bf3ae88fda40238999c2fa333d565536b9d4a433feb949db1ca3324f1cdc1845", 0xed, 0x8}, {&(0x7f0000003d00), 0x0, 0x80}], 0x100000, &(0x7f0000004100)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r4, @ANYBLOB="2c66696c655f756d61736b3d30303030303030303030303030303030303030303030322c747970653d5a08ac522c63726561746f723d3f230f3a2c756d61736b3d30303030303030303030303030303030303030303030312c71756965742c756d61736b3d30303030303030303030303030303030303030303231342c696f636861727365743d63703836322c7569643d", @ANYRESHEX=r3, @ANYBLOB=',umask=00000000000040000000000,obj_role=,context=staff_u,smackfsfloor=root,euid>', @ANYRESDEC=r3, @ANYBLOB="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"]) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)={0x8001, 0xd2b6}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000c400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:43 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x58) 13:58:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x7b, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10000000, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xd92f) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004f500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000200)=""/117) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000180)={0x6, 0x1, @raw_data=[0x0, 0x10000, 0xff, 0x5, 0x1, 0x9, 0xc284, 0x3, 0xfffffffffffffff8, 0x1, 0x3, 0x7fff, 0x800, 0x81, 0xa1e3, 0x7]}) 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000040)={0x80000000, "9fa29d18dac15ded1cacab4488d5273ac31d545be552ef892515f7ebad126e6d", 0x3, 0x1}) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000bc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1709.848311] jfs: Unrecognized mount option "no" or missing value 13:58:43 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8080, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/229) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000000c0)={0x6, 'syz0\x00\x00\x00 \x00'}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x40000, 0x0) 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 0: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000003c0)=&(0x7f0000000380)={&(0x7f0000000180), 0x0, &(0x7f0000000340)}, &(0x7f0000000400)=0x18) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000300)={0x0, 0x5, 0x10, 0x1, 0xee7fbd2000000000}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e21, 0x1, @empty, 0x4}}, 0x6, 0x6}, &(0x7f00000002c0)=0x90) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r2, 0x4010ae74, &(0x7f0000000040)={0x400, 0x300000000, 0x8001}) 13:58:43 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x600000000000000}]}, 0x58) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) fcntl$addseals(r1, 0x409, 0x9) fsetxattr(r0, &(0x7f0000000040)=@known='system.advise\x00', &(0x7f00000000c0)='/dev/dri/card#\x00', 0xf, 0x2) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000000)={0x5, 0x2, 0x4}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)={r2, 0x80000000, 0x5, [0x5, 0x6, 0x2, 0xfffffffffffffff8, 0x4]}, 0x12) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000046800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:43 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x6a, "00d93d3a11f9740d54dd5b036ddd7a0e11613cb4f57f837f81374a055679529837426fba87af9259943c65a765ff62590248a49645f6f602cd1f46c1fd2bce487732195a3f392d816c2edb4f4e471df0b37d7a5ac2dbdf02d4bf92841f8107976b3ca9b0a44d6ae76521"}, &(0x7f00000000c0)=0x72) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000140)={r3, 0x77, "cf332041c907d52be80e004062519475039bb470a948b75302f86160a58ebe1d489bda5650e38a484bc496a6937291f3b57c5ca742921ab6c907fcf6a7a319734902b903fa9dbd17ec3aac59dd35b77bf29d6ddc5580561666bf6301efe0b491c3355de2d6c66bf6f1f91dc353e6f29449199989903a02"}, &(0x7f00000001c0)=0x7f) 13:58:43 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000001100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:43 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000040)={0x3, r1}) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="738a7479000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x58) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000001c0)={@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000e400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x58) 13:58:44 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x21fb, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x800, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0xe, {0x3, 0xaae, 0x6e17a246, 0x9}}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003a700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x8, 0x3, 0x3) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000000)={0x5, 0xff}) 13:58:44 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x80000000, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000180)={0x0, 0x8, 0x4, &(0x7f0000000040)=0x577}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$FICLONE(r0, 0x40049409, r0) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001eb00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:44 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x15000000}]}, 0x58) 13:58:44 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000180)=0x80) r3 = gettid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0xffffffffffffffff) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = gettid() r10 = geteuid() r11 = getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000b00)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000c40)=0xe8) getgroups(0x4, &(0x7f0000000c80)=[0xee01, 0xee01, 0xee00, 0xee01]) fcntl$getownex(r0, 0x10, &(0x7f0000000cc0)={0x0, 0x0}) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) r17 = getegid() r18 = getpgrp(0x0) getresuid(&(0x7f0000000dc0)=0x0, &(0x7f0000000e00), &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000001080)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000240)="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", 0xfb}, {&(0x7f0000000340)="b964a0fc8ae0f43e638ff10f5ee804b54aea6b6cb98d2fc608d72aeeef9f057104cacb07a99cfab9cddfb8e34d6466c52d9d6433a1d268cfce4287a90c15b19437959991e49f54beac4fed56fb06cfb334ebdc0587e5568eb1b2bb73cc4b26a22104722668867e7a2c93d503359ea7cc6e4c7b5d28a45343424b83b3c5d565e798b98161e3f327fbe3d0f2571d34168a41aee172e830b6c4e00dcc6309", 0x9d}, {&(0x7f0000000400)="b4264caeb4f5b785e403f93d448549ea6c38d42a8de52ea9d5988d0a62d31ada0e09038b5c2f180a860094731fdb2ae6b86768cdfc4f5d1428e07431b7de9abb1eb949fc77c4fc8710ff8b445487627d2be30ca180a871d6f227c0ae47420ba81d7e4b97bbef587cf1056b26d0041c34b77b418cf1a13f9d6299e9fe069abc", 0x7f}, {&(0x7f0000000480)="8d7a7ff261ef60d208b77df64431beb801a03abf5b71297186bc8e50b1e99f7ed738e7df991bfba269a73499b3ca4c8e9c9704f37f9beba6c2f6d185dc58afd97af650249a3e0c1e1827db208dfd6163c86dac54294c6e82890ec525d66d890c5797d4e03a51ebcf7722a63323d914916b5b495536f5ec286c827e036735bca44bb7f1", 0x83}, {&(0x7f0000000540)="990bff6df5d1b23e6d2c3d817354bd8340e7b3c5d9ffcdd9ab566dbc0b82efa1cc0fd09a", 0x24}], 0x5, &(0x7f0000000840)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0xd8, 0x240440d1}, {&(0x7f0000000940)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000ac0)=[{&(0x7f00000009c0)="eaa315360d07c7e19291c72d6a710aa70df72c2666d7732ceb040bed3ff8693caf08947378843758c85a6eae2350fb9e13e245da7f67894eb79c2098aad39d47ce21d7547eccb81b73d442e053a607f1cee91616eae86380cc3b2526b495615ec532ec4fc3956fc318c55c71dbf0e9f38b8728946eda273acd31a120172b8fb3", 0x80}, {&(0x7f0000000a40)="c7855f0cb34a2d48e7e72823b6a8aced709ce4118cbc140c83d624433d7de7fb6ebfeef7e951bcf97f3482a10d41791b1e3992b6b5052a8fc6c7875a9f733513b12497cb9db6e1b0df19413dc978615c1fde871e6f8c2ae1b2cdb4b70541ed6427b7ee7e97ce6a7c", 0x68}], 0x2, &(0x7f0000000f40)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r12, r13, r14}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x108, 0xa512a5e1e08e047e}], 0x2, 0x20008040) 13:58:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000000c0)={{0x7, @name="a8e39e82debebdfbcc2bf01add631fa1ffbac97645f729d98c49d94b9459389d"}, 0x8, 0x3, 0x6}) r1 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x3, 0x46000) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000140)={0x3ff, 0x10, [0x20, 0x10001, 0x800, 0xfffffffffffffff8]}) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000180)) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000000700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x0, 0x2}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x10000) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x65) 13:58:44 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002e400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r2, 0x5a, '$]}', "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"}}, 0x110) r3 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000080)) 13:58:44 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040), 0x4) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000017400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x300}]}, 0x58) 13:58:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000000)={0x7a, "6e5c6b288d4a292edac82626cca7710edcb2a0be7cda1bf975c2513041a21c1c32097ab02e64afdd7e5a93792cd0c6b60fd61a4002e0e8f19d8387ab07ca1f595d2fb84f3e4a6ed707f14e635327f949feebc01388dbfda226467db9b7fa281270da6c063a5b69cf807305d2deb9f3d2887aa69861460660010e"}) 13:58:44 executing program 0: socket$caif_seqpacket(0x25, 0x5, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0x7c, "7dd861102ca37f3f0fee6e197422fa1aa79cfdd04b1a74bcbe8d4c1d555851027332bd1f755d65dc3e29af27278ce981bccf147be2db9b104df7433c7fd7e002a27b58a707286a64d17798dcf93ffa43887528c425a4442579e8a8c290ec0bda7918c9c259022e522ffca03b962b902281c075503920af897734ec96"}, &(0x7f0000000280)=0x84) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000180)='encrypted\x00', &(0x7f0000000040)='/dev/usbmon#\x00') 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000026b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:44 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x3f6ce68d, 0x1ff, 0x20, {}, 0x3f, 0xfebb}) 13:58:44 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000052600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x57, 0x2ff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) r1 = dup3(r0, r0, 0x80002) r2 = getpgrp(0xffffffffffffffff) process_vm_readv(r2, &(0x7f00000001c0), 0x0, &(0x7f0000000200), 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000040)=r1) setxattr$security_capability(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0xfffffffffffeffff, 0x9}, {0x569, 0x1}]}, 0x14, 0x3) unshare(0x0) 13:58:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xbaa, 0x40000) 13:58:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f}}, 0x20) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x11}]}, 0x58) 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002d100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffff89, 0x0, 0x0, 0x0) 13:58:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000040)={0x8, 0x6}) 13:58:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r0, r1) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff, 0x2080) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002be00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$RTC_UIE_ON(r1, 0x7003) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x40400, 0x0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002b000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) mount$overlay(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='overlay\x00', 0x8, &(0x7f0000000240)={[{@nfs_export_off='nfs_export=off'}, {@nfs_export_on='nfs_export=on'}, {@xino_on='xino=on'}, {@default_permissions='default_permissions'}, {@xino_on='xino=on'}, {@metacopy_off='metacopy=off'}, {@metacopy_on='metacopy=on'}], [{@subj_user={'subj_user', 0x3d, 'X{-'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@fowner_lt={'fowner<', r0}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:45 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1200}]}, 0x58) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000001, 0x20100) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0xffffffff00000000}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x1) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001600)='/dev/full\x00', 0x80800, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000001440)={0x0, 0x2, {0x3, 0x1, 0x2a1, 0x0, 0x5}}) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000", @ANYRES16=r2, @ANYBLOB="100225bd7000fbdbdf25030000000800040000fbffff17000300140002006e6c6d6f6e300000000000000000000008000500020000003800050014000100ff02000000000000000000000000000108000b00020000000800080002d2f3d694d0c21cde00000008000400030000000c000300080007004e018000"], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) r3 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000080)) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0x10) unlink(&(0x7f0000001500)='./file0\x00') setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f00000014c0)=0x1, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x4, 0x6, 0x4}, &(0x7f0000000280)=0x10) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x1015, 0x3, 0x481134a8, "78ce9c1b08408b6fbe9ad1a387781527", "3a8dfefad3a2326a7a8377bd1de42c996d00b2308d95d7049fe1fb04869572b00bc4868255c46883ad0ee92dc530b25c328d5c4b251ca671309774472e07d4b5652e144d2017eb1e50abf77d3555e668412f859d763d556d62451667f2b3d940060177a6e18acdde96f2fa42a0241cc37a618bbd713ce5e8ea8c331609a5ab796be07975c24fb5320402ad24d88af8259af149f5f757370ac0b5d9f338cce78cc45528cae6cd999b14e84383f2d58e16db60360ee3bf5fbbd942039a04422b176b63f562db9adb6996f758fb92c23313b9c9ff03f2104ed82dee997d70560d3369d32db1ce24e275f639ccc6a9a26e02c1f5d18e27ca97e7a0d0c6e5652037abd1258769f744f04d6cf25f5e72dba66b48312a34068431fa35c1bc8cf970c7b3c254b9ef57be8243f8b8589ef6e7f4bfa732e01628e1a100115797dfa1549ab0820d994e200b8fa23c1c1f016796fee64afcb9a5588836fff60269abfae15e6cab1551f2e730b3088e9fa5850efb4e8fead6b67d928a1be1520166fbb35a3a8cedbc0cf7357fbd9fded627c1bfed44237fe2e6505d00b76e8cfeb0570476acce4e09b0370d1a4ba519365a297a51d9a0047f76a00fe966e8700f0baee8bb27dd31bf666bb971401c6d7c45d667c4ba3908667facb5c7987c15ac44936e3b06d5ec92f282ca8f5e562b12e0d259b6b5063ab54d6e15b38a6c4e058c27ef96fd2bf73b8f180a0cde17aa2aa411686cf2927ac7e0909446546534da518b12b6b70caa656e6a553ca7d4cd069b6fbdb322437646330edfbf8668afd78a1fe03b699c8d2d7259ee355e3766c339f90f192236cb8b4e25bedfa56145c49434299620387449f68d478af2b1836dbf868f277bcb6c5d45de87bf3452e98aa32c1a81ac5a5471580b41fb0dc8ef3b2f2b2b65b76c194a073214dbf1ed36531e56c893a3a951932f0767481e081a837be5adebdeedfed3a726746288aeeb309e4cdd5391dfa27b25572adcc7fddb6b51acd3047ea23ebd7dd8a89e5a2aa9a1934e7b133e251a82db42fc6afa9d7fc2d11d1d6761a1c73588ead9019a1e0c0406189f41427a5b637f333caf4f9e5492887ffc7dacd98b2d4973d869c7b759aec5a95494845ef56f29bc2b6fb0eb5c8dd5e44e45ca70d6aa69607ba315d4c267830bc6cae78c16a4f80233c1357ca27b9d34c24e3e2a915ebc9a24861cfe072da99e1a46c5f35c52f44569af2c1254a522070fcf0169699e7dfc11788428723ff9b8f757db3d20254c9c9d0a032c0b41289a130f40538d348880ede2fb1f20871bd080c615397ab399283ea37d2d09555586edc67aeda60b3888909d48140b842f75c70b578a034fc58f57276a164d91b5ac482be37cb558f8b7e246be19ff416604070d916c5e4bb4b257653d3901d062523cc036bd0801d23942b4d9879b2f1ad593c935afaa776d950425a7b455672e806a78e146f9d1038e1da398c0ae6041713a245add98f29903e5188535349f852d6e0ece8dc4751cde84c3ecc597a120441f541bb603c92d33f0d9fa40e6a239ddc27bd0214163130db5bd2d83822ea38ccabf7935652177c6a6029dc728ac3e120b0cd93fba3ce3898cbd1461eca63135bdc7dbacced809d239b94d522e0eaeb66c1a9a528454342c5c2372b204966108d57daccd81ff8e76b64b1961e25a812aeaa2fde1c4c9d85707e305c3f29e8a7e1c0dffee379c988013824fcb81ca0abe9c43d7c4e8492e4d4e8b7a53a0f1bdd02df48538ee0e633ab2ef0eae542e6d926abe7aaab7657dc88d4953748c1f272ae6e06a88513709398160bdf40b1615c7c172b73383529ee1f78cd492e4f3b30bd4fc5883c21e292e6be4a0732b000c1475b9c6999a16ca41a23f422ed6c7ee0040ac34e80fa0b819497e616c8769be3eab80f6e2ec8bb307358af80745edbbd91e04f62c85c0974fbc055c82160aad9f0976990463af954f2f6dbaf675ee5692a78f6bcfafe4f90ff93ca970eec28a7f7a8738b257373984764e8d0fb9b21a748153a6b1f67c5667ee91a0152ea1ca235614a83d2c3d99b2fcd34a218e8cf99b71af965933b80e410633f5596915a59a4d1e77688cb499aaf998aac20a7a8302157780f7e934e5cb5751b88695c98bd1e06d47136c768f511cad0e2f356ffeed5880f8f55d508ebc6c0b775dcae1a514f160ce10948ac099d7ca74c8783a8cddd319fcbb8349e1f50862a321249a9ffc36b8780ddbbbd60b7429fe9fb491051322062624e44fc822a7e07843ff391a2ac1776a3ceae2d9fbce2306fc9ca23f5208e12fa1595921b82cdc3e4d6e746d2651004bf0fd894fb4f254c50be2587be8c3645431f6fcb27a67b5a3ee95fa1bc4a1751d2f44ccc37dd3e50140120f07a9d3963e3c7b856b295e718f74b2f38fdcf05275e715098a0c251b152244d12e95e3d04a0e5fa30340b5999a73cecd9f04a84aef519