nt_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1900000000000000, 0x0) 22:07:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYBLOB="800000001a00020726bd7000fbdbdf251c340002ff05000b0006000000001a000600000000001a0007000000000001000000000000f0ffffff0000a0ff0100000000000000000400b3355f0ef45d05c92244ee79b0e3541f625e1225943e5122c76a4b3cc114ead1fbe86a003c2148000000000000c512fd2d9e6b26bd5a0bb64a4ae82a36ed988ea3e309ecffffffff00000000516923d841cb0ed64c00000000000000000000000000", @ANYRES64=r1], 0x2}, 0x1, 0x0, 0x0, 0x4}, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000040)="ccc49b44229bae7635ebcd5c621be6c340dabbc954498bf5b1a57155fc65e7fb4c7331d46a4322325f51737bc9895623c861b04dba4d1e1ff3b8ae1fae1f44c3d396ab802de73cdab0f7cdf27789fe3ad9d9849fca847ed45df103a1c8ecec08a817c6e6cc957afa08ef24c9934b8190589434109307b4b21b4a13548cd63c97491c3c4867852bdfd0ce65d2ef5fd895f1802d6644d2419187c2456da3fcb97adf385d32fc4643759a6f2a4762bf55d59ca3da87d9104b3460c1de9ce91660e487bf58ec18369591326177cff542e6d3bed3c15b", 0xd4, r0}, 0x68) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="12634840040000000000000001000000000000000000000001000000000000000000000048000000000000001800000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="852a747000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="010000000000000002000000000000001c000000000000008561646600000000010000000000000002000000000000000400000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="00000000f2f500000000"], @ANYBLOB="0100008000000000"], 0x38, 0x0, &(0x7f0000000500)="5c0bc5974bc0b8f43dc0635df85634e1e0c6f03b6600835cbf85f67254b13455d4cf56d840b1c1bea92d7a5bd785f329f2d24cd281f4b37e"}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000003c0)=0x9, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000700)={'vcan0\x00', r3}) [ 739.370802][ T6511] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 739.403780][ T6624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000040)={'exec ', ':-{\x00'}, 0x6) [ 739.506322][ T6629] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, @in6={0xa, 0x4e21, 0x3ea6, @local, 0x3}, @in6={0xa, 0x4e21, 0x8, @rand_addr="a7ba2754a81bc0b08861d9726eaec5d4", 0x4}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f00000000c0)=0x10) r2 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x8, 0x7, 0x4, 0x5, 0x0, 0x0, 0x2, 0x4, 0x5, 0xb0d5, 0x0, 0xfffffffffffffffe, 0x2, 0x4, 0x9, 0xe2, 0x6, 0x8, 0x67, 0x1, 0x101, 0xfe58, 0x2, 0x8, 0x3, 0xfff, 0x1, 0x6, 0x7c, 0x8, 0xfffffffffffffffd, 0xb7, 0x9, 0xe60a, 0xffff, 0x200, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000140), 0x1}, 0x800, 0x93f4, 0x5, 0x3, 0x75, 0x2, 0x6}, r2, 0xf, r0, 0x1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r1, 0x4, 0x6, [0xfffffffffffffff8, 0x9, 0x80000000, 0xfff, 0x3, 0x6]}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x6, 0x4, 0x4, 0x18, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300]}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) 22:07:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x34d, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000210007041dfffd946f61050006000000fe0000000000080008000a000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 22:07:52 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8fe, 0x42200) sendmsg$nl_xfrm(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c000000140001000000000000000000ac14140000000000000000000000000000000000000000000000ffffe000000100000000004000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\b\x00\b\x00\x00\x00\x00\x00\x00\x00'], 0x4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000), 0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@generic={0x0, 0x100000000, 0x1}) 22:07:52 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x70, r0, 0xf) r1 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r1}) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 22:07:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000440)='./file0\x00', 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="f38aca7167e67fa73000"], &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='gfs2\x00', 0x0, 0x0) [ 739.749955][ T6755] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 739.803511][ T6758] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$RTC_AIE_OFF(r0, 0x7002) 22:07:52 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x551, 0x200000) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000140)={0x2, r1}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000000)=0x2) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)) [ 739.977771][ T6871] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) [ 740.054744][ T6880] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:52 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="73798931035e4bc05341"], 0xa) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) sendfile(r2, r2, &(0x7f0000317000), 0xff8) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1) write$UHID_DESTROY(r0, &(0x7f00000000c0), 