617429aff1b94e2009a4a626229cb45419687d26346ebd9d0b931ef1cb0c9054b1d6142efca03bc1cf6d1614e8c3bc812fbec459d360ff18ab799e8905561bdbf36a8959f72ce69fb5460c122f04f05ac2c0ad31c2695f69383f92820aadde404b2962f8083b64413e26accf0bcf0671c3ff589fb83d852cd222370d29db1dd8a6218566bfa5404622663010a2b00bb74f31b5b5b8b171113b26a00c4c015b2f3f73a1945006f2240227f4222aa830d0f27b7bb9992c8f10cef6cf1a28afeef47c13e55b9a9e37ab684fb5c71d65e2ccffde60dfc345289aad14db32aca782ac72f8ca1b35778d5616eccaee1e77efaa8ad594711829e2c2df270370c7cd5aebdf5f333ad6f900f612560469413199e358f263bd7a88c83a58a19c5ea9adc227d7a1bfd21f156a48bea2db343c362bf81a1854fd48fdf325ee7192876f7ca6806acaee918e7589e7e83520a9827ae9576cd77afc995cc377ea1efade09959dcb946d7046bc7e8a07116850e9fa1a1c719ea7ded8139094b0d9eb34b3a38cf5dddab91113609b20dc2cc107cf0ca930f2e181e8461e2581ee6083b5562d93c9446358df225d054904b9f8f3d1ac17b99fbd5ed437be82293bce01eb6fa9bb75fc9e5332be597327c8212028ff8c8aee33e10e3e53531ede3b3d0aebcd3db12480ea8f8b4300230ee2be9235694596bd284e9e7b87df1a5e749cf941eae2cd77c84f8614b9bd78d8084a9da349c60aeccaa706f5be8515d260a7de902bbb1425d6bf80df920d8e99e92ac34ed5b28d658a7e9a47a6eb06508981bc71e05b8ab77c90badaa6be9b223038c7cfcf8c005290c0aec6383b25b266c1d88fa55877844acb86877ca5e78ccd2c90351d7abdf9a7241183b4a56a0b859a206a2bf69a6ede57b2c6cb785f62642df0002d77601e258caf02e4846fb3cc55cb5a0d151885245d6aebef6304b537346ca5d45b1dee8c15008a919bac6e71344c7afe8f7a67f4b92046dc7322d357527ad0f72ea02d49fbe6e2eaebdea009fa682d52ca9a6384657664ee089364f0a17d1b9e8d497873c2a035340481344a096eae816a90c5fcabf022cb9ed14e609c811b7c8323ae6a33bb3fade64c89a70f19a7cbe9b50f58de9c52904cccb13aa05d95bd81ade125b5105092e7362936fdf5f5eb7d4539e87348a57d1e786c67765c9a80683b353252252bf2c0916df1574c48878ce6ec21eff3d9ad313c2bd4bcc641d0d6e26aed4d3f3401f56e11d56eb8eeeebb3ce5d158d3e392ca0fb2ca3875549652129278f6aca01fc96b7540d5b0876f9a1de078e06b30916a0e579c017674ec880e6fe20bd857754c367c9f562f3aaf79e8d982e99547471015b37fe995367518abebf69c87f85a7d07e3bd32972e8484247df7f30d0a53860cbaccdaf22729fc0b8d45164dbc83038a81c57456c34922468ddbcca1d292494d95fe330d404aa91420834b7027e15dc80d1c6287e0c52809203ccd666989210e14bac728092456d7e8f0671cefa5bf1af7ee459c2ad37eb62edba5306360b5f628e7d9336f4b822a6d7876fed084977cecf960c8478d4ddff374b876eee97ba8a9a88efa961e9269a19338e5a25eb303acc3a35ce20cf50cc91a7e1cd141909f473ca8bd8ea16c20b7646b908adea92a994476ba65b021099f2333d1535ebaebabae189580136fecbeb117b6936bb71c751974811bdd540c493b688344fd6cc8f3993f9b3cb55d73900d947d49fcb11bab4da043c12d0f777a43a9635370b9df6c01bd32b495e4924a0a9705f18ec339d90098250f4c32812feabff23d2f87c8c1b6221a3b2e5700d292ec57336e3eb7ceca3abe0bcfc50118e9a3825c9b04211f6f87337f1f6555431c23a0415557c1180f22e48ad3ceba6c4e66dbfae849141b996b612aa81ce729f18bea7467f1fa30324687b4c9ec58170968a9ba6f65e5dd798a7c34caa0fc4a373fe814c525f54fa8b236c67fc391c2802f9b75ff1b644e4d21390a73aad6227e3adeafb877b9d64532ae98fbe6a6193aad111d995705920f91113acdeb664be1586fc413f018ecf2fa512d1cfa5c1eaea4f153d4a7e2e121efb651f2bfcef9966aac954a6b8eae62521e79f7e24344e8e1881013fc73e5e3b304ea234f91f060e059731cec2f2031c234a24eb3d51b3a65d7975b8d1ad5da771d01874aa2632bb317777966046817e56cc9b5173083cc28339e5383f227a86f7123146ba107a561abecc9a2f7ee51f6a5b7f333e35d46292e03c762029de3015a0e86df4bff729c235f0e72cae99ff02eaa5cfe9ac2f6935e7cbdb587e8633f86c26dee0cdb5289908b182772f23ff17b416cd3c139079da96145d33ab006d0cb5b1d57ac82399d1f41251a035293d94c0c8929d9b1d7ae9e4f65aea091af7891ea2b26541e90297da5a516340ef2c7e89e889deeeaf45837493fbca9b17bfd806fbf86abff5784574016d844a6948ec1b356ff78e977a34bee25d9a2cb571fd0cfe618a9a7b0796c56c93e95b85c9e18b50b3cdec5244233b82e0887dd38d75258023b628632f109435e67f2244a6b92ea659393dddbbf0814d44259ad97a312121728a73e283972205f6f3f3fd7ec209e328be5e4a118b51c96a91ef99b94bb4bac958dfde44c1aacc7013b033608009641080f36bf74d952e6c734810bba2b5cf15dd13daf4dd6ccbb75745223113b56876ef6e68ee4d63b9f4946d27973708aa6b226ed5ca7eefec906eb49d2eb5baf19d7b3eaf90598078a4925acbdf503f4196053cb3dc22306316fded2e8273d6bc6734d6d8739e3ed0b9ae3bd897f0cb34f84d8161aec7d0c7f350c5273a2c4002351492c1ee30a466b7b2691c7cd99456e2d21f71446530465dfbfe7fdf5b8dca68c21d444d18705bddec095596dd8d6a07178c02d840657a836f57ac78a046f426e5a013b2444ddeb31592413f0cd85aa249d2a387844427052f0bbffa62d0a045a6d802fa059862cc34512e2dcd643ddc47c56d50a8bd208c5c940cbd03709ff81a0c853cbe36629e1d7158a431997e0e36b2ae9c6ec52b8fb2f5c667873d06431e19d65d2ec2a50adad2cb194445fc23866ac582ad1afde872798d92f3b73ce9a0f6d067abbb650cb94ce4b2cf9d28e65d726871c64967a5522c59cec9f50f2b4234a6e9c3ee0cbb94842026ef99b49d35eafe717c4fc147e8d23bf04b0698710bdefb3b45db2dfb9e503233f0de157dfe382b93e243f606eddba7b13da126f37def995b285c8b306716f609fdfd402faaab20db2773c1be1ddc36d320c61748f5c7d2864dd461451f8617847f9c3e5fe5da19"}, 0x1015, 0x3) r5 = msgget$private(0x0, 0x621) msgsnd(r5, &(0x7f0000001640)={0x3, "5710a30c9dd84cd5354455b5106972f8f672badfe0a87a2b316c9baf3b7fe8eee27b90bcadc884135be78861b9bbf7f07f382b2f31cbbc8b8c72891d959869dfba647405821fbe19f82c70faf673279e54be65ca5775995614c7b10a46c143c482d153f1a7c84afd8cfd6ecc1afbb4c2b1241a70a224b3088cc39dc0b1c3d84ad1c8f448246ff8091b4e19557d51f99e23252f98cb724af606af0d00b5a8c3c7d7aa78f734307fe3afa7327502a124ea2d7a3b8aef9bf1e344c2385ce886d2c829ef5669b9fba207e3ffeee92c051ef26104b580ef21240ef403e2"}, 0xe3, 0x800) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000002c0)={r4, @in6={{0xa, 0x4e23, 0xffffffff, @mcast2, 0xfffc000000000000}}, 0x101, 0x9}, 0x90) 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005f500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0xffffffffffffff93, 0x0, 0x48000, 0x0) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007c200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:45 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x20000) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:45 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) 13:58:45 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x58) 13:58:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000075100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:45 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='/dev/usbmon#\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)={0x80000000}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000002c0)=""/140, &(0x7f00000000c0)=0x8c) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.redirect\x00') 13:58:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r1 = geteuid() r2 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = syz_open_dev$mouse(&(0x7f0000000700)='/dev/input/mouse#\x00', 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r9, 0x29, 0x20, &(0x7f0000000680)={@mcast1, 0xac00000000000000, 0x0, 0xff, 0x4, 0x4, 0x7}, 0x20) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000d00)=ANY=[@ANYBLOB="0200000001000400f6ffffff02000500a681ae38409b0e31bb6c512b52ab70627b10883c9f71322043ff82aa06519eb4a86892185184f03b76844717485a5a6246be7781", @ANYRES32=r1, @ANYBLOB="e194673c76b59c6f51bfaf979bc6ee74b8b562f92b8e7862a58721bf0c55c9806761043331062734648374d7875565d9e20ad62aa6506ae8353da4f45459f52306f7916b4178d90bf063861ed27a8b82a73dffa8e8e06c77a6ebfc80a2dbb0f4b920c7cc7750b1def162e927892174", @ANYRES32=r2, @ANYBLOB="02000300", @ANYRES32=r3, @ANYBLOB="0ade145d59c16c010766b543ec67747e82a56a2759006400", @ANYRES32=r4, @ANYBLOB="009baf8fd3a1c681ed5e5e03543f7033f52325ccb94f09164df17780f6e54ee4b5617e27255cc11aaccbb1e4712ebc27e10c025a2987e968c95920251a96019a65d29ee474edeb81cd330b59fd93c1474de811fb94c06410d47d4e4f7fea2a5b3f63e9b72fdfcc506b6aa7", @ANYRES32=r5, @ANYBLOB="02000200", @ANYRES32=r6, @ANYBLOB="040004000000000008000700", @ANYRES32=r7, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="10000600000000002000060000000000"], 0x64, 0x2) syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x4001) getrlimit(0x7, &(0x7f0000000640)) statfs(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)=""/125) 13:58:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x400000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'hwsim0\x00', 0x3}, 0x18) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, 0x0) 13:58:46 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x58) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000006e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x0, 0xffffffff}) 13:58:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000, 0x400000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x100000000, 0xc4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x6d, 0x4, 0x100000000, 0x4, 0x7ff}, &(0x7f0000000180)=0x14) 13:58:46 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000001640)='/dev/dsp\x00', 0x400000, 0x0) bind$inet(r1, &(0x7f0000001680)={0x2, 0x4e22, @loopback}, 0x10) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$inet6(0xa, 0x3, 0x1) 13:58:46 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x10000000000, 0xfffffffffffffff8) r1 = dup2(r0, r0) ioctl$NBD_DO_IT(r1, 0xab03) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001c400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x80204, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) uselib(&(0x7f0000000000)='./file0\x00') keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='/dev/usbmon#\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)={0x80000000}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000002c0)=""/140, &(0x7f00000000c0)=0x8c) 13:58:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x9, 0x80000000, 0x0, 0x3, 0xe, 0x10, "14332f27a8053dbe3c0a6dcd4f8a80ad4fac9d0c124666acb9dc3dc718dce48cede557d7ab032664b6f0f28ef8c82682958382adf541ad5317e91b932ba283fc", "9857875af421e793fd678823f5fdec62f7c3011beb0baacaa892ed4259cc620afb1294f9ab8334bea3a06dda25848557ef9c9cb60b1ef8ecea98885a701f4ffb", "7298e0133764373750c9d15330f526aca8dfb59ff1a6a9ec40bdece11fc0a181", [0x0, 0x7]}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:46 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1600000000000000}]}, 0x58) 13:58:46 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004d200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x80c00) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000040)={0xbc71f88f0b9bbd15, 0x610}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:46 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='/dev/usbmon#\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040)={0x80000000}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f00000002c0)=""/140, &(0x7f00000000c0)=0x8c) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000015a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001740)={0x0, 0x0}, &(0x7f0000001780)=0xc) syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f00000000c0)='\x00', 0x1, 0x9, &(0x7f0000001640)=[{&(0x7f0000000100)="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", 0x1000, 0xa74}, {&(0x7f0000001100)="82644e65bbefce655c3de99ca86e33b5d339d09bf01001281ee3de5636a85f711a2094792d2425935f0bb3e8b5cb2432", 0x30, 0x9}, {&(0x7f0000001140)="26fe67ffcdbe8e0739d0d930c75c117ecc4fb5cac28f7a7d79f030e51851baee6fe7bae730d50fb5bfd9547fdcf48171e629ea61a70c817190becc93ea91841df4bea8fbc1d9d99ba35ecea22c7f8c0e792151ffa0386581fac2aa7b92e5f38d571693a1e3ceb6e322482ee127acbcbd52a2e0cc6436d7cc0149e9dea6874accf36e3f5210c4f4dd26faf06119e151eccd812b8a2b406fc799fa2dccce52643e8719b549b08f3d18dbb84a00cd71bb52c8ecdd5928f69587276d960d142b5ab8c1d8473b8ff02f2947fd63268c380f1533f5b7f2d443a77fd3b462d7dd", 0xdd, 0x2}, {&(0x7f0000001240)="7e729aee7a9c4a786f4300b1dcbe2f31239cd29ca222c03f25358ee414acad44445e3578b6fb9b8d4c89e6037a590c36a068eee166373501b8142fa10c5d99638d843a77715de3b2d711176c3e5831cae923bee9e7e8f72c4eaf83093b7fe9a7b83398d3cf8fd2635f70efec0f41516b356c88fff544b105a91bfd4d274cc0f255861bf21f6116da6c778821a2031f955403a32c881d981b49e4ab03f27ca6efc64e4dbaef", 0xa5, 0x7f}, {&(0x7f0000001300)="8288ffa5bd5ea85cfb902c048efee72e8789cf64108d452af8ca00ca2c8e8ae02928f9224cd21e586ee0569eac946e3b20458107be51c80f492a23ad31ffc235de5768a7f5374199841521425d6c60da22a0c741bdb1117c4752859459702c4b52f37f761cd70f08e1d154b8bd4cd501d94718877096ad47825858edb2398d2247ba12a995b98a1bf6e9f36537a64ff896053c89e61e64ca869bbda8e2", 0x9d, 0x556}, {&(0x7f00000013c0)="ab2e7ea2e8123f8a2237880092823003077c715a73d417694633d15d8357ca14adb86b60144e16ea77401f2ac374c1cfce757961ba99c99ddc178281cf0395e250472f2c2665f8095cea", 0x4a, 0x100}, {&(0x7f0000001440)="0fcb55912ddddd4efc48bfdd79bb4ae7c1e6f7c52180984461d84161bc76ff280fb9130720382e27c234e60a50f0a58bb0f35884a51e810df7af056e1a4d39968d125cfe364f08847b59d4bf9bb1eef0b26e79246e0287ef1c5d841c3131fa9df6722f2aed8c644ee1360957ab3f4816a5e9d3e189", 0x75, 0x80000000}, {&(0x7f00000014c0)="08af420f0b8538b35a023ead0f980444549783b3a57312d45dd7aa41d2dcb6ee428322037b6a9c07eb6a49e308b9d2c6a263708e6dac300cf0c6a9a7ea328c94249dc2a399effdba535a24d32e2552c446a2a6e858e9c3168b", 0x59, 0x7da}, {&(0x7f0000001540)="4717c86ff6aee18718a4daf905d02d8d915ba6273640a406bc4675f2c5021e404393a4503b27d3732a4d9f4afd09eb2493d5911117849681941c8f6c4b1ea957b0d2070673ebcdb1ead837a56e7ca8430c073a53e12a83adde27066b66ca11023915fa87c4b4d5109adb8d8cb268837a38164e7bdc3eced3c814c37798e150ca83d051c2f08a8694dabb2d792dc227a284711659741633b2f2c44e81a40a49e0d1775ec1b30a8e25cf8fad4ffe3a5e4defa47ac158f8dc09fcffd7a84e6f7844b5b268a9f02cc67e9f7814763a0463c67f6fdc45bea7b3ab06951a351a1927f8caff9af882ff6f3dc57ff93a6e6679557fef6ef0", 0xf4, 0x10000}], 0x3808480, &(0x7f00000017c0)={[{@fault_injection={'fault_injection', 0x3d, 0x4}}], [{@subj_user={'subj_user', 0x3d, 'jfs\x00'}}, {@uid_eq={'uid', 0x3d, r0}}, {@measure='measure'}, {@hash='hash'}, {@obj_type={'obj_type', 0x3d, 'jfs\x00'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:46 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') socket$tipc(0x1e, 0x5, 0x0) 13:58:46 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000000)) 13:58:46 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x3f6ce68d, 0x1ff, 0x20, {}, 0x3f, 0xfebb}) 13:58:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000035900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:46 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1100000000000000}]}, 0x58) 13:58:47 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='encrypted\x00', &(0x7f0000000140)='/devHuqbmon#\x00') 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x3f6ce68d, 0x1ff, 0x20, {}, 0x3f, 0xfebb}) 13:58:47 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f00000000c0)={0xffff, 0x35}) 13:58:47 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0xb69f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd63e, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x8000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xcc, r2, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd07}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xadbe}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe00a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000040}, 0x40800) 13:58:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f00000000c0)='\x00', &(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='jfs\x00', &(0x7f0000000180)='*\xb7\x00', &(0x7f00000001c0)='nodevproceth1bdevwlan1lo\x00', &(0x7f0000000200)='cgroup#eth1securitysystemlovboxnet1#em1\x00', &(0x7f0000000240)='\'\x00', &(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='eth0\x00'], &(0x7f0000000440)=[&(0x7f0000000380)='jfs\x00', &(0x7f00000003c0)='cpuset\x00', &(0x7f0000000400)='jfs\x00']) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005f800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000140)={0x3f6ce68d, 0x1ff, 0x20, {}, 0x3f, 0xfebb}) 13:58:47 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x11000000000000}]}, 0x58) 13:58:47 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000068d00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) sched_setscheduler(r2, 0x5, &(0x7f00000000c0)=0xee0000000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x10, &(0x7f0000000180)=[@cr4={0x1, 0x4}, @dstype3={0x7, 0x1}], 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101100, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x8000}) getuid() write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14, 0x67, 0x1, {0x0, 0x2, 0x5}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x30e, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r5 = dup2(r4, r4) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f0000000080)) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000047400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x40, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x24, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x1c}}, 0x0) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r1, r1) 13:58:47 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000073100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x58) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000029300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1713.939117] kvm: emulating exchange as write 13:58:47 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x3, 0x0, &(0x7f00000000c0)=""/39, &(0x7f0000000100)=""/71, &(0x7f0000000180)=""/29, 0x4}) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000200)={0x43, 0x1, 0x3}, 0x10) syz_mount_image$jfs(&(0x7f00000002c0)='jfs\x00', &(0x7f0000000300)='./file0\x00', 0x1f, 0x2e1, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000280)={0xbe0000, 0x80, 0x80000001, [], &(0x7f0000000240)={0xbb09ff, 0x7, [], @value=0xe4}}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e21, 0x4, @local, 0xff}}}, 0x84) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 13:58:47 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x80000) clock_gettime(0x0, &(0x7f00000002c0)) select(0x40, &(0x7f0000000200)={0x0, 0xfffffffffffffc7d, 0xbefc, 0x9, 0xfffffffffffffffc, 0xffff, 0x61, 0xfffffffffffff001}, &(0x7f0000000340)={0x3, 0xc1b6, 0x4, 0x8, 0x2, 0x6, 0x7fff, 0x7}, &(0x7f0000000280)={0xff, 0x1ff, 0x33b1adb2, 0x9, 0x3, 0x7, 0x3, 0x2}, &(0x7f0000000300)={0x0, 0x2710}) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000100)=""/205, &(0x7f0000000040)=0xcd) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000380)={0x4, 0xfffffffffffffffc, {0x0, 0x0, 0x7fff, {0x2a, 0xe36}, {0x6, 0x9}, @ramp={0x9525, 0x9, {0xbe17, 0xbee3, 0x3ff, 0x2ab}}}, {0x57, 0x7fff, 0x8, {0x800, 0x7}, {0x3ff}, @cond=[{0xd2, 0xfffffffffffffffe, 0x3, 0x975, 0x3ff, 0xffffffff7fffffff}, {0x2, 0x10000, 0x7, 0x401, 0x10000}]}}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000240), &(0x7f0000000400)=0x4) nanosleep(&(0x7f0000000440)={0x77359400}, &(0x7f0000000480)) 13:58:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002f200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:47 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:47 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x3) 13:58:48 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x3}]}, 0x58) 13:58:48 executing program 2: r0 = accept(0xffffffffffffff9c, &(0x7f00000000c0)=@l2, &(0x7f0000000000)=0x80) r1 = dup2(r0, r0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000008440)) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000008100)={0x0, 0x800}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f000000c180)="52ae7f822298cb71cf437e62c37cdc76c4b0886aba05319ac002c863753902a96d93b9178fa069a7b11dad7aa6dd6a18e0c9a12c3c35ba2646527cf3e43bda05d45268d3eb89d1a214570ad25aca6cd823923728251602f81f53746ad2dc5f869aecef7de8e89edc8fc2449ab82acd2855d49096b5bc1292cd2fdbbb1dc3ba0f692bda416bc9ef6d9f0f311d68f97b7e8dc38accff51f2527384d6e7f83a22755a48d53e9e5a39d3c727f7d9c9c611984685f475f25d99903f7a32e7669eee548096939c13698a90a43ac1961aa8cf6dd682908c9b8d7dbf8c", 0xd9) recvmmsg(r0, &(0x7f000000bdc0)=[{{&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)=""/89, 0x59}, {&(0x7f00000004c0)=""/102, 0x66}, {&(0x7f0000000540)=""/163, 0xa3}, {&(0x7f0000000600)=""/21, 0x15}, {&(0x7f0000000640)=""/163, 0xa3}], 0x5, &(0x7f0000000780)=""/4096, 0x1000}, 0x98ca}, {{&(0x7f0000001780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001800)=""/101, 0x65}, {&(0x7f0000001880)=""/78, 0x4e}, {&(0x7f0000001900)=""/117, 0x75}], 0x3, &(0x7f00000019c0)=""/4096, 0x1000}, 0x73}, {{&(0x7f00000029c0)=@pppol2tpv3in6, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002a40)=""/165, 0xa5}, {&(0x7f0000002b00)=""/96, 0x60}, {&(0x7f0000002b80)=""/62, 0x3e}], 0x3, &(0x7f0000002c00)=""/111, 0x6f}, 0xdfa}, {{&(0x7f0000002c80)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000004200)=[{&(0x7f0000002d00)=""/241, 0xf1}, {&(0x7f0000002e00)=""/45, 0x2d}, {&(0x7f0000002e40)=""/86, 0x56}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/131, 0x83}, {&(0x7f0000003f80)=""/127, 0x7f}, {&(0x7f0000004000)=""/214, 0xd6}, {&(0x7f0000004100)=""/62, 0x3e}, {&(0x7f0000004140)=""/173, 0xad}], 0x9, &(0x7f00000042c0)=""/175, 0xaf}, 0xbe}, {{&(0x7f0000004380)=@caif=@rfm, 0x80, &(0x7f00000046c0)=[{&(0x7f0000004400)=""/140, 0x8c}, {&(0x7f00000044c0)=""/69, 0x45}, {&(0x7f0000004540)=""/60, 0x3c}, {&(0x7f0000004580)=""/237, 0xed}, {&(0x7f0000004680)=""/64, 0x40}], 0x5, &(0x7f0000004740)=""/255, 0xff}, 0x6000000000000000}, {{&(0x7f0000004840)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000005ec0)=[{&(0x7f00000048c0)=""/214, 0xd6}, {&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/81, 0x51}, {&(0x7f0000005a40)=""/191, 0xbf}, {&(0x7f0000005b00)=""/239, 0xef}, {&(0x7f0000005c00)=""/140, 0x8c}, {&(0x7f0000005cc0)=""/65, 0x41}, {&(0x7f0000005d40)=""/251, 0xfb}, {&(0x7f0000005e40)=""/92, 0x5c}], 0x9, &(0x7f0000005f80)=""/4096, 0x1000}, 0x81}, {{&(0x7f0000006f80)=@tipc=@name, 0x80, &(0x7f0000008200)=[{&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000008000)=""/225, 0xe1}, {&(0x7f0000008100)}, {&(0x7f0000008140)=""/126, 0x7e}, {&(0x7f00000081c0)=""/41, 0x29}], 0x5, &(0x7f0000008280)=""/17, 0x11}, 0x5}, {{0x0, 0x0, &(0x7f000000a700)=[{&(0x7f00000082c0)=""/150, 0x96}, {&(0x7f0000008380)=""/159, 0x9f}, {&(0x7f0000008440)}, {&(0x7f0000008480)=""/62, 0x3e}, {&(0x7f00000084c0)=""/206, 0xce}, {&(0x7f00000085c0)=""/97, 0x61}, {&(0x7f0000008640)=""/4096, 0x1000}, {&(0x7f0000009640)=""/180, 0xb4}, {&(0x7f0000009700)=""/4096, 0x1000}], 0x9, &(0x7f000000a7c0)=""/4096, 0x1000}, 0x8000}, {{&(0x7f000000b7c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f000000bac0)=[{&(0x7f000000b840)=""/216, 0xd8}, {&(0x7f000000b940)=""/86, 0x56}, {&(0x7f000000b9c0)=""/238, 0xee}], 0x3}, 0x6}, {{&(0x7f000000bb00)=@isdn, 0x80, &(0x7f000000bd00)=[{&(0x7f000000bb80)=""/86, 0x56}, {&(0x7f000000bc00)=""/204, 0xcc}], 0x2, &(0x7f000000bd40)=""/121, 0x79}, 0xa3f7}], 0xa, 0x12040, 0x0) accept$unix(r0, 0x0, &(0x7f0000000140)) sendto$unix(r1, &(0x7f000000c040)="27e4cbb2c63d85bebb36d99b008c51246e773f4c87c03cc9424a950c93f75ce63a9f4016cae5a9163b0cbf46f6dd4a58a27d899e939e71b28208b021d71d8d71d290c6129ddb9ebb40c7ba7f32bd7bf714983c1b8d2c8e5399662fb14fda506426085a7122b2ff0b6ba52366187d4bc60ef6247ab1e9b140fc3faf14f0276d7a149de07cc96f66b8143e47c52c41db8c067cefdfd30573d8373b2f6d3a0af5513d6fef25", 0xa4, 0x4080, &(0x7f000000c100)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x3, &(0x7f0000000340)=[{&(0x7f0000000200)="790d0e8da26b972ddac77f1a28e33d18c9d5bc8f39b255049d7624e62f611a5708183d7ad1053aa0c2dc48155f1c4c638e5d24e86fdcdb1cdd15da665172db74842ba78cbe1386370f3357db85c57c65708784318df86f6d9cec792500dde0c09c12e079a595d8b43c2f3cb0189387643fa5264d651fe49718766e49a3b029152b468614fdd828bce9d20a1da7ab7ea5d7100f4dd77344b6613a21459208852d645e37901d2a7c1ac74996f7d3b90b83df14fccdff8377b58d054bd7", 0xbc, 0x9}, {&(0x7f00000002c0)="0f006f9b25708a4ff550529a99fa22f284dc5bdfcbcd23c1e342b0", 0x1b, 0x8}, {&(0x7f0000000300)="1ecbeda8e1f645e0174b5d56d4", 0xd, 0xffffffffffffffff}], 0x4000, 0x0) 13:58:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000053f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:48 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x3) 13:58:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x6, 0x80000001, 0x8008, 0xff, 0x4, 0x3, 0x9, 0x3, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@loopback, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) 13:58:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001b900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:48 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x3) [ 1714.419493] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=00000000) 13:58:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x7f, 0x20000000000000}) 13:58:48 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003700)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000003740)={0x0, @in={{0x2, 0x4e22, @multicast1}}, 0x3, 0x2, 0xaf, 0x100}, &(0x7f0000003800)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000003840)={r2, 0x10000, 0x7685}, 0x8) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x48, 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000051d00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:48 executing program 1: lseek(0xffffffffffffffff, 0x0, 0x3) 13:58:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_INFO(r1, 0x3, &(0x7f0000000140)=""/216) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) bind$nfc_llcp(r2, &(0x7f0000000000)={0x27, 0x1, 0x2, 0x3, 0x4, 0x9, "4311f46bbe904e7c306feb82f4cdffcd4db5fbe36834baf3a846899f22674f39c81d09498e4311dc47554675118fcd4cd9b83c0a4671d1d6b9cd9ee25abe0e", 0x4}, 0x60) 13:58:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x4808, 0x0) 13:58:48 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x58) 13:58:48 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) lseek(r0, 0x0, 0x3) 13:58:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000025a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:48 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x111500) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f00000000c0)=0x9) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/82, 0x52) dup2(r0, r0) 13:58:49 executing program 0: r0 = semget(0x0, 0x1, 0x205) semctl$SEM_INFO(r0, 0x2, 0x13, &(0x7f00000001c0)=""/240) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200, 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') getsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000180)=0x4) r2 = add_key(&(0x7f0000000380)='.request_key_auth\x00', &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)="f399adcdd5a58566ea40cff5dd56b57627cb964cba3c145e9b11fd807eebb6241e1c202acbe7325c6f95c28599bcdbbf15aa3898ec6e0ed73e03f21a3f612401c1660eadce333eea32a6bd82e5b42b06e86d0b9dc002c336e8fda397d6ec33d4e3a756ffe473aead63515025340a8f5ac269b3bd968ab1e2d014243583d3df2d16549eadee70f395e5d9ba91b6acd6a992c745506b23e54633864f464393425c8c9a118d78c0d707df49e90f8a56ed95521b643d9469ed821e679d8a88e669d15ca68fd8a9eebf278290be5154178b2fb6a682a5253bdbf8ee76ca7d33b06a7c083677817091785473dbc490e4b56c46110cd662c6537f26", 0xf8, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r2) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:49 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) connect$caif(r0, &(0x7f0000000180)=@util={0x25, "b2d05da8340465c0f0556835fb407472"}, 0x18) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000100)={0x6, 0x6, 0x2, 0xffc, 0xd, 0x1f}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffff8, 0xd9, 0x0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f00000000c0)={0x3, 0x0, 0x10000, 0x6}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x400400, 0x0) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) lseek(r0, 0x0, 0x3) 13:58:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) fcntl$getflags(r0, 0x1) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000080)) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) 13:58:49 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x1f00000000000000}]}, 0x58) 13:58:49 executing program 2: r0 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f00000000c0)="6ab9a1da5d206b4c5f72b86310349001c34a17859257c90d5b99e4e6b0dbf7f4b595a9e4726eedaa460a819fd2321233e35585af417d0d068f7ac4e7f702a37f906db4cd2e395d5193036c18473d057ecf711b1028a98945539175badfd0f58a29cf56d90a5aeb05273a36039a4bec507043af79ceb1c438f4b07a8b124ff81f6eacb8dd7b322d86f0df8ce89b532cb9a1e65caf5c6bf7f8e7bdaa2f086f92245915b1e166fab089b27a17e05e0d3786051a323301f392dc") syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:49 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) lseek(r0, 0x0, 0x3) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000010300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc000, 0x0) connect$tipc(r0, &(0x7f0000000040)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x1}}, 0x10) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x61, "8533adc4e3313dab84ee9c739357dad555e2a311fa8e998ee329c4a11583e5742ef97422fbf81991012987e117e22db194f2b96a2d6a42616fcaa10ff9b9be0b93559081defd4390c88daf74e3eafc9925cf9cd66fbd53954575a6a4a3176806f1"}, &(0x7f00000000c0)=0x69) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x49, "995b1355d3a69b5c4e3395b84d607dc837291a35db75da0eeff4907c17825ebdd9057217459b7a8b37bc7385c35a36b787c7c24a359277a218ee834f38bc0f44211afa572d1a220f19"}, &(0x7f0000000240)=0x51) r3 = dup2(r1, r1) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000080)) 13:58:49 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000006c0)='encrypted\x00', &(0x7f0000000700)='/dev/usbmon#\x00') keyctl$instantiate(0xc, r1, &(0x7f0000000000)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', '', 0x20, 0x8}, 0x28, r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) fsetxattr(r0, &(0x7f0000000640)=@known='trusted.syz\x00', &(0x7f0000000680)='\x00', 0x1, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @multicast2}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6=@initdev}}, &(0x7f0000000480)=0xe8) r5 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6, 0x1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000140)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x80, &(0x7f00000004c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x6}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x600}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, 'new '}}, {@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@subj_user={'subj_user', 0x3d, 'ppp0loppp1'}}, {@smackfsroot={'smackfsroot', 0x3d, 'vboxnet0eth1eth1\\$'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@uid_eq={'uid', 0x3d, r4}}]}}) 13:58:49 executing program 1: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000054700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 3: socketpair(0x1a, 0xa, 0x800, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e21, 0x2}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)="89a9ab1d83f7c02df296d9734dac6603dcf4df8f7dd6a509be850880f3c4edbf3c27e0e972ab8ed3389a75289a8c8a94fb93cc8185597ed64b46e9fc73157e7c0d748811545bf2a9cbb0f176be20bd206a8e4ea44afb406e4bbfc037783168b0eac9e6dbcb7f3fa478463e8bff46c70a66a2cf0e9cedb18caa375aab1a1badeb1b806e718a6ac43909ffd303795834ccfea527fe1a9d40149cf95fb6b3d2776abeca5452059426f897402092106d4c913da7da4970c3392bfa6f0c3880a1fee7f329c7b5ef6dfa307f32c42ecfc74648c991b607f05b8b4d8869f17ac8b00fb94e056223505449021db3784c222d968a6b677b", 0xf3}, {&(0x7f0000000240)="b146b4fea48e01dd884daccf58fa82b68f68ad4b985fd84e1bf40ff4f299a898acf6942aa16ecf00d9f129a1c90941a7b52621f17752bcb6d8480ae1166ca26a48a8179e19b00f5a5ae88f68e62840cef66ac5744618be467d9dfd127baaae5279b524331442a6cc2e0482efc1fb692e2d7d19cfae5dab0c89438640ac8aedc50dd9335b70022c14caac7f959b443198e5ca1eab60e28c31feda9db07228dcb7d5069a79c975137311f2d891fab880f89a83a564860f2a96bd73", 0xba}], 0x2}, 0x480c0) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r1) fcntl$setflags(r1, 0x2, 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ppp\x00', 0x3fffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000280)={0x368, 0x10, 0x5, 0x10d, 0x70bd2a, 0x25dfdbfe, {0x3, 0x0, 0x5}, [@nested={0xdc, 0x35, [@generic="eb708c80154b556d2781948c2e151aaa463faa2d14307648c3fb0748ef358087ae17553e1f05269b80381e09a23b76d816d7300f07f3fcd6624ede644047f8a3ce6b8d97644af1963c701927792b3fec0ac9fd0d31efa1903abd85160e43408003d7ce561c25e66082761d965ffd32a866a7ff6b4a0eb80d86e8167fd8b27bd0bd", @generic="c998acd2b374b74bbeb2d091d5da3f70cc1c08db55a93c5caccb205273a3125cc754a842b93bfda915eb6115831f5ffc6f0ba28ab641efd8c3216e3efacc3dfaf09149284c695ab3f3c03211", @typed={0x8, 0x26, @ipv4=@empty}]}, @generic="d507f80b0fb4d41709cd787c7c3e79597844cc0a4cf4e78d6b0c9834041828718f72a5e39a2da723a0bea88ab5be7e78650272fd81e281ca878ac30623f05cc2620f88641536022a1e8f6585b5152cba4f00dd26ff3cab6cb1c8271c45e75e55c7e880deedcfabd64c2a933b17384613affefd8032ab", @typed={0x8, 0x32, @ipv4=@dev={0xac, 0x14, 0x14, 0x1d}}, @generic="7aeb58da2ecff0240be40f87c21dc24fa9d878092aee6b6a9c457e24ffbc1c3cba4bc77524a4d8f354963ab3d7044834aa1c789051c96169c9d4b5ba45f9fca4ba6fc17345077bea343f4cd9b82b35af5cbd05c2b9c0c251ecfe2a86843017199df162d4fab3747c17b8e6abf57d17a1f558c9b5a91fa79cf20d429974b70dbd8a3e4d114f058ca243a75456a8fe024de29163ea77e3740fe397bfe11ea6628e6c1cfdd487d5bb67a74f97abc0f0fba86822db3c4be86c20fb26844d4891d612877ab560d6f4d961bc1f22581d17e84944cbe55ba9cd9ff559c41e5c0b7cbe5ac285954ad2565c325bb86cb079a74400623e783963c61adb08", @generic="f1bf2bff4e550cc41117ffce61e91f0b5bef16cc2af0341cd63618df5a8b6bbd9e185ce155d073f94148f80ea5121d95fb2fcc232fb7222ac30208193b4d39081f659bad7e9bb2b4016bf1db9408c0c08342072e935cfffc31cb1e8a2e75bf4fb1868151d5421e8838d757224e1ea7912d839c622756fee8bc11334c2e9389a3d622c9e139a12a7c2a606b654ec39e1773b427d9d9921aa3bb8b62396d64f9c7fabb5bc9a28ad31d26758c89fa45ad43007da2d29a0ea6b41576ae7f89158d9278fdebec3ab24b27a6a59c60e12e37901fcdc9a651009934a3736bae69b42a320cf12ef217bc486299", @generic="3926cf6b50f30a2a675bb99963fbc8eba5019c06dd20cae5"]}, 