0x4) write$UHID_CREATE(r0, 0x0, 0x121) 22:07:52 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0xb, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x0, 0x989680}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000005c0)={0x3, 0x3, 0x0, 0x0, 0x0, [], [], [], 0x8}) [ 740.266495][ C1] net_ratelimit: 25 callbacks suppressed [ 740.266503][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 740.277972][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 740.332170][ T6993] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 740.342178][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.346442][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 740.355749][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 740.369280][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.406514][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.426454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 740.426473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 740.432324][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 740.438060][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 740.449567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 740.455335][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 740.472491][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.497169][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.509861][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.518412][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.525911][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.533872][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.541667][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.549763][T30741] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 740.587556][T30741] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 22:07:53 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000040), 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00140600fe8000000000000dd8dece03f117c7aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) bpf$BPF_BTF_LOAD(0x12, 0x0, 0xfffffffffffffdaf) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x20032600) fstat(r0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000000c0)) getgid() lstat(0x0, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) lstat(0x0, 0x0) dup(0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) socket$inet6(0xa, 0x3, 0x0) 22:07:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 22:07:53 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2f0000001800030007ff58946fa283bc8020000080040005031d856808000300080000000b00ccfa3c8b14828e71c0", 0x2f}], 0x1}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) 22:07:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='wlan1wlan0\x92-%+nodevcgroup\x00', r1}, 0x10) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x103800, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000040)={0x8001002, 0x400, 0x2}) 22:07:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1, 0xfffffffffffffffd, 0x0, 0x8, 0x4, 0x0, 0xffff, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0xfffffffffffffffd, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) unlink(0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x7a201, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000540)=0x2) setsockopt$inet6_tcp_int(r1, 0x6, 0x1f, &(0x7f0000000200)=0x5, 0x4) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) statfs(0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000140)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={r2}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) dup3(r0, r0, 0x80000) syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x2480, 0x0) dup2(r0, r0) r3 = syz_open_dev$usbmon(&(0x7f00000003c0)='/dev/usbmon#\x00', 0x0, 0x0) r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="78396767462092df36af9252602711f2c4a66a3d38600c3ea8518109331fcae71a0938dafb29c92783f6ea9de2b3730df55832ca74f5e8cc6631f8b7f292742d0b9299301f108e9ba3d1c9f944a2038bc8df417e667125ff6c94ea58ffcc494f4ee3f15f7efb82826d0b5ab79e7678299f11674bf09da99a1426712983824c742fae189d84cbcb989b6ecbb156eb26cbbfbe8bb51a83f2e1bf12d1", 0x9b, 0xfffffffffffffffb) keyctl$setperm(0x5, r4, 0x8000000) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000380)=0x44) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = add_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000600)="7365dc019ad57eab7a0037c83319b817cc7f53033bd2eb494fbbabebbb9a6bb1714bf04da7e107891bf8de01118a8f6472745ba4db5e7fc7a6c9b73351949b3cc3b600f38df2cd610736bea06cfe6041a8c691a397d67a81487d73a05c291da6aa327ebf6238cce1fbf2f6e8f50a9700f537ad10318dc6441b27076905d527b5e5e7984655e4c19cba51e08b2c95708192a13b177a238a528ebc269be87acff4813d7f284dc25cbe56399a45e1b3000fee4c3ee54ecb2e", 0xb7, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f00000006c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, r5) [ 740.751633][ T7116] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 22:07:53 executing program 0: prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(0x0) symlink(0x0, &(0x7f0000000540)='./file0\x00') mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) link(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000180)={'syz_tun\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = getpid() process_vm_writev(r4, &(0x7f0000001780)=[{&(0x7f0000000240)=""/232, 0xe8}, {&(0x7f0000000340)=""/233, 0xe9}, {0x0}, {0x0}, {0x0}, {&(0x7f00000016c0)=""/145, 0x91}], 0x6, &(0x7f00000018c0)=[{&(0x7f0000000140)=""/38, 0x26}, {&(0x7f0000000500)=""/28, 0x1c}, {&(0x7f0000001800)=""/139, 0x8b}], 0x3, 0x0) r5 = dup(r3) setsockopt$inet6_tcp_int(r5, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000005, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xe7) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000080), 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendfile(r5, r6, 0x0, 0x8000dffffffe) 22:07:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) [ 740.935862][ T7207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)) r1 = syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x80, 0x0) syz_open_pts(r1, 0x400) recvmmsg(r0, &(0x7f0000001cc0), 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="12ebcba43ec38ae14b0688ffff60f54100000000"], 0x14}}, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000100)=""/147, &(0x7f0000000000)=0x93) r2 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x4, 0x40) write$P9_RLOCK(r2, &(0x7f0000000340)={0x8, 0x35, 0x1, 0x3}, 0x8) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r3, 0xc0385720, &(0x7f00000002c0)={0x0, {}, 0x6, 0x1}) ioctl$VHOST_GET_FEATURES(r3, 0x8008af00, &(0x7f0000000200)) 22:07:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007031dfffd946f610500020000001f00000000000800080011000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 22:07:53 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8d, 0x48000) r2 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @bcast}, [@default, @default, @null, @rose, @netrom, @bcast, @remote, @bcast]}, &(0x7f0000000140)=0x48, 0x80800) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000480)={0x90, 0x0, &(0x7f0000000300)=[@reply={0x40406301, {0x4, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x30, 0x20, &(0x7f00000001c0)=[@fd={0x66642a85, 0x0, r1}, @fd={0x66642a85, 0x0, r0, 0x0, 0x1}], &(0x7f0000000200)=[0x38, 0x18, 0x18, 0x38]}}, @reply_sg={0x40486312, {{0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x30, 0x50, &(0x7f0000000240)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x2}, @fd={0x66642a85, 0x0, r2, 0x0, 0x3}], &(0x7f0000000280)=[0x58, 0x78, 0x0, 0x58, 0x38, 0x38, 0x78, 0x68, 0x28, 0x40]}, 0x9}}], 0x82, 0x0, &(0x7f00000003c0)="8138fe8094c2965189a421826ea99020d22df0e821c4c02b4ed34632d4d04ae4aadb3dc40bbe91a0e965b731786404e374936898835e7cbf91e0013eaf636a0d469af3cd1e61e53e4106006759ab69a194981097e1612be5046c8665584391c1334ca00e212eb69d7874210d89793ddcb80fc0cda999cc8a01b34452e40bc835b1e8"}) r3 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0xfffffffffffffffc) readv(r3, &(0x7f0000000180)=[{&(0x7f0000001200)=""/4096, 0xfffffe19}], 0x1) [ 741.163936][ T7258] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 741.168209][ T7263] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 22:07:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 22:07:53 executing program 0: 22:07:53 executing program 1: 22:07:53 executing program 0: 22:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) [ 741.600859][ T7207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:54 executing program 1: 22:07:54 executing program 0: 22:07:54 executing program 4: 22:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 22:07:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x800) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:54 executing program 4: 22:07:54 executing program 0: 22:07:54 executing program 1: 22:07:54 executing program 1: [ 741.910437][ T7411] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 22:07:54 executing program 4: [ 741.993850][ T7453] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:54 executing program 0: 22:07:54 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000040)=0x7fff, 0x4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000440)={0x0, @in={{0x2, 0x0, @multicast1}}}, 0x84) 22:07:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x10008002) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="be31eca5eb9f3c945bd29eead4f47f17", 0x10) write(r0, &(0x7f00000002c0)="d5bcf01998368b42ad2079b4698eb63db85e1e8d020000000000003ef0011dcc606aed69d2bc7037cabc9bc2feff", 0x2e) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x0) 22:07:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 22:07:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:54 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='\\;C\xd0\xc5\xb5\x1eIGPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x2}, 