0x368}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000700)=""/224) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8480, 0x0) ioctl$IMHOLD_L1(r3, 0x80044948, &(0x7f0000000040)=0x7) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:49 executing program 1: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 13:58:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8, 0x105001) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000001c0)=ANY=[@ANYBLOB="0600000006000000080000000000000004000000000000003304000000000000960e000000000000000000000000000004000000000000000000000000000000800000000000000055ffffff0000000007000000000000000200000000000000030000000000000059ee37f1d3be5c01143c69f9162eb10696bb5a40f8b135920fcf7cab9966c6740c1b19e55826882540ef166918678e956b3bd3d9efc9ce921a5defdb9d5b76f59be5a8ea832135b0e2a9000000000000000000000000000000"]) rseq(&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x100000000, 0x7}, 0x3}, 0x20, 0x1, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000140)=0x3, 0x4) 13:58:49 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x58) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003dc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 1: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) 13:58:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0x3}) 13:58:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000040)={0x0, 0x4}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$KDADDIO(r0, 0x4b34, 0x8) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000005b100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x9b, 0x1, 0x4, 0x3}, {0x9, 0x2, 0xc483, 0x10000}, {0xfffffffffffffffd, 0x880, 0xf0c}]}, 0x10) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000180)={0x6, 0x20}) 13:58:49 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 13:58:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000001c0)={0x8}, &(0x7f0000000200), &(0x7f0000000280)={0x77359400}, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x4, [0x7, 0x100000000, 0x2, 0x5449]}, &(0x7f0000000100)=0x10) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000300)={0xb5d, 0x31303453, 0x8, 0xa6e, 0x1, @stepwise={{0x200, 0xff}, {0x9}, {0x9, 0x4e}}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x100000001}, &(0x7f0000000180)=0x8) 13:58:49 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 13:58:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xee, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x3fffe, 0x0) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000140)={0x5, &(0x7f0000000040)=[0x800, 0x100, 0x8, 0xffffffffffffffc1, 0x5]}) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000100)=0x7fff) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000300)={@remote, 0x0}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1b, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd4c}, [@ldst={0xc20dadeb0dea8f2d, 0x3, 0x6, 0xa, 0xb, 0x18, 0xfffffffffffffffd}]}, &(0x7f00000001c0)='syzkaller\x00', 0xad, 0xff, &(0x7f0000000200)=""/255, 0x41100, 0x1, [], r3, 0xe}, 0x48) 13:58:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000014400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:49 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x600}]}, 0x58) 13:58:49 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x102) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x12711, 0x3, 0x1000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000000c0)={0xb, 0xc3, 0x400, 0x800, r1}) 13:58:49 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) lseek(r0, 0x0, 0x0) 13:58:49 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000000c0)=0xffffffffffffffff) r2 = dup2(r0, r0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000000000)={0xffffffffffffffff, 0x1}) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x6, @dev={0xfe, 0x80, [], 0x2b}, 0x9}], 0x3c) 13:58:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000035c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) sched_setscheduler(r2, 0x5, &(0x7f00000000c0)=0xee0000000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000240)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x10, &(0x7f0000000180)=[@cr4={0x1, 0x4}, @dstype3={0x7, 0x1}], 0x2) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101100, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x8000}) getuid() write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14, 0x67, 0x1, {0x0, 0x2, 0x5}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x30e, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r5 = dup2(r4, r4) ioctl$KVM_DIRTY_TLB(r5, 0x4010aeaa, &(0x7f0000000080)) 13:58:50 executing program 0: perf_event_open(&(0x7f0000348f88)={0x4, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x7, 0x2000) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000380)={0x0, 0xfffffffffffffff8, 0x2, [0x3, 0x0]}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000400)={r2}, 0x8) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000180)=0xb) fcntl$setflags(r1, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x4}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r3, 0xfff, 0x1, 0x22cb, 0x6f, 0x7}, &(0x7f0000000200)=0xffffffe0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000240)={r4, 0x8, "66724e080c64e401"}, &(0x7f0000000280)=0x10) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f00000002c0)={&(0x7f0000ff9000/0x3000)=nil, 0x3000}) 13:58:50 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)={0xfffffffffffff800, 0xfffffffffffffffe}) 13:58:50 executing program 2: r0 = open(&(0x7f0000000180)='./file0\x00', 0x2, 0x102) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000240)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x103000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0xffffffffffffff00}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000100)={r2, 0x3}) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x101, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x208800, 0x0) sendto(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000001c0)=@isdn={0x22, 0x8f, 0x1, 0x1, 0x20}, 0x80) 13:58:50 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x12}]}, 0x58) 13:58:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000065800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:50 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000280)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r0, 0x0, 0x3, &(0x7f0000000040)='syz'}, 0x30) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x400, 0xc1, 0x44d, 0x0, 0x7, 0x4009, 0xe, 0x134cd031, 0x1ff, 0x7f, 0x7, 0xd8, 0x2, 0x100000000, 0x3, 0x9, 0x5, 0x101, 0x100, 0x80, 0x100000001, 0x10000, 0x2, 0x8, 0x7, 0xfffffffffffffc00, 0x400, 0x6c, 0x5, 0x3, 0x4, 0x4, 0xea8, 0x20, 0x5, 0x0, 0x1c0, 0x7, @perf_bp={&(0x7f0000000000), 0xc}, 0x10001, 0xfffffffffffffff9, 0xfa, 0x1, 0x7719, 0x4000000000000000, 0x3bc}, r3, 0x8, r0, 0x8) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:50 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x90002, 0x0) 13:58:50 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000071200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:50 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xffff}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2}) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) 13:58:50 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000040800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:50 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) write$P9_RMKDIR(r1, &(0x7f0000000240)={0x14, 0x49, 0x2, {0x1, 0x4, 0x5}}, 0x14) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000200)={0xedd, 0x8c33, 0x3, 0x9}) ioctl$KDSETMODE(r1, 0x4b3a, 0xd2ec) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000180)=0x4) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)=ANY=[@ANYBLOB="0400f3ff0000f70004000000000000000000000000000000"]) 13:58:50 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x542c0, 0x0) write$nbd(r1, &(0x7f0000000040)={0x67446698, 0x1, 0x1, 0x3, 0x2, "ef205f48af2c47"}, 0x17) dup2(r0, r0) 13:58:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x8, 0x2) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000140)=0x81, 0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x84001, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x3f) 13:58:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}]}, 0x58) 13:58:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006e400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:51 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) mount$9p_xen(&(0x7f0000000000)='/dev/dri/card#\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=xen,', {[{@privport='privport'}, {@version_L='version=9p2000.L'}, {@posixacl='posixacl'}, {@access_user='access=user'}, {@loose='loose'}, {@debug={'debug', 0x3d, 0x7ff}}, {@version_9p2000='version=9p2000'}, {@cache_loose='cache=loose'}, {@noextend='noextend'}, {@noextend='noextend'}], [{@context={'context', 0x3d, 'user_u'}}, {@appraise='appraise'}, {@obj_type={'obj_type', 0x3d, '/trusted'}}, {@euid_gt={'euid>', r2}}, {@obj_type={'obj_type', 0x3d, '/dev/dri/card#\x00'}}]}}) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000300)=0x5) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r1, &(0x7f0000000340)="f5a83d5d4b719eec8a9714491fdf82f86c5b0074933dd7aa8a7eec97c91808b6181774289d8e20b2aa7d206b8621566ccdd3126f1340c41fae4b95e2b65c6bbc59b6bbb9316ce81d57ee3fd18f1261979022ddcd99515d935fb59bb4d703cc147071f96ebef0839c9f6c574972d52eef4c9d39b31e7642344b9792f54cf50ae87367be55ffba5124eff5305b7f660483dbe61cfab9eef277df35c7d157e8a2364040415f44677f0fa50ed42b5b675b34031192a7ff"}, 0x10) 13:58:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000056600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:51 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x4) write$P9_RSTAT(r1, &(0x7f0000000280)={0x5e, 0x7d, 0x2, {0x0, 0x57, 0x8, 0x10000, {0x2d, 0x3, 0x8}, 0x800000, 0x81, 0xfdf, 0x66, 0x0, '', 0xf, '/dev/dri/card#\x00', 0x6, 'vmnet0', 0xf, '/dev/dri/card#\x00'}}, 0x5e) r2 = dup2(r0, r0) write$P9_RRENAME(r2, &(0x7f0000000200)={0x7, 0x15, 0x2}, 0x7) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) sendmsg$can_raw(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f0000000140)=@canfd={{0x3, 0x7ff, 0x200, 0x200}, 0x3c, 0x2, 0x0, 0x0, "c244ad00bdedf09186a11e7b92e2aa6a7ce506a9bd1812ede0c1b036c109df93294d74a8434e3ca246eba9cd12feee03dd3a1428508dc21be93be9f5755bee06"}, 0x48}, 0x1, 0x0, 0x0, 0x40890}, 0x20000801) write$P9_RRENAME(r2, &(0x7f00000001c0)={0x7, 0x15, 0x2}, 0x7) 13:58:51 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80200, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000000c0)={{0x3, @name="c99e8c6b3f651f79a655ce1511831d8af288a6b8413379970d3e09ffba2d3a76"}, 0x8, 0x7b, 0x1}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006a100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:51 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x6, 0x8, 0x7ff}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x40000) 13:58:51 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 13:58:51 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x110000}]}, 0x58) 13:58:51 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x18f) setsockopt$packet_int(r1, 0x107, 0x9, 0x0, 0x0) fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000140)={0x2, 0x6, 0x7, 0x6, 0x6, [{0x7, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x5, 0x3, 0x1, 0x0, 0x0, 0x680}, {0x2, 0x8, 0xfffffffffffffe00, 0x0, 0x0, 0x3100}, {0x81, 0x4, 0xff, 0x0, 0x0, 0x400}, {0x1, 0x6, 0x6, 0x0, 0x0, 0x4}, {0x1ac, 0x5, 0x5, 0x0, 0x0, 0x800}]}) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0xe}}}}, 0x90) 13:58:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004e300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000000)=0x80, 0x800) 13:58:51 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='.dead\x00', &(0x7f0000000180)='\xa17\xf8g\x83S1\x1fP\xef\x15\x8b\x18Ef\xe9\n\xce+\x84\xcf\xcbCRW\x97\xeb\xc2\xa8\xee\xbf\x1c\x1e\xe1\x83\x19G\x00\x8a\xdb\x90\xd8\x84CO%=]\xaf\x06\xb8\x83\x92\xbfm\xefC\x880x0, &(0x7f0000001300), &(0x7f0000001340)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0xad9, 0x2, &(0x7f0000001280)=[{&(0x7f00000001c0)="b11463ac3abe592c201432398256d3f9833164cbdf44f2fc65f2e42f463cf2d5550bea21516883753d38a6825e264920ef4c870a1985b2ca02600ddae0be4edf7dd462a233f2034a0bc57a46e9ea16911e32b7cf887fee716a026cf43d9f901b374958f8ecffbaa649bbd2e12bef2d6924303449b346dade13cd139d8377d45dc34cfcc5de10e51331697ce0d7ee2919200640233a767b5822f0151f827c2fe31ebfd1c3821d3a5cdb2715b3bb068529", 0xb0, 0x8}, {&(0x7f0000000280)="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", 0x1000, 0x100000000}], 0x300000, &(0x7f0000001380)={[{@treelog='treelog'}], [{@obj_type={'obj_type', 0x3d, 'jfs\x00'}}, {@euid_gt={'euid>', r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x37, 0x36, 0x37, 0x77, 0x61, 0x3b], 0x2d, [0x62, 0x37, 0x77, 0x35], 0x2d, [0x39, 0x7f, 0x30, 0x65], 0x2d, [0x39, 0x35, 0x73, 0x64], 0x2d, [0x33, 0x32, 0x36, 0x0, 0x65, 0x31, 0x0, 0x77]}}}, {@fowner_gt={'fowner>', r3}}, {@subj_user={'subj_user', 0x3d, 'jfs\x00'}}, {@appraise_type='appraise_type=imasig'}]}) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 13:58:53 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) mmap(&(0x7f0000fed000/0x11000)=nil, 0x11000, 0xe2645f6e72003d78, 0x10, r0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0xfffffffffffffff9, 0x18}, 0xc) prlimit64(r2, 0x3, &(0x7f0000000040)={0x9, 0x1}, &(0x7f0000000180)) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004e900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:53 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:53 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000026300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}, 0x58) 13:58:54 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002fc00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e22, 0x5, @empty, 0x6}, @in6={0xa, 0x4e20, 0x3, @empty, 0x3}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x3, @local, 0x7}, @in6={0xa, 0x4e20, 0xd90, @mcast1, 0x4}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x8, @loopback, 0x88b4}], 0xbc) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x400002) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000040)={0x9, 0x100}) setitimer(0x1, &(0x7f0000000200)={{0x77359400}, {0x0, 0x7530}}, &(0x7f0000000240)) r3 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r3, 0x4010aeaa, &(0x7f0000000080)) 13:58:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4041, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)) 13:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x101081, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000140)={{0x0, 0x4000, 0x0, 0x0, 0x10000, 0x9, 0x1f, 0x1, 0x69c, 0x5, 0xffffffffffff01ac, 0x6}, {0x10000, 0x6000, 0xd, 0x7, 0x7, 0x7f, 0x7, 0x6, 0x7, 0x8, 0x2682, 0x7fff}, {0xf001, 0x0, 0x0, 0x81, 0x6, 0x4, 0x7fff, 0xfffffffffffffffb, 0x3, 0x10000, 0x200, 0x200}, {0x0, 0x10000, 0x9, 0x1, 0x1f, 0x0, 0x6, 0x89, 0xa9, 0x4, 0x248, 0x9f26}, {0x3000, 0x1f000, 0xa, 0x6, 0x6, 0x9, 0x0, 0x40, 0x8, 0x1, 0x6, 0x10000}, {0x3000, 0x10000, 0xf, 0x0, 0x5, 0xaa, 0x8000, 0xc11, 0x40, 0x6, 0xc9f6706}, {0x1003, 0xf000, 0xf, 0xd4, 0x6, 0xe7, 0x7, 0x200, 0x690, 0x1, 0x2, 0x2}, {0x4000, 0xf002, 0x8, 0xffff, 0x9, 0x0, 0xff, 0x8, 0x4, 0xfffffffffffffff8, 0x80, 0xd3}, {0x7000, 0x17000}, {0x5000}, 0x20000008, 0x0, 0xf000, 0x120, 0x8, 0x400, 0x5000, [0x9, 0x6, 0x7, 0x1000000]}) r2 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000080)) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002b400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x58) 13:58:54 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x20000) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0xfffffffffffffffb, 0x4) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000000c0)={0xffff, 0x80}) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001fd00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f00000001c0)={0x8}, &(0x7f0000000200), &(0x7f0000000280)={0x77359400}, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x4, [0x7, 0x100000000, 0x2, 0x5449]}, &(0x7f0000000100)=0x10) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000300)={0xb5d, 0x31303453, 0x8, 0xa6e, 0x1, @stepwise={{0x200, 0xff}, {0x9}, {0x9, 0x4e}}}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r2, 0x100000001}, &(0x7f0000000180)=0x8) 13:58:54 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x448840, 0x0) ioctl$KVM_GET_PIT(r2, 0xc048ae65, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@local, @mcast1, @loopback, 0x6, 0x9, 0x3, 0x100, 0x7, 0x980000, r3}) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') flock(r0, 0x8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video0\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x1e}, @remote, @mcast1, 0x7, 0x6, 0x3, 0x100, 0x1000, 0x18, r3}) flock(r0, 0x8) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000005800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x184, 0x0, 0x800000000000040, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x400002) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="ff070900b9a834df670b010000000600ff7fff7f090009008e0e"], &(0x7f0000000080)=0x1a) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x8, 0x9f7d}, 0x10) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000440)={0x3, 0x1, &(0x7f0000000280)=""/160, &(0x7f0000000340)=""/174, &(0x7f0000000400)=""/57}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000240)={r2, 0x3}) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000180)) 13:58:54 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00000000000000}]}, 0x58) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000069100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:54 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000180)="1774d7346cd47503ed45d9c098bee649eb2e8c446b456907f58d8c47408a948c72978d1c8c44f34dac12e77fd125691d197c89cba5a1bbf00098e2f22f033e0728f5ef434af29b02c0b5573c66b93937c78ad38071f80e5380", 0x59}, {&(0x7f0000000200)="cb82cd2376e8df0a5b5aad2fd0b17729ba826cd404b239d45e16f20b6f820a2a3eab9926487f4bc25aeaba124c34d0fe8048ba61b214eeae1ef23417e3480a26f81136aaaf94cc20e5b8cea941e1699d3d5b9d37676cec16060ba6879f0f6eeb9435f006a0", 0x65}, {&(0x7f0000000280)="eee4d414eb851c671ee6645ca34fb53ee17851cefa67492a22e4d4226172320e67b74ffb6a558705d081ac449d028761d30a82e4518acedc33eddf08c063cfb3472f9b08d7c266c46c68bdef3100fd6eb6cc7d218d7a74e8aba3098d28aa22a5170375985fc0f8c4e02554f586a469e08b361fabd5b9e3185dc59f9f45efea6189dc42ac5248aaa920d30e6d8d4ea0de89e946be1c85dec2e29dc0b4c0ecd5511a074bbf62b650108cc6df3ff2719f2e0ef284c05d081f8cddaac3f120e358f68b4308bd4601e021ef07870d0166b23a16c9d86c60d1ed50cadde1b01410bf2bffef05f5807835e32245a7e1d3bedbb3d4b39626f459ca312067339f928ebd2f769ecdaec5228ba3a3968dc3e90bbba8edfbae6d36ff26312ae0d5dcbde0d8a3a91f0d9b7b24bbcdcd1910a087540c7ae726337ced1c6f0e353c3f81e70046d7f54fb98eb16948dd0f7e06327e924a3a644e2053267286a6d0dc6795c67751291232bf4be229d1e63b446f56f4906d1a3f8d047b6395f3530ddd1724ded3f67e2344192b2cebf461e4357b126f0eba38d199d8467c1744930bbe2d25e165830db3feed3304f5467680c9e6abe34d314197840f404ceefe919b215352d6808d2c73013f31d34487f1b146c7dd6ea9affe974734095628f40f242d0eb003f0aafc2cb2cc9821b80e530a0314a83ae89031240d428695f7de0166f0681ecab3c8360e81e366d76b8284b48c3c3752cc631b4668a93d30d04dca4f3dbdd64234cd1692a80efba106fda679e54188f0ac8ff795de36f0e4854ab4df04c3c0345474f233b6cf755d56baac6ad273a7edd4174ce39bd7599e2055dd130084a6b28c6e391e39630cd842daa58d35380ae47bb632a26400bab32c54f3cb0f67d0c8269ed5d18f896fd0eb9ac3d5ba21b5266635c989a6286ab6fac8274fc43e3c763ec102676da1af08e2dcb1fbc9ad5e26ded339da31207aae78ddf11a8a560f5605f248440c1c6e0045b2deb6f016d9f74060196292ad15eab65de4b750e50dcc590b38dbdaf4865101d115e3339b9cffa3cf33e67370e81dff7bf0f1cab8d5951039aa386fcda53ce6086bc7452f5b8f6ae1d6289242406ef6f85f2e777e5c1aabc2ee5f4e26f03f10f13cd1d64abe3cf56fe4df6b146fcc8f57c8845b965598afd88ee79bd4b76919686dfa87e6977e100849a6c9dcc4ce2888da149d720636aa038debb1499c7c29c3f974a0c46db16e355c35cca69a0bff7305856211f6ebbd1e5f52af007cde6ffa210cdcafee24d5a185fb050c768b3ffad000153b09b56d3d2a194234dad4fed8d7a555f6bccec079265188c0c7228f89ac8d635e74d57708e66c9a7d02a47f5f183589e04ba0c31f32d649888004f499c0bbcd14f4adedbf845d7bbed901de17411a3263551b8791ddd1b321709e9594ddd310597c0182b18232d3a674de6376fcbad8769b22c651d12e47af19943b77a38c1b9806dc1d9655d868c31585f6e8a9a6f654ed06c9a95a3693577d183420166ae0864dafe6f19c96ac033527dae262cc9904d03e28e1fc9c29216aae471ace5d63a5b14a464616ca8930b33050ad3c6650d5c4d29ac64af694ee7a6cc9f31236317607a27f84c80443c748a109a6edebc6ea01a27ab5b43e89a0e4012823d926d09ce44399c7d53bca7b6acd45ec65a274bd29decdba20c5f19cd2fa2adcebd72afca9493cfa975fb494990afc3416e1c56e43f08baaab4b6c54302ff8722b289c59a9723e98f1c25fb8596c9fb86f7add833b5ae2b6482a86e674d4c9066705596ed993dd8af84a73632a537b4690a6816e7f5bd5bb8bb4524e54edbc54918611e7cca1150f96de4bb6b05f471a2d93a2f48f473c36f9e8857daecce2db9ffa8c042146110284342a1aa97fea490449057d86f17e1ad70f06942035a3cbd42d846e99e077d3196c69cf5e50b6b2e2148dbe341b2b1c6fa90dca9eaa28b0dbb4e5acf06f948925981c852d8b5e06c5e981f0b3fc1264643318b294d7f9d12b48811c83b17a099c50124009fe6a951e600c671bf44be26d9e188e499255200002157af4d4e15ba5d10f8d19fbbe23518c9b97ae177f992f64064e9f987e02b978f3bb59010feafc5a4be9329f29197f07d88b7e7e13c493f7ced54499676fb885b6e738a8980cd08b5e60bb73aca1acbdfc163d9a0c03db800b3a85b9dc27d4f405f543f664bb28253155f2d34cd4891a665c8790c048e5e066ccbaa4f907d6fba897a27c06c09475a65f7e8de424f5d25ee11fa8d7efd338559bb93e13c71d14a2827f08a3014cabb67b7284ac9f86aca4209160324902601c836399c75a3ffdad949a52b281f5d76c234f9593d256d209d2b2b919eebfb8f09a9d62ac7470a670cf9f99edaefb10364eda6fba5c9dc44d515aac9277a5c6717cee501839f38105bdb1613b62adf7cfcbbe9a3f928650d8d94c8e9b2c513ac08afae2eed15a8203a23a2e9c479e722c4eefa93f6bed7f63f55dd4b6c32886fb30ea5ac3024050a4bcce1746e9005e7238a28a85cc112c42e0c50662b8d2c127315be6509879d6b9a6607994a4629015a44482edf309996248e6cfa10f0695796284ea4678fd267410cec629b20a4598c038595c6882b47ee3f285334eeb1a5c1b3348934b2a4f413875fc33d03a479b7fee3485a46e9e8321de54c42fb69ef90a682ed83d25979471c1a66fc9274e17cce3aab4f5eee2f23cdbd788ab697b551bef327032cde2d62b18c4bc9e23ead3991988abb0bd7623f6c11eb3c5be01a557837d3a8e892233e632d280ace30f95cfcda503fa4e81403ad9dd7eab0bbac16e76e64a1b476bfdc849e117c0c56ebfee1658e8b4badb73b69f4c92007ab624c025e97a6ab46e9ce7a6d8dd52133bc6042e54f0e2624cb8bfb11afab48818ecbbcaf8aa85cf26a736b5a762078ae24f402c190aa124146d68bddf13c30868deb43dc284a66bfc55bc49f5b99e6a527eac02ae04c67fd5b1f38ee28bbda9d81adc59a0c815ed399bb78b8a9104d9497b178fe0e93f0827657ed281000e5145812038cb5b5a987394c7184210ec54e8f4ebdeb50362588cf31c0282ee55a98e1ad171dcb28af1967995b9e2971c200fdad4a8d45666042bc4f6d4efb490d679858cd82d50c9c55ff9a2fe64200070747d18db301cc03b2e42c547651b820dff92f86994ff42f8fb15da8c8b5e738378de100309b8a0ed513daf8163d0d779b5095d50c2cc595a2aab12508cfb8d11b105ff30df45182f01c0f793394f831885b8b555468ee363680a6a20ed7ca7ab57e4ab550a8b30d6a700f3c550d3b4414b6c4a231bea642327b7a8975926b13635b7ce5e7c2e7226cff1b390ffb8e22465826807c6b044172392800bd5cb8b1b1b11bd66de6cda42301961beee4364c5017ad6fedf786216c2cdc6f86726639e66eac6a326be65f4fbbb7a96b9511781ce4a79d6252d0189cd9cc2e32b34f99a424e532bcd44343e70796b1aec3183377c2b0e1c3c1f81b5456339f307c0eed771f873c05ed1be674881d7f6c393d69f697fe547b46d4158d09f046bb72e43d024cc75a31d8aee24eb37f1b21536c7efd893cd43733c8583c47c56743e01f3c14c4f22e5fc738acf7d216c310452b98fb608897c6b6ece3b62e8f3c913e53392ad55855b5941dc65a3a3e4479f9887616cc55b919f25d29cd36f4ad5dc119822003982a20bcfa54096de57f42a5aa1685bf6dcb7d9e7e2e1c3b6988b6e52cc1eea6ab0bdf7a81391cfe2449a058953a408d7dcb610643b01e966cf0920f5cd461442a7f008809c77842b8aa50b2b2fcc7d1b288928cd2a6149b7056f5057bb69ff7a4c27dbecacd73ac02ba46ee9ddd1b51ea8f3f3e3326eda2804f5acf00bccb294baee057c28a81bc436baf31511345992313f1bb96a31fc0f991a07afe8be93555e9a4b17c6ce4ceda1865a0cd8d2ebf53d5155a87b849e80f1d34a3157d7c9ac3ca29ada41b147bb504628ced76c46d8284f35c539e9c82020d05104c22e0dcee4b9982ca9fd7e272f59e596f33225a6be1a5b9b3ad77a7e2f6fa6131b003f7dc9654a401323da83f1ada5b38a4e2c5d8a456f6429cfeba92ee3f0b86b526d5a26bcfcf116e4a2ba49d1dbf26a52d79fbff74cdb0b7c9b39033116ac34ab89b32ce641413be301dd2b20ddd43719b35e65c3da6ca4c42f2cc2e4ccbd6164834b79a5b89af3f953fc480428327b21ec688212d81f03d069bacb0070fa05f9e372858660ce2562883ce6f33810b60c47889299666892eb76e1bc9de156b4771e1f3557fd81ad65ed76a5526c1e31b6090d2c83c74ca0936a0ed1cdba53a61a213e200a968ae7ecfd099ade05cd69d302d8c978c11b8f871580ae570616a54965ba988721f32d816aa016e36328a32cadf2159827da847a9c8293e688296717fe9b49dca549c0250f6b3045a66e02f4930dc03ca1d0c3d89f31f72faf9875d79e4e4386b9fa34a7f157db3236aa47225af6d6912acb2d78cc95835db70e8418a75cfb18392840af1f8081a3ca9e0da170e445cc0c13de0e524cb2083176f73853360171937fac3ba38621ec3f6d25bc5a6003528c9a7bb7b0eb88b657f551668b9d267abbecb1d2b3ae55d08ac49e0ed0bf2996eb9bcf0fc9574606e80657cb4fef799a1a03df16160086c7c81023319247a95d2427e2f61df2e6f5aa288831315534076f7423db5396b33fb798255b39c93114edc9f8c11402ff46cf109a1b67bdc6cef5eac4ab4b4b3ba26d174bfedb96f9b4408c25299104bb1e934be737820b8d60b0eda8d0673e08eef360fb520d3ced9f8521cd5fa5003f7a76fd45cca0d0af5a17e3810b93f07720fd8705bbafc79e794bf3e3fdc711272d37f8d854f03eb06fbdd4c9aba0fcef69f3aa40aabe667756b474ffbb2d4fef27b6e59f4d1e39498f0c2037b99243fa58bcbbc52396dd7c71d6bd4f98e5d16a11a4aabf9317811c0044a27f1d71fabd63a8c14728064a957255c7684d0cb7df6c7cbe6f27c2fca66ad8267fd1ecf57723db201f0a2ab4b25307bec80e43d8e552852a74a67d0bec61f8182136f265f70f282649749ab3680d2772458d961f96243abd9109cebe4f92e2132c80fefaf53856851ce1a4fa572d3688d53a8c07e91cf9218e691e11eef636edf112a03756273cc502f044ae8f54ad518013df390cc341997b1c912d4684296c0dca6940de4448dfd148a469497175a76a968b42477d37a2d06a75484fbf6d78754e9ddef48b56db25864706d7d749424e662d34e377925bc23f4508421d9f759a0f275e949695b9da335bde76eb60d0f8d6ea8a72a9f031926472d964356b0a6440efc004a0bbeccd198aee1246cc711b4bb3f55875712ddaef850163ce9a967688cd8d5aaa0a8a60e00c07c9b37eb635d11d9ffea89ad25872402b2646d3b4f96b9564c424bfaae7cf06815d78fc74d0d2217b1b4e047a8cd411c12e23f9d845f93bebef20e8d9cb61c8f8543b2db122f6d74401de3fad506cd11d947131169eeb3b13cfb22c1c5221b1c86e131e18e40f04872d004fc4f6344679b5ffc9d02cd4a99278c45c67f5b4e5c342344d212e21cc6886ae55e2fb38056b383e5c3a52b6e2c7e4b59482a1ab006ffd904b92a2065258fc87d73d13a791d46688c5f212b6a43622d6d88dadcf7b33a7c73e6cd43f0f67d90b94db867a030b388ecee2dc8cc761aa7030f6ed422c1052af284f082c5217ed3c999441bd583a5dd01a951cbb48a25e4b20b1d89855fd5718439a52a4d7bdb51190aad87e", 0x1000}, {&(0x7f0000001280)="d6d3b570c71417f8ba6460f6ee50bc9dfc03234cde3dff7568cf7e3efe502281a21b7c9241ccdedec4104ca2921fa63383eb622551b01b576cdf57008d5e6f622c61ad830fec4f68ddfe5fb87b2084719c2ffa25e1c3206654dca1c3d02c9d2a672c404fd774fb965526983991e8af86dd710f5ec2f340b6b281ed70c4733555254879a22c1cc2a1dd3371c39f325c996fc63174dfbecb", 0x97}], 0x4) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000001340)='/dev/audio\x00', 0x200, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000001380)=0x1) r4 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f00000013c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = getpid() getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000002740)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000002840)=0xe8) getresgid(&(0x7f0000002880)=0x0, &(0x7f00000028c0), &(0x7f0000002900)) r8 = fcntl$getown(r1, 0x9) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000002ac0)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000002b00)={0x0, 0x0}, &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f0000002d40)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000026c0)=[{&(0x7f0000001440)="8b7bd0c0289d9ea50a46a34317be1a88c33012a71269fb4af02b1af1a7e2f11ea1971af68ddda979026c534acb6add335d9041f7a6cb8b5a5187c0e9ecf7c468c7b4f2090768643c9e429f31559c98c8ec62694e1336c7453725544ff2ea3b27948375", 0x63}, {&(0x7f00000014c0)="eaf2de0bc662f740370d942722e0e3967ea0afeaf803af56d2f8a747ca45502865ba45884526ffc470c9518a1526dbfc13705290499ad0b36d4a5216d380b5b7089aaee3619f8c4c4f39bcc77083d66b707a711ea0e18b84dd95bcc7cdcb86651d", 0x61}, {&(0x7f0000001540)="7e10fa29449d872b02844c624ca9ca6baacffe430e75d10b20f3e4061aaf84687556cb66078f013ff704f3626d04a6069c0103e69e2a971d8bd8e887f05b2fb3c47464b4ac61d2890b1c52cba4f1fe07ce7a812a65ac5d2ab8d79a251fa0811202f27e54b16d51495f5863621db9e0dc77e72651e4e03e961e0fda825753bcfcf7f1dfd93af0791a641b590f94b6", 0x8e}, {&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000002600)="9f21dad6d24364a0105811da69bb4dcb647fd24838ff3f7436e770645c4ecca8fd87b05437ff6f1ef9f0124a71c0dfe71f6ceafdf1a56eed0323ac3993431f485683a07ce0c4515da425d4986a10c9ca99ff3a64973888670837d03efeb25f93f86e2761c9a6f5257fb4c28d7617dd28293009ba5c3df78b820d4a40590a32eb94764c8cf7", 0x85}], 0x5, &(0x7f0000002c40)=[@rights={0x38, 0x1, 0x1, [r2, r0, r0, r2, r0, r2, r2, r3, r3]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r0, r2]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r3, r2]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}], 0xe0, 0x8000}], 0x1, 0x0) syz_open_dev$vcsa(&(0x7f0000002d80)='/dev/vcsa#\x00', 0x8, 0x0) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 13:58:54 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000047300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x300, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x80, @remote, 0x3}}, [0x0, 0x6, 0x15, 0x5, 0x676dd6f9, 0x7, 0xfffffffffffffffe, 0x4, 0x31, 0x5, 0x410, 0x1, 0x3f, 0x86c, 0x8]}, &(0x7f0000000200)=0x100) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000580)={{0x2, 0x3, 0x0, 0x0, '\x00', 0x6}, 0x3, 0x0, 0x0, r2, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x9, 0x3]}) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) r4 = openat$cgroup_ro(r1, &(0x7f0000000880)='cpuacct.stat\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000700)) futimesat(r4, &(0x7f00000006c0)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x7, 0x401}, 0x0, 0x3, 0x3f, r3, 0x3, 0x8, 'syz1\x00', &(0x7f0000000140)=['overlay\x00', 'vmnet1^\'cgroup%posix_acl_access\\{\x84\x00', '/dev/ptmx\x00'], 0x35, [], [0x0, 0x0, 0xffffffffffff7fff, 0x1]}) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)={[{@flushoncommit='flushoncommit'}, {@ssd_spread='ssd_spread'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fowner_lt={'fowner<'}}]}) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000880)=ANY=[]) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fec3bbd3d48d38a6e5f725074b96c09fe25bf1dc72c440a6"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) ioctl$SG_SET_FORCE_PACK_ID(r4, 0x227b, &(0x7f0000000780)) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000180), 0x6, 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000c00)={0x0, 0x5, 0x81}) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0xf0ffffffffffff) getegid() getuid() 13:58:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000031e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:55 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@sco, &(0x7f0000000180)=0x80, 0x0) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:55 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x58) 13:58:55 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000000c0)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:58:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) [ 1721.673402] QAT: Invalid ioctl 13:58:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000001800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:55 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x20048900, 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='.%(\x00', &(0x7f00000001c0)='wlan1$)\x00', &(0x7f0000000200)='-eth1selinuxem0!wlan0procem1\\\x00'], &(0x7f00000002c0)=[&(0x7f0000000280)='!.mime_type)[,nodev\\\x00'], 0x1500) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) [ 1721.807800] QAT: Invalid ioctl [ 1721.852849] overlayfs: failed to resolve './file1': -2 13:58:55 executing program 2: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000580)="f312cdd39e5245f42d993014c9710be04c0f3c904af82b67e551b003dc47af367d712e2e88b71c9dea41e950512ace2b848bcea4f4cbc552000357558201a35e62a358a2cecf1a2f528b35b40a8ed3eaf1ab46966071bd5bba699f99ee5470cc5d4d85305050357e20daebc48580a4da1d127fb9c19201d3b3a228ed7e8bd5f4483c6f407e21901ea819e6860a392d6cad96c7337fc520071907bcded866b7e88f122e1c46d77ec721e133be1a", 0xad) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x200, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r1, &(0x7f0000000480)={0xdf, 0x7d, 0x1, {{0x0, 0x4c, 0x6, 0x2, {0x8, 0x1, 0x6}, 0xa00000, 0x3f, 0x904, 0x1000, 0x4, '\x04\a\x00\x00', 0x8, 'security', 0x6, 'md5sum', 0x7, 'ppp0-@\x1b'}, 0x7e, '\t&\xcc\xca\xd5\xec\"q\xc6\xb6|0\x06\xe7FnhE\xf1\xf5\xec\x17\xd6C\xcb\xfc\xd3\xf6\xba0tI\x8fQ\xd8\x9cQ\xe0\xbe\x97\xa0D\xc7*\xecx\xa6p\xf7\x80\x90\xe4\xe4\xb6\xd9\x81\x81#K\xf4\xc3*\"\xcd%%\xbd\xbf\xe9 \x8aR\xdcw\xedBSbd\xc0\xd6\xf2U\xd8\x02\x0f\x8e5\x00\xf8\xc2J\xcc\xe4 .\xf6\x89\x99?