0x48) [ 742.330059][ T7475] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x40096100, &(0x7f0000000080)) 22:07:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x600400, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) bind$packet(r1, &(0x7f00000002c0)={0x11, 0xf7, r2, 0x1, 0x3f, 0x6, @dev={[], 0x25}}, 0x14) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000300)={0x14, 0x1e, 0x1, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000080), 0x492492492492751, 0x0) [ 742.370526][ T7488] __nla_parse: 3 callbacks suppressed [ 742.370535][ T7488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1d8, r1, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xccad}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x455d}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x48, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800000000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x35e4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf8d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffe0}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x78f7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3a6d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9763}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x47}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x401, 0x0, &(0x7f0000000440), 0x8, 0x0) 22:07:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, 0x0) 22:07:55 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000640)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0x10000000000ffff, 0x1, 0x80101, 0x2, 0xffffffff, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000700)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2a000000000000000100000000000000be0000000000000002000000000000000035438c000000000000000000"], 0x2d) mount(&(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f00000006c0)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000740)='ocfs2_dl\x03pR\x90', 0x2000023, &(0x7f0000000900)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') mount(&(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0) setitimer(0x2, &(0x7f0000000480), &(0x7f00000004c0)) mount(&(0x7f0000000a40)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9fb924bf91f65251c2210ce6c33f5cf63ee466a17a37b30eb2325bbc9556b9ba20d4df40a9cb69d15d3308712819f3d2f27695155ef2b723bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e8d1f0421aabde758c08399866dd6f0c9c72140b221ecf2e98b2b85bb8df6694a"], 0x0, 0x0, 0x80000, 0x0) r2 = dup2(0xffffffffffffffff, r0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x8e9) write$FUSE_OPEN(r2, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r1, &(0x7f0000000680)=[{&(0x7f0000002440)=""/4096, 0x1000}], 0x1, 0x100000000000002) listen(r2, 0xb6a) ioctl$int_out(0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f00000002c0)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) clock_gettime(0x2, &(0x7f00000007c0)={0x0, 0x0}) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000780)={{r3, r4/1000+30000}, {0x0, 0x7530}}) close(r1) socket$inet_tcp(0x2, 0x1, 0x0) [ 742.637521][ T7508] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 742.661582][ T7488] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 742.752410][ T7548] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:55 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x9) r1 = socket$inet6(0x10, 0x3, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000080)=0x10001) sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5f00fe01b2a4a280930a06000000a84306910000003900090035000c00060000001900150006000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1}, 0x0) 22:07:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setitimer(0x1, 0x0, &(0x7f00000002c0)) getitimer(0x3, &(0x7f0000000040)) 22:07:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 22:07:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r2 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) io_setup(0x1, &(0x7f0000000480)=0x0) io_destroy(r4) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x84, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@euid_gt={'euid>', r3}}]}}) 22:07:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) socket$rxrpc(0x21, 0x2, 0x2) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) [ 742.917910][ T7630] syz-executor.4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 742.952559][ T7634] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.1'. [ 742.985577][ T7639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:55 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x82) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000000380)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='\f', 0x1}], 0x1}, 0x0) r2 = socket$inet(0x2, 0x1, 0x84) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000000)='vmnet0%keyringsystemeth1\x00'}, 