\xb4jg\xeb\xd5d\x84\x84\xe1\xa1\x8b\x15S\xb5\xeb\xd3S\xae\xa7\xd0\x01;~T\xc4\x8e', r2, r3, r4}}, 0xdf) 13:58:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000027200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:55 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x2, 0x3, 0x6}) 13:58:55 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x11}]}, 0x58) 13:58:55 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x10000) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000100)={0xf, 0x100, 0x5, {0xfffffffffffffff9, 0x20, 0x8001, 0x2}}) socket$rds(0x15, 0x5, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='encrypted\x00', &(0x7f00000001c0)='/dev/usbmon#\x00s\xf3\x8f\xa5q(q\x84\xd7\xc53[k\x90\xd1\xaf\xde\x96\x8c\xc4?;\xcbB\x01q\xa9\xd24') 13:58:55 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000045300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000079f00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = geteuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xc33, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="8fd06c2c58d00e467c5b2d3fcc31123ecfde0c5d20b3339ef1aab0e7067b96d7a9af39893be25e36f870b6ea52a1fc8804ff2d1239a5b0714692bae733bb867b24391757984a6ea40d88bfe8a9495a4f0da09dbe553c4cad86bab3011e567ff4cde91dc415f17343187098450639907f320885b5e1735779122c68e9db900ce714a845d3", 0x84, 0x7}, {&(0x7f00000001c0)="7a788971a92ed86621437fac00017515cb7a0874b2d97137122b50a9760729b1799c3fee25bf242b0875f080b10afc80ae5688c7257be8b013dd86d0b8394d930f38aede7f4a8ae1468f30a85b92927efa47d0ad3b0d4fefd45c21e20aa553afaf185908aad1a594ecb620e18be6fd8c4e1b75be9779f9d90540f2f2fbb9dba2780cd090e213e1a8097d398fa6e7c122572b44d782364f6ef142d78cb41f14f5a4ab309d64fdce6df8735b6cb013705df83db405bc5ff65506144934e6723e5405b318dbb472aed2560b02b1597a720d43ca4ad570a2c28c711203e41caec23807c6ade925d36ca9c132470afb16788ed14f1ece", 0xf4, 0x100000001}, {&(0x7f00000002c0)="4b84c02416a0f0cd309278e80713afe01514e1c24d17dbb79e5b7296360df0b7e04e85525bc4009f1abfc3e816089858ad849be0a725f60ac3aa661558c71b4fdd8e874f534b538d777ceb08695f8873169cf1", 0x53, 0x2}], 0x80800, &(0x7f00000003c0)={[{@case_sensitive_no='case_sensitive=no'}], [{@dont_measure='dont_measure'}, {@uid_eq={'uid', 0x3d, r0}}, {@subj_type={'subj_type', 0x3d, 'nodev\xa0)&vboxnet0,%'}}, {@fsmagic={'fsmagic', 0x3d, 0xff}}]}) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000000)={0x21}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)={0x2, 0x3, 0x6}) 13:58:56 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="4c54420cbfefe7998225c2a05c769732f8ee9478fe06a06bf52683630916a636119e0b5d31f3142a19c57ca4a20ec995175c73f3cfbd6710f4f40cfa32eca3a935ba00d3c967738a38d953bc3eb57d17b7b4fb9a082d201b4aced45663ff27e34e3a9829d755dc4eb7841e1e968242fb4ecb2768236395a46f51f9bd71749c43c8688129db408e3e15392ba0df59b56a68e11f", 0x93, r0) r3 = request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='encrypted\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r2, r3}, &(0x7f00000003c0)=""/16, 0x10, &(0x7f00000004c0)={&(0x7f0000000400)={'crc32\x00'}, &(0x7f0000000440)="c64372e9ae5ebe5a2e6265b92a4d1a4d83bed0fda4f017f63f0503c4bba34e8221d10e4da353c36e76aab88cfb5629507d63945d7a4eb0b886ff62991e3b423c750f15cd661ef963f1d263f539a7cf20d410515e9686c32d297691417cbe8ecc0c8c4266efb3bfe4f12818123f855b8f562fb11b6ca79d8407359197d44d", 0x7e}) 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001be00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x58) 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000020a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40000) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000200)=0x101) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='encrypted\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='L\x0e\x00\x00\x00\xea\xff\xff\xc7\xfb\x0f\xcf\xf3\xc3\b6\n^)\x9c~\xbb\xa5\xe4\x8e\xfb^\x86\xe0\xc6caw\xae\xd4\xa2Y7\xc6\xfb\xf0\x89\xa5(\xee\xca\x990=\x06\xfa\xea\xfa}e\xa2\xaf\x9fH\xcd\x05\x8bdO\x9b\xe9\x06\xb6nV\xae\xce2\xa8\x91c\n\x85\xe5v,6@{\x14\xb5}<\x9e', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x4, 0x401, 0x2, 0x0, r2, 0xb20}, 0x2c) 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:56 executing program 2: 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000036d00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) ioctl$KVM_DIRTY_TLB(r1, 0x4010aeaa, &(0x7f0000000080)) 13:58:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x15000000}]}, 0x58) 13:58:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = msgget(0x3, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) getgroups(0x3, &(0x7f00000001c0)=[0xee01, 0xffffffffffffffff, 0xee00]) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)=0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000440)={{0x6, r1, r2, 0x0, r3, 0x20, 0x7}, 0x5, 0xdd, 0xff, 0x4ffc704, 0x7, 0xfffffffffffffffe, r4, r5}) 13:58:56 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0xc0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="32a5b38f27000000040000150000000000000000000000000007000000000000000a00000000000000000000000000000000"], 0x32) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000043c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 13:58:56 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8001, 0x103) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000040)) r3 = gettid() perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x8, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x2, 0x8, 0x4, 0x2, 0x8, 0x8, 0x1093d679, 0x1, 0x3, 0x7, 0x200, 0x3, 0x1000, 0x100, 0x8, 0x5, 0x799b, 0x9, 0x80000001, 0xfffffffffffffffb, 0x200, 0x3, 0x3, 0x1, 0x0, 0x1, 0x4, 0x80000000, 0x2, 0x0, 0x9, 0x0, 0xdfdf, 0x0, @perf_bp={&(0x7f0000000180), 0xc}, 0x1, 0xfff, 0x200, 0x7, 0x3, 0x5, 0x6}, r3, 0xffffffffffffffff, r0, 0x3) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000067000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4002, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x401, 0x4) 13:58:56 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:56 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x58) 13:58:56 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 13:58:56 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006a200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:56 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x80000000, 0x3ff}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r3, 0x2}, &(0x7f0000000300)=0x8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000040)=0x68) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800000000000100, 0x0) 13:58:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x8, 0x7e, 0x7ff}) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/137) getdents(r0, &(0x7f00000001c0)=""/79, 0x4f) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 13:58:57 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000077100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0x0) 13:58:57 executing program 3: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) syz_open_procfs(r0, &(0x7f0000000200)='fd/4\x00') r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futimesat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{r3, r4/1000+10000}, {0x0, 0x7530}}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:57 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8000, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3f, @default, @rose={'rose', 0x0}, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x4, 0x401}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x58a}, &(0x7f0000000200)=0x8) write$P9_RWALK(r0, &(0x7f0000000240)={0x23, 0x6f, 0x2, {0x2, [{0x2, 0x1, 0x4}, {0x1a, 0x1}]}}, 0x23) 13:58:57 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}, 0x58) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002ff00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xffffffffffffff8c, 0x10000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000240)={0x7fffffff, 0xfffffffffffff326}) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000040)='/dev/usbmon#\x00') r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000140)={0x8, 0x3, 0x6, 'queue0\x00', 0x1}) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0x0) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, 0x0) 13:58:57 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000010200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f00000003c0)='encrypted\x00', &(0x7f0000000280)='/d\xe5v\xe3usfmon#\x00\xa4\x03\x91\xbf\'\xa4y\xd8m\x13\xa5!\x13d\xe9E\xca\x83\xe6\xc0<\xf5\xce\x87?8MO\x97\x8f:\x9b/\x95y\x11\xcc\xf5Sp\xa6\x97\xad\x858\xcf8lS\x8d\x0f\x98R\xbbd-\xbf^\xd1\xcbZ\xe5\xddU\b\x0f}\xbc\t\xd2\xe5\xb0hF\x90\xd3\xc7|a\xa1!\xb7x\x91\x18\xf4H\xe8\xccL\xa1\xb2\xec\xfc\xc8\x1d1\xad\x157\xb46\xabv\x15m>\xbe\x1f#~\xf9B\xb5\x86\x8c\xbfp\xc3\xcb;/\"G\x9d[\xb8\xba\xb9}\xd3\xc1\xb7?\x13\x9b\xaf\xe8#\xd6\xaa\xccY\x99\x90qa$\xccj\n\x19\x0e\x9d\"I\xb2&\xe8z\xf8K\xdaT\xe9\xd9x\xbe\x18d\xa9|=\xad\xa2\x16\xc9\x801\"\x19\xb2\xfcH\x14\xe5\xf6g\xe3=\'p\x9fm\"\x85{\xf1\x9e\xc1\xe6L\xfb\xea\xa5\xe7E\x98\x1f\x87\r\xa3\x8b5\x8b\x00<\xfc\xbd\xceNk\xeab5\x9a\xf0\xe6BPk\xc0~\xa3\xc8\xce\xf1\x05\a|\xd3P\xe1\xf6<\xe4\xa4\xa2\xd5\v\xf6\xbd\x00Nc\xda\x01\xa7\xa8\x9c\x9c\xbd\xeep\x8b\x7f\xbb\\g+\xdc\x06\xf2\x94\xe9\xca|\xd0.\xbe|\x82\xd3\xbd%!\x87\x19\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000180)={0x3, [0x4, 0x880, 0x6]}, &(0x7f00000001c0)=0xa) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sco\x00') ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) 13:58:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(0xffffffffffffffff, &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2, 0x10200) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x8000) keyctl$invalidate(0x15, r0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000100)) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000032b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}]}, 0x58) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x80000000, 0x3ff}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r3, 0x2}, &(0x7f0000000300)=0x8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000040)=0x68) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800000000000100, 0x0) 13:58:57 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000013b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000180)=':vboxnet0\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x10) 13:58:57 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0x80000000, 0x3ff}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r3, 0x2}, &(0x7f0000000300)=0x8) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000180), &(0x7f0000000040)=0x68) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800000000000100, 0x0) 13:58:57 executing program 2: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80040, 0x0) 13:58:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000051300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:57 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 13:58:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000000000}]}, 0x58) 13:58:58 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x800, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e23, @local}, {0x2, 0x4e23, @empty}, 0x87, 0x0, 0x0, 0x0, 0xfffffffffffff001, 0x0, 0x8, 0x8, 0xe71f}) 13:58:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:58 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000047500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1724.344211] Unknown ioctl 35084 13:58:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x10, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1724.370555] Unknown ioctl 35084 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001c800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:58 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x240083, 0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @multicast1}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000800)={0x0, @rand_addr, @local}, &(0x7f0000000840)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000bc0)={'bcsf0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000c40)={@remote, 0x0}, &(0x7f0000000c80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001480)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a3c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000c8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000cb00)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f000000cc00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f000000cc40)={@empty, 0x0}, &(0x7f000000cc80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ccc0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f000000cdc0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000ce00)={{{@in6, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f000000cf00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f000000cf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000cf80)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000cfc0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f000000e200)={@multicast2, @local, 0x0}, &(0x7f000000e240)=0xc) clock_gettime(0x0, &(0x7f00000111c0)={0x0, 0x0}) recvmmsg(0xffffffffffffff9c, &(0x7f00000110c0)=[{{&(0x7f000000e340)=@can={0x1d, 0x0}, 0x80, &(0x7f000000e500)=[{&(0x7f000000e3c0)=""/6, 0x6}, {&(0x7f000000e400)=""/86, 0x56}, {&(0x7f000000e480)=""/123, 0x7b}], 0x3, &(0x7f000000e540)=""/255, 0xff}, 0x101}, {{0x0, 0x0, &(0x7f000000e940)=[{&(0x7f000000e640)=""/222, 0xde}, {&(0x7f000000e740)=""/205, 0xcd}, {&(0x7f000000e840)=""/226, 0xe2}], 0x3, &(0x7f000000e980)=""/108, 0x6c}, 0x5}, {{&(0x7f000000ea00)=@generic, 0x80, &(0x7f000000fac0)=[{&(0x7f000000ea80)=""/4096, 0x1000}, {&(0x7f000000fa80)=""/25, 0x19}], 0x2, &(0x7f000000fb00)=""/95, 0x5f}, 0xc137}, {{&(0x7f000000fb80)=@nfc_llcp, 0x80, &(0x7f0000010f80)=[{&(0x7f000000fc00)=""/15, 0xf}, {&(0x7f000000fc40)=""/248, 0xf8}, {&(0x7f000000fd40)=""/10, 0xa}, {&(0x7f000000fd80)=""/46, 0x2e}, {&(0x7f000000fdc0)=""/75, 0x4b}, {&(0x7f000000fe40)=""/105, 0x69}, {&(0x7f000000fec0)=""/4096, 0x1000}, {&(0x7f0000010ec0)=""/69, 0x45}, {&(0x7f0000010f40)=""/9, 0x9}], 0x9, &(0x7f0000011040)=""/92, 0x5c}, 0x9}], 0x4, 0x2, &(0x7f0000011200)={r21, r22+10000000}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011240)={'yam0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000011280)={0x11, 0x0, 0x0}, &(0x7f00000112c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000011300)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000011340)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000011440)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000011d00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000011cc0)={&(0x7f0000011480)={0x810, r2, 0x120, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x158, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0xc77, 0x3, 0x100000000, 0x8001}, {0xfffffffffffff000, 0xde, 0x10001, 0xcf}, {0x4, 0xe90, 0x0, 0x80000001}, {0x40a, 0x100, 0x3, 0xfff}, {0x3d, 0x8, 0x6}, {0x100000001, 0xffffffffffffffc1, 0x7fffffff, 0x100}, {0x40, 0x589, 0x7, 0x1}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r9}, {0x140, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r12}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}, {{0x8, 0x1, r14}, {0x274, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x5, 0x8, 0x6, 0x3800000000}, {0x5, 0x0, 0xfff, 0x401}, {0x6, 0x5, 0x10001, 0x5}, {0x7a, 0xb1, 0x4, 0x1}]}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x1f, 0x0, 0x7, 0x2}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0xb0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r24}, {0x178, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r26}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}]}, 0x810}, 0x1, 0x0, 0x0, 0x90}, 0xc000) 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) pread64(r0, &(0x7f0000000100)=""/71, 0x47, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x80000) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000000c0)) 13:58:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x10, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000001aa00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x58) 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = shmget(0x3, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000022500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000180)={0x37, 0x11, &(0x7f00000000c0)="ed686b5081694ba0ddb7f104692528b6d02e6d46bc78e1d773d4c647c28b892744e90f4be8707dc3f5977111e2c447763deca112e3bdf7bdc402c1f9b535065a33ac7613a2d2c836bf424ba12e2b6aa927d56e9d05c6105d1383dae0508da45c8568b8ca91d272", {0x2, 0x7f, 0x0, 0x3, 0x8, 0x1f, 0xa, 0xc0}}) 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffff80000001, 0x10040) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000300)=0x2, 0x4) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000180)) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000005c0)=0x6000) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x18) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x4, 0x1, 0x2, 0x8000, 0x7}, &(0x7f0000000500)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0x3, 0x9, 0x2, 0x9500, 0x7d, 0x200, 0x2, 0x10001, r2}, &(0x7f0000000580)=0x20) io_setup(0xd824, &(0x7f0000000200)=0x0) io_getevents(r3, 0x7fff, 0x3, &(0x7f0000000240)=[{}, {}, {}], &(0x7f00000002c0)={0x0, 0x1c9c380}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x800) ioctl$KDSIGACCEPT(r4, 0x4b4e, 0x12) 13:58:58 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}]}, 0x58) 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000006f100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:58 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:58:58 executing program 2: syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000080)={&(0x7f0000000040), 0x8}, 0x18) r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x8, 0x7f, 0x1, 0x4, 0x1, 0x4, 0x8, 0x1, r1}, &(0x7f0000000200)=0x20) 13:58:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000034400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000002b300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x16000000}]}, 0x58) 13:58:59 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xdf2, 0x1, 0x4, 0x7, 0x0, 0xffffffffffff0001, 0x1, 0x4, 0x5, 0xfffffffffffffffd, 0x2000000000000000, 0x4, 0x3, 0x7, 0x40, 0x5, 0x4, 0xfff, 0x80000000, 0xd6c, 0x5, 0x3, 0x8, 0x1, 0x5, 0x3, 0x8, 0x2, 0x7fffffff, 0x2, 0x6, 0x4, 0x5, 0x7f, 0x7fffffff, 0x1, 0x0, 0x3b1, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x248, 0x7, 0x1, 0x0, 0x12a, 0x3, 0x1}, r2, 0x3, r0, 0x8) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000001c0)={0x14, 0xc3, &(0x7f00000000c0)="6655e77dc3703e8b6333ff3422a3a68de4d050608de44fffacac79a556101f7650419a15640399e72bec9fc4e69026ac9ab73df3db995a730357f56b7cd18e035bd9be6eda041b7a26592d16836d307725cb3b584034598718a09b58ae882f59bcf42cce036c6d83e47ae1434188f7f5249d3c3d057bafa70f4adad3bd9c91895ec88381ba25f0e316384fd5361789387bab756de986c4d860a6149972019c518fcae57869b028927bb6c8cb0708896c377d3e6fe793474c41dda5cdb0c47c799e68cf"}) 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000018700000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:59 executing program 1: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x4, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000023b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) dup2(r0, r0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 13:58:59 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x1) fsetxattr$security_smack_transmute(r0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x2) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0x7fff, 0x68040) write$9p(r2, &(0x7f0000000500)="022b02e283c2b65799379c8ea4054a67cc22d6f3c143dcfda820f3426d2224ed07607b0685526c4b4c79cc2cd6293082071b1d41066bea4fcb6600fc5156da558ac84abbe05ef41c878f451530b7d05ba865c99079781e966132bb5444169bc67aeac4fbdc5f6130d75a2b0f723923acbcb8ee8e1c087574d3540fc6de24e2ee3edd68882ed34f23", 0x88) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x204000, 0x0) bind$x25(r4, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000700)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000740)={r5, 0x0, 0x80000001}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000640)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000006c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000600), 0x0, {0xa, 0x4e21, 0x1, @empty, 0x8001}, r6}}, 0x38) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() getgroups(0x1, &(0x7f0000000200)=[0xee00]) setresgid(r7, r8, r9) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f00000005c0)={0x7, 0x4, 0x2000}, 0x4) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r10, 0x315, 0x70bd25, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x8800) 13:58:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x58) 13:58:59 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 2: pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000800)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000008c0)={r1, 0x2b}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) r3 = socket$inet6_sctp(0xa, 0x9, 0x84) fchdir(r3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="61e688a6318418f23d6b5e45a99d1fdad8b3f9ea28a855a21c6451abf9a9c4a9674ceccd3a096ff3fb64ef6550bd762e7b67ee1c8c6dc4fcf6279f8dc6660ff98894a91a40ec671d07748f8737aac8177d526b0437ad55ea65c44818b103dc66a9acc7c8bac0cfd642f0a6544a1d6447961eed2ac50ecaabd97904a288078f83cf7d21fb99fc5e9216738af153712a33293618e397864caa7a00ca429753c8a7e72c511d441510ea30d0206b6aaf5628de408da9aea80bc144c37f511d65cae8440f5b5e0a78435a3858f3ccddc8544ade2421f278c04bc36b", 0xd9, 0x800}, {&(0x7f0000000200)="c8f33100b6722c0bab2c344b41dcd86df2de14aff9079e13d648ad368b09fb91f9c4539991240e8b4ddf0c506ee1e1f5d2231942771ceff86771f515b485bf2a4631384fbb9c41d7dfeb166a8daaae51aeba67529816b13a08753d96e39cd195e73ad572586bbb35a823f03d5c1c311afec3df779d53af1314f6a160991f9767e7efb001b882adbcb7831a052d98989c27d8398b3c7f9c1fb30ca9329b28b7d4a9515ec543ec4e8006e973d9681c671e7dcda712a1b5a336e9db32ed868f36c21e44cf374b333aa1ad64f9d4", 0xcc, 0x81}, {&(0x7f0000000300)="8dbcbed37b45291d302cfabab403dcbf8f2e743ba41c58be0a1d9e9773ffa5d1f1e267b2afc00a9657b64ba8066c59048c4b63e217b8c5a6cce33f73d83d0cd3730fbd9509f5b8cdfc02c95109176385301f274c52f323a3758fbf695a6a67330325abdddda9f1c8d89109884edae10d7e2478649fee34859b190776870fde1c", 0x80, 0x934}, {&(0x7f0000000380)="02435335f6d0ae1be98924a9c05ad767e88a083d7e46ba81e77540107716bd02bac03047f769dabf0e58bd93c13a72d29051109705a3d4e7ff68b12cdfae94e5846961e2a97e38e48b8404ca20611690a6f136bf22c23a13ee0ecd4f82d3f0b11039bdb90e30a82932bd21", 0x6b, 0xffff}], 0x20000, &(0x7f0000000500)={[], [{@dont_measure='dont_measure'}, {@euid_gt={'euid>', r2}}, {@obj_role={'obj_role', 0x3d, 'eth1md5sumsystem'}}, {@dont_hash='dont_hash'}, {@smackfshat={'smackfshat', 0x3d, 'jfs\x00'}}, {@obj_role={'obj_role', 0x3d, 'jfs\x00'}}]}) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f0000000740)=[{&(0x7f0000000580)="2f2800b84ce0ac3c9073ffb22225c9f49f7969b7bd0ce785eb1d73d2adc16b5c1877baa5fd3ba7fcb3fc000f25a5786b1794ed07b69d1567e2faa887c55149770dea85", 0x43, 0xb991}, {&(0x7f0000000600)="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", 0xfd, 0x100000001}, {&(0x7f0000000700)="9692c5fe8067f8bb885e1d960e432559feab5815d2bb1645d4d2c80023ad70735958ea023c24b7bc7f3d38d237c66f8258e36000139fd1697cbf04a3fd44", 0x3e, 0xf95b}], 0x821000, &(0x7f0000000840)=ANY=[@ANYBLOB="89a839673539ddb14b63ce7a2e2aa661636c2c617070723f6d61636b66736861743d657468316d643573756d73797374656d2c636f6e746578743d726f6f742c6f626a5f747970653d2c000000000000"]) 13:58:59 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000076b00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 1: r0 = add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003ec00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = shmget(0x3, 0x3000, 0x200, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x300, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000040)={0x5, 0x100000000, 0x6d, @local, 'team0\x00'}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x12}]}, 0x58) 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003d000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, 0x0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x6, {{0xa, 0x4e20, 0x3e, @remote}}}, 0x88) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x24e, 0x0, 0x0, 0x0) 13:58:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000aa00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:58:59 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, 0x0, &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x634f6d62f1e90fac, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x16, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:58:59 executing program 2: lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:anacron_exec_t:s0\x00', 0x24, 0x1) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0xfffffffffffffe59, 0x0, 0x887c, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) write$P9_RREADLINK(r0, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000b100000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, 0x0, &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:00 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000}]}, 0x58) 13:59:00 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r2 = fcntl$getown(r0, 0x9) ptrace$getsig(0x4202, r2, 0xfff, &(0x7f0000000000)) 13:59:00 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x120) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000100)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0x6, 0x19c}, 'port1\x00', 0x8, 0x1000, 0x8, 0x6, 0x4, 0x0, 0x2, 0x0, 0x4}) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000000c0)=0x1ff) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000025200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, 0x0, &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:00 executing program 0: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xf7, "cb98e46bd8565f93394e5cd589d30cf8e6591068019c896b993fe1cccf1a264d6d63f833868546abb1c53af569f106165d20dfe6f7f6655d05ffee2af8c4ad7c897b6c0e2cf640022ba60adf77a28d08a784be3e973e0f0de96d6708290d89d477a61073af7230a89bc3acdb017553b3f648d08263b59fae4a8325b66bef432f744a4a722a27d09d384ee073533a8be9adab4ac4343b3377c41aea4a62a2aeadff2baed25832c791989bc4708a8a6e1e6ccef52e2ce49a63b5738d1533e820b2911d1e9cf5f7244daa97c5adf8e8fed30610bbccd07bc4ad96839e50482d8cbdd7dab535a5b17360554947c3ee7329d0c9a1fd3c0e4e1f"}, &(0x7f0000000280)=0xff) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r1, 0x1, 0x8}, 0xc) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', 0x0) 13:59:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xc, 0x40) execveat(r0, &(0x7f0000000180)='./file1\x00', &(0x7f0000000240)=[&(0x7f00000005c0)='loose', &(0x7f0000000540)='Vs\xba\xa7\xb8\x1c\xe1M/dev/dsp#\x00'], &(0x7f00000002c0)=[&(0x7f0000000280)='-ppp1\x00'], 0x400800) faccessat(r0, &(0x7f00000000c0)='./file1\x00', 0x4, 0x100) r1 = getuid() mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x80, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap='cache=mmap'}, {@cache_none='cache=none'}, {@loose='loose'}, {@afid={'afid', 0x3d, 0xffffffffffffde7c}}, {@access_user='access=user'}, {@cache_none='cache=none'}, {@access_user='access=user'}, {@fscache='fscache'}, {@access_any='access=any'}, {@version_9p2000='version=9p2000'}], [{@smackfsdef={'smackfsdef', 0x3d, 'GPL'}}, {@obj_user={'obj_user', 0x3d, '[lonodeveth1eth1keyring/em1,]eth0wlan1+---:-'}}, {@uid_lt={'uid<', r1}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-ppp1\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '@'}}]}}) linkat(r0, &(0x7f0000000100)='./file1\x00', r0, &(0x7f0000000140)='./file0\x00', 0xf4e9d07d63a004) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000004c0)={0x6, 0x3f, 0x7ff}) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000031300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) 13:59:00 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}]}, 0x58) 13:59:00 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x7f, 0x4000) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000b80)=@broute={'broute\x00', 0x20, 0x5, 0x918, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000240], 0x0, &(0x7f0000000200), &(0x7f0000000240)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xf, 0x10, 0x8100, 'bridge_slave_0\x00', 'eql\x00', 'bridge0\x00', 'teql0\x00', @broadcast, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], @random="05d7e80311d1", [0xff, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xd0}, [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x80}}}]}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}, {{{0x11, 0x2, 0x8100, 'syz_tun\x00', 'batadv0\x00', 'hsr0\x00', 'sit0\x00', @dev={[], 0x10}, [0x0, 0xff, 0xb69db8e29e6bf519, 0x0, 0xff, 0xff], @local, [0x0, 0x0, 0x0, 0xff, 0xff], 0xb8, 0xe8, 0x130, [@limit={'limit\x00', 0x20, {{0x0, 0x3, 0x763, 0x6, 0x8d}}}]}, [@common=@AUDIT={'AUDIT\x00', 0x8}]}, @common=@ERROR={'ERROR\x00', 0x20, {"18870378f12772f9820b6ae54a8bb0d5fa4a9337f6508b772d44fba5c14e"}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x9, 0x1, 0x88fb, 'batadv0\x00', 'ip6tnl0\x00', 'rose0\x00', 'bond_slave_1\x00', @empty, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], @dev={[], 0x29}, [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], 0xe0, 0xe0, 0x128, [@devgroup={'devgroup\x00', 0x18, {{0x5, 0x2, 0x4, 0x5e1, 0x8}}}, @m802_3={'802_3\x00', 0x8, {{0xbc, 0x80, 0x6, 0x1}}}]}}, @common=@ERROR={'ERROR\x00', 0x20, {"a747a677c3f31e0e2230154f39896fd8843c7ed5c26cee3cbda549fc753e"}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x0, 0x2, 0x4305, 'veth0_to_hsr\x00', 'syzkaller0\x00', 'rose0\x00', 'veth0_to_team\x00', @empty, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0x0, 0x0, 0xff, 0x0, 0xff], 0x2e8, 0x418, 0x490, [@time={'time\x00', 0x18, {{0x7ff, 0x3, 0x6405, 0x1700, 0x1, 0x0, 0x1}}}, @bpf0={'bpf\x00', 0x210, {{0x30, [{0x0, 0x1000, 0x2, 0x4}, {0x800, 0x2, 0x9, 0x2}, {0x7, 0x1, 0x20, 0x1}, {0xfffffffffffffffa, 0x3, 0x1, 0x70}, {0x0, 0x5, 0xffffffffffff506a, 0x9}, {0x80000001, 0x9, 0x8, 0x200}, {0x175, 0x8, 0x1, 0x3}, {0x400, 0x6, 0x54e27183, 0x4}, {0x2, 0xffff, 0x81, 0x80000000}, {0xffffffffffffff1a, 0x4, 0xffffffff, 0x3}, {0x1f, 0x8, 0x6, 0x7}, {0x0, 0x6, 0x6, 0x5}, {0x3f, 0x3ff, 0x3, 0x3}, {0x1, 0xffffffffffffffe0, 0x8, 0x9}, {0x74fd, 0x7, 0xb53c, 0x9}, {0x7, 0x401, 0x0, 0xffffffffffffffc0}, {0x7, 0x3, 0x0, 0x9}, {0x100000001, 0x3, 0x3, 0xffffffffffffff7f}, {0x373, 0x10001, 0x2}, {0xfffffffffffffc01, 0x200, 0x1, 0x4}, {0x40, 0xffffffffffffff41, 0x6}, {0x8000, 0x3, 0x4, 0xff}, {0x0, 0x7fff, 0x0, 0x8}, {0x9, 0x6, 0x5, 0x1ff}, {0x0, 0xab80000, 0x3045, 0x7}, {0x0, 0x8b8c, 0x6, 0x7}, {0x6, 0xe6e, 0x9, 0x8}, {0x10001, 0xfffffffffffffffb, 0xea, 0xfff}, {0x4, 0x9, 0x0, 0x8}, {0x10001, 0x8, 0x8, 0x5}, {0x6, 0x1, 0x9, 0x6}, {0xa1e, 0x101, 0x6, 0x1}, {0x8000, 0x2, 0x8a44, 0x2}, {0x1, 0x7ff, 0xfff, 0xb470}, {0x3, 0x9, 0x1f00000000000000, 0xb2c}, {0x10001, 0x0, 0x0, 0x8}, {0x7fff, 0x6, 0x3fadbcbf, 0x6}, {0x1, 0x4, 0x7ff, 0x2f}, {0x5, 0x3, 0xd79, 0xc34f551}, {0xfffffffffffffff9, 0x0, 0xa5cf, 0x8}, {0x9, 0x8, 0xb609, 0xffff}, {0x0, 0x1, 0x35, 0x6}, {0x101, 0x4, 0x76c4a43, 0x22}, {0x10000, 0xffffffffffffffff, 0x6, 0x2}, {0x3ff, 0x2, 0x1, 0x9}, {0x0, 0xa1, 0x842, 0x1f}, {0x8000000000, 0x0, 0x9, 0x3}, {0x9, 0x7, 0x2, 0x20}, {0x6a04c142, 0x9, 0x1ff, 0xffffffffffffffff}, {0xbf25, 0x4f0, 0x6}, {0x3, 0x1, 0x100000000, 0x7}, {0x9, 0x800, 0x0, 0xf64d}, {0x3, 0x401, 0x7085, 0x7}, {0x10001, 0x100000001, 0xe407, 0x7}, {0x6, 0x9, 0x1f, 0x9}, {0x8a, 0x3, 0x3, 0xb0bb}, {0x9, 0x1, 0x0, 0x401}, {0x6, 0x3ff, 0x7b7, 0xffffffffffff7fff}, {0x0, 0x3, 0xfff, 0x5}, {0x0, 0x0, 0x6, 0x7}, {0x54, 0x6, 0x95, 0x800}, {0x1, 0x3, 0x80000001, 0x80}, {0x8000, 0x7f, 0x7, 0x5e}, {0x6, 0x1ff, 0x7, 0xfff}], 0x4}}}]}, [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x3, 'system_u:object_r:fonts_t:s0\x00'}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x2, 0xfffffffffffffffa, 0xbf, 0x0, 0x0, "2d564f4357256bc242bee1bbd7c6e8a81f49e7d4161fb0a262238109806542d8d2d6b6191ccc6709292afc9d9554d2b44a1ebf6463fdb65cee53e67f7aa2d4a4"}}}}, {{{0xd, 0x2, 0x80f7, 'batadv0\x00', 'hsr0\x00', 'gre0\x00', 'nlmon0\x00', @random="d449516449ff", [0xff, 0x0, 0xff, 0xff], @random="2e0740eb1a8c", [0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0xd46}}}}]}]}, 0x990) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', 0x0) 13:59:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0xc0045878, 0x0) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000049500000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', 0x0) 13:59:00 executing program 2: 13:59:00 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)="dffb6b2af7c055b9b271be9da579c614823f376fedd1003526d6cf09cf5e490b162776e9ae6b1680fe01e0cc4c7b35b905c97d5bcbd78c48a5c131e0a8558e562afb2aa6e740bab94fdb840ede88acd978804744ce0a71f8ab7ab77b907294ec53a5fe793dc2226cc5dbf25095713526197029cb4c5aa9b36d144e66166db5ae7756d99cd77622af29da51b6ca0b45431fbc77b9f23ba03a826fcd0638d70b1969e01e916afea8bd7974e2c33e9602aeef5afc53669372c3872a9de49f87c26d", 0xc0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000240)='.dead\x00', &(0x7f0000000280)='/dev/usbmon#\x00') r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x5450, 0x0) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000015200000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 1 (fault-call:1 fault-nth:0): r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:00 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000}]}, 0x58) 13:59:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x5460, 0x0) 13:59:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8000, 0x800) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000000c0)={0x0, {0x71, 0x99}}) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000059000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x5, 0x200100) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r1, 0x4}}, 0x10) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x2800) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f0000000100)=""/193) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000500)='pkcs7_test\x00', &(0x7f0000000040)='s\xb4\xd4') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000300)={0x0, @aes128, 0x2, "8f82c7533b6c6c8c"}) 13:59:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003fd00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:00 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x4, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:00 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0xc020660b, 0x0) 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000000c300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x13) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0xa0c, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x14, 0x13, @l2={'ib', 0x3a, 'netdevsim0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8040}, 0x20008001) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000180)=""/234) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfce1, 0x0, 0x100000000402, 0x0) r0 = eventfd(0x890c) flock(r0, 0x4) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x16, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}]}, 0x58) 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x5421, 0x0) 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000056000000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xb, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x5451, 0x0) 13:59:01 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x200000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000180)=0xc) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x7b91, 0x1ff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000024400000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x5452, 0x0) 13:59:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = userfaultfd(0x80800) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000000, 0x4010, r0, 0x0) 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000003ab00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x58) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x9, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000000)={0x8}, 0x8) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000032600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x40049409, 0x0) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xc, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x1000000, 0x0) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x7, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x4020940d, 0x0) 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000057600000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000180)=""/12, 0xc}, {&(0x7f00000001c0)=""/225, 0xe1}, {&(0x7f00000002c0)=""/35, 0x23}, {&(0x7f0000000300)=""/224, 0xe0}, {&(0x7f0000000400)=""/53, 0x35}], 0x5, &(0x7f00000004c0)=""/244, 0xf4}, 0x12002) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000007c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x83080080}, 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x5c, r3, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf7df}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x266a892a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4091}, 0x4004000) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000600)=0x101, &(0x7f0000000640)=0x2) 13:59:01 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1400}]}, 0x58) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x12, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000037a00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x77e8, 0x2) socket$rds(0x15, 0x5, 0x0) 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0xc0189436, 0x0) 13:59:01 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) bind$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @host}, 0x10) 13:59:01 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x13, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007a800000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:01 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x2, 0x0) 13:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x11, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:02 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x22001) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000040)={0x20, 0xeed, 0xc81, 0x0, 0x5, 0x0, 0xfffffffffffffffe, 0x0, 0x7, 0x5, 0x1, 0x4, 0x0, 0x1f, 0x7, 0x0, 0x4, 0x5, 0x4e6}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000200)={{0x9, 0x80}, {0x7fff}, 0x7fff, 0x6, 0x7}) 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000007cd00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, 0x58) 13:59:02 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0xc0045878, 0x0) 13:59:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80000001, 0x208, 0x9, 0x2, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22, @multicast2}}, 0xff, 0xa3, 0xffffffff, 0x0, 0xffffffffffffffe1}, &(0x7f0000000200)=0x98) 13:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xd, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000022e00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x54c9, 0x0) 13:59:02 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='keyring\x00', 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000057300000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x10, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) 13:59:02 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)='\x00') 13:59:02 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() r3 = geteuid() syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="693218150860dc39010d2219cdd4d8a94a46a340287e2816b0b4fb0d9146f7b90b987664d62c70abba6c7f9f93ad59fbe7cd4b5b2d8ed016aa08", 0x3a, 0xbdc}, {&(0x7f00000000c0)="0827b8155ca3f60df48cb4bc20322bd0f2ab87750218cba11e2b0df2be9e40a72099b45761c097f538817f15a15022d48242c8c281c0b7a25641fa07327bb1b8", 0x40, 0xffffffff}, {&(0x7f0000000140)="2e91b77404311442984f268f6801128ebb1ee9de048179421302dccee0d031ef7ef8ad86266cf5fe24640cdb33487e2fb6195a62045ba343b9319aace2f246d399eaa87b8a167132eeb94bda876e9626eee0758f3eb882d57051bc126b819d0d8a58207fc114d2fd0d3a5dbf8d5288607e56982496c5d7f3cf9e84e7298bfaa3790ff9f05350c75469f7a626e92da58a3d3ddfb777491d6f85fc3f0d750ca11feab5bf276e53724bbaf9ebfe6ae85d139dd8bb124b", 0xb5, 0x3}, {&(0x7f0000000200)="39042f10802f7e075d6ced34c07c8b224abbf9c51a348eb1c692f82d892f34d78dd389fdba22d18627a5cf68c7fa5f530acf8defa1191dd5d5ed29337f7bd327c215a98f38f4e756abcfea25feee402350574d985a6884eddf49206cb75ce9777afa408e1367d98bb8d5ca5df4a21b2059c408111ff6f20e269d81e93163f0b4d0591e4faecc66b307aa500eee2ae4c49b62dfb1469121ba04da8b25e5c67e359c4821c73063478d8f49d1d2844fd60103f1909e6afec0b698da2167f8dfabfb7e", 0xc1, 0x28a}, {&(0x7f0000000300)="998d981344c31d09422e70a4c8177bea5da8870ddcd4752d4c8dc76acd2b2b86adcddcd1b47de78f410900675c02de7bb51fb89cd4ba4b061cc2c4182c0386c1aa97d7213a116a2c8dd8ba98b12072754e11f97d99446488cd9ec37ed55506ba7755a0e0e9d29a65d0f5742e69fd8b7bfcd972b4ccd2aa623a489d00eb21301ab8049626db1e8ebeb5e7402c99fdebd811de", 0x92, 0xfff}, {&(0x7f00000003c0)="88b619af3bcbf32c5f01421c196c9c062678cb60f663", 0x16, 0x7}], 0x80, &(0x7f0000000580)={[{@dots='dots'}], [{@smackfstransmute={'smackfstransmute', 0x3d, ',%\xfecpuseteth1'}}, {@euid_gt={'euid>', r1}}, {@subj_user={'subj_user'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@appraise='appraise'}, {@euid_eq={'euid', 0x3d, r3}}]}) r4 = dup2(r0, r0) ioctl$sock_SIOCINQ(r4, 0x541b, 0x0) 13:59:02 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x14}]}, 0x58) 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000005c00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x17, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1728.712919] FAT-fs (loop3): Unrecognized mount option "%þcpuseteth1" or missing value 13:59:02 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$rose(0xffffffffffffff9c, &(0x7f0000000000)=@short={0xb, @remote, @bcast, 0x1, @rose}, &(0x7f0000000040)=0x1c, 0x80800) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f0000000180)) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') 13:59:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0xfffffffffffffe1b, 0x0, 0x20000, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x2) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil, 0x6, 0x0, 0x4, &(0x7f0000ffd000/0x3000)=nil, 0xffffffffffffffff}) 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000006900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x19, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1728.829068] FAT-fs (loop3): Unrecognized mount option "%þcpuseteth1" or missing value [ 1728.853998] kasan: CONFIG_KASAN_INLINE enabled [ 1728.872352] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1728.887638] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1728.893911] CPU: 0 PID: 1896 Comm: syz-executor1 Not tainted 4.20.0+ #3 [ 1728.900672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1728.910046] RIP: 0010:keyctl_pkey_params_get+0x284/0x550 [ 1728.915495] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 41 02 00 00 4c 8b b4 24 b0 00 00 00 4c 89 f0 4c 89 f2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 2a 02 00 00 41 0f b6 36 31 [ 1728.934399] RSP: 0018:ffff88804f07fae0 EFLAGS: 00010206 [ 1728.939765] RAX: 03fffe22013c1ff2 RBX: ffff88804f07fd90 RCX: ffffc90007df9000 [ 1728.947029] RDX: 0000000000000003 RSI: ffffffff834376eb RDI: 0000000000000001 [ 1728.954294] RBP: ffff88804f07fc28 R08: ffff8880533c6080 R09: ffffed101407dca2 [ 1728.961561] R10: ffffed101407dca1 R11: 0000000000000001 R12: 0000000000000000 [ 1728.968825] R13: dffffc0000000000 R14: 1ffff11009e0ff93 R15: 0000000000000000 [ 1728.976091] FS: 00007f57566bd700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1728.984340] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1728.990215] CR2: 0000001b2e421000 CR3: 000000008ee90000 CR4: 00000000001406f0 [ 1728.997481] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1729.004742] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1729.011999] Call Trace: [ 1729.014602] ? __keyctl_dh_compute.cold+0x63/0x63 [ 1729.019441] ? retint_kernel+0x2d/0x2d [ 1729.023333] ? copy_user_generic_unrolled+0x86/0xc0 [ 1729.028352] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1729.033888] ? _copy_from_user+0xdd/0x150 [ 1729.038036] keyctl_pkey_params_get_2+0x13e/0x570 [ 1729.042878] ? keyctl_pkey_params_get+0x550/0x550 [ 1729.047771] ? kasan_check_read+0x11/0x20 [ 1729.051931] ? _copy_to_user+0xc9/0x120 [ 1729.055939] keyctl_pkey_e_d_s+0xb7/0x500 [ 1729.060090] ? keyctl_pkey_query+0x2a0/0x2a0 [ 1729.064509] ? do_syscall_64+0x8c/0x800 [ 1729.068486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1729.074035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.079398] ? trace_hardirqs_off_caller+0x300/0x300 [ 1729.084501] __x64_sys_keyctl+0x103/0x420 [ 1729.088677] do_syscall_64+0x1a3/0x800 [ 1729.092567] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1729.097495] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1729.102513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1729.107355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1729.113330] RIP: 0033:0x457ec9 [ 1729.116529] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1729.135424] RSP: 002b:00007f57566bcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1729.143140] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 1729.150402] RDX: 0000000020000100 RSI: 000000000089a399 RDI: 0000000000000019 [ 1729.157691] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1729.164970] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f57566bd6d4 [ 1729.172252] R13: 00000000004c37d3 R14: 00000000004d6130 R15: 00000000ffffffff 13:59:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') 13:59:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000004fe00000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) 13:59:02 executing program 0: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x634ca248, 0xffffffffffffffff, 0xffffffffffffffa2, 0x4, 0x4}, &(0x7f0000000200)=0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000240)={0x1, 0x1, 0x8000, 0xfffffffffffffeff, 0x6, 0xd4e2, 0x80000000, 0x20, r1}, 0x20) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r3 = dup2(r0, r0) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000180)) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3ff, 0x0) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000440)=0x4) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') timer_create(0x1, &(0x7f00000003c0)={0x0, 0x25, 0x1, @thr={&(0x7f0000000280)="2fbb3b97e1af9566548f", &(0x7f00000002c0)="280b7d7289a34087f2a2df88657bdce251c6b695065312fda4b4f5a9efb9979e691d829265fc1818aaf0a94a3f439f4a6da40fdb7eae6cd35ca0dc41ecfc6a619eda487f39840531152b1f58e36d30ead259060228fde735b3b6d2b8dcca4c1a99f652f8a42a1945c43f4abacadb0585af3912afb240806c899b4e988cde71dba4d19a92313aad89b2e244fd6e0518e97206439392c7b3c4fb4a3563d15ddd486b516b9d2a42e936c44ecf5552e22acea3c732655e7daab124d93a80092cda96c9f519947410d03fef3397eb200db3a907099611faffa625e9807f4a2332d1597588a3a468"}}, &(0x7f0000000400)) [ 1729.179522] Modules linked in: [ 1729.197589] kobject: 'loop3' (000000007ee1ee47): kobject_uevent_env [ 1729.204095] ---[ end trace 0c303eb9350c6f46 ]--- [ 1729.205231] kobject: 'loop3' (000000007ee1ee47): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1729.219951] RIP: 0010:keyctl_pkey_params_get+0x284/0x550 [ 1729.226981] Code: fe 48 8b 44 24 38 48 c1 e8 03 42 80 3c 28 00 0f 85 41 02 00 00 4c 8b b4 24 b0 00 00 00 4c 89 f0 4c 89 f2 48 c1 e8 03 83 e2 07 <42> 0f b6 04 28 38 d0 7f 08 84 c0 0f 85 2a 02 00 00 41 0f b6 36 31 [ 1729.242656] kobject: 'loop3' (000000007ee1ee47): kobject_uevent_env 13:59:03 executing program 5: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x402) write$binfmt_elf32(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x1100, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000}]}, 0x58) [ 1729.275549] RSP: 0018:ffff88804f07fae0 EFLAGS: 00010206 [ 1729.275767] kobject: 'loop2' (00000000583c6267): kobject_uevent_env [ 1729.282783] RAX: 03fffe22013c1ff2 RBX: ffff88804f07fd90 RCX: ffffc90007df9000 [ 1729.299377] kobject: 'loop3' (000000007ee1ee47): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1729.303591] RDX: 0000000000000003 RSI: ffffffff834376eb RDI: 0000000000000001 13:59:03 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_SIOCINQ(r1, 0x541b, 0x0) 13:59:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec400002300000000058900000000003f000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1729.316948] kobject: 'loop2' (00000000583c6267): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1729.332294] RBP: ffff88804f07fc28 R08: ffff8880533c6080 R09: ffffed101407dca2 [ 1729.340726] kobject: 'loop2' (00000000583c6267): kobject_uevent_env [ 1729.343915] R10: ffffed101407dca1 R11: 0000000000000001 R12: 0000000000000000 [ 1729.347328] kobject: 'loop2' (00000000583c6267): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1729.354545] R13: dffffc0000000000 R14: 1ffff11009e0ff93 R15: 0000000000000000 [ 1729.367719] kobject: 'loop4' (000000003f17719b): kobject_uevent_env [ 1729.371734] FS: 00007f57566bd700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 1729.380559] kobject: 'loop4' (000000003f17719b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1729.386161] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1729.401820] kobject: 'loop2' (00000000583c6267): kobject_uevent_env [ 1729.408046] kobject: 'loop0' (000000003b3a7a07): kobject_uevent_env [ 1729.408373] CR2: 0000000000738000 CR3: 000000008ee90000 CR4: 00000000001406f0 13:59:03 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0x806, 0x0, &(0x7f0000000000)) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='encrypted\x00', &(0x7f0000000140)='/dev/usbmon#\x00') [ 1729.414660] kobject: 'loop0' (000000003b3a7a07): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1729.434045] kobject: 'loop2' (00000000583c6267): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1729.455655] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1729.467491] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1729.476084] kobject: 'loop2' (00000000583c6267): kobject_uevent_env [ 1729.485856] kobject: 'loop2' (00000000583c6267): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1729.487820] kobject: 'loop2' (00000000583c6267): kobject_uevent_env [ 1729.506622] Kernel panic - not syncing: Fatal exception [ 1729.513041] Kernel Offset: disabled [ 1729.516670] Rebooting in 86400 seconds..