0x30) syz_open_procfs(r3, &(0x7f00000000c0)='net/rt6_stats\x00') ioctl$FICLONE(r2, 0x40049409, r2) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80), 0x1}, 0x0) 22:07:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) 22:07:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="59fb740fad"]) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r2}) accept4$tipc(r4, &(0x7f00000000c0), &(0x7f0000000180)=0x10, 0x80000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) r6 = getpgid(0xffffffffffffffff) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x141400, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r2, &(0x7f0000000240)={r7, r2, 0x800}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:07:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xfffffffffffffff9}, &(0x7f0000000080)=0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r1, 0xfb, "f80b725209237bb03a578b84373083f062f570718a08bd0a5c0a96e7cc2a168dc30183f92f0d844d4e049c50f689233078606b5326e1ae171cb61d0b5acf321a210f308ed873b9751780eae6f2fa97d69a6fc3e14d5782252f485427f20e7f64eee687387a20b39b593e002808c61b107234e4008409d66d0ec2c130628d3c39e34cadd22b6e850aa742383ef3606de8b90fa328f50b1d28a6a5f3c86a4e6609aee34607cd77f55e0cd1c29b4cbf33f3a61c61cd6898d744a59a9155071bacabdddf28c7b924b9a7df726c80d0b0e4a4500791e82b52d2d8d43ea7824c3c36761cfccc1e83fe770fadf780a9cbba3a48295a9f58b0af92857e8647"}, &(0x7f0000000240)=0x103) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x0, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0xffffffffffffff5e, 0x5}], 0x8, 0x0) 22:07:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) [ 743.239090][ T7754] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:55 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xffffffffffffffff, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180400000000000000000000000000038fb636fe57258c009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1, [], 0x0, 0x40000000000000}, 0x48) 22:07:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xd00, 0x0) unshare(0x2000400) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0x8, 0x100000001]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x1, 0x4, 0x400000008004, 0x0, r1}, 0x2c) [ 743.387776][ T7775] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffa0010000, 0x0) 22:07:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000300)=0x14, 0x800) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000340)=""/58, &(0x7f0000000380)=0x3a) quotactl(0x9, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000240)="28923298e7d1f5df837291b02fa3169049ec4cc30a58ded4e82a8963e638bf7359ee0f464fed9dc5581d42b0781c37f4e8fe5ff052058e7ca80a26dbd54db54843c02f4942670463efe36dc0d588d7965fd65f45b3cab31630817c4d0dc07aa664911c9e1f62e6fc2a9ec7d5fdb7164df3d841") syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:56 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xc000000000000000, 0x182) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x20, 0x6, 0x1f, 0x2f, 0x6}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e23, @local}}, 0x68f, 0x4448aa90, 0xffffffffffff8001, 0x7fffffff, 0x1}, 0x98) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 22:07:56 executing program 1: r0 = syz_open_dev$usb(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x72f6412f5b5d0838) listxattr(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r2, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) openat$random(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/urandom\x00', 0x8000, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000140)={0xc, 0x800, 0x3, 0x800, r0}) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) close(r3) getresuid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) r5 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x4, {0x6, 0x0, 0x7, 0x7ff, 0x4, 0x9, {0x0, 0x0, 0x1f, 0xfffffffffffffffb, 0xdc1, 0x4d, 0xc6, 0x7, 0x3f, 0x5, 0x49, r4, r5, 0x2, 0x2}}}, 0x90) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4464}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r9, 0x50}, &(0x7f0000000100)=0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000200)="b8010000000f01d965660faeb603000000b8358556370f23c80f21f8350400d0000f23f8640fc7ae02000000ea00600000fa00c4c18566220f20d835080000000f22d8360f01cf66baf80cb83bd30c85ef66bafc0cb06aee0fc7b49f0a000000", 0x60}], 0x1, 0x5, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(0xffffffffffffffff, 0x40106439, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 22:07:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)="18", 0x1}], 0x1}, 0x0) sendto(r1, &(0x7f0000000bc0)="7589f0da892457ee3604b3303d1176a13baaebcab9eba210a07246127b486e98e3029104796460b1dfef95b0368b0b19c338b1306db81cea8edfc66a6212607f01496a9963ef1a83caee01bd72e85c40dd287a0755ca6b801959badb1253ae3a85a47b0ec39b760f063d4756614fc1d3e68b9f4f32be2652ce67d2e776b433331ad58b9d70c0f258e00b9d56ff7ecb14e6050c70da00c5006b8cffd8f169f2861e2df3efe13056d1babf3dde7a2a1a5cc8cb207e10f61e215d2935a43c0db2cef01e23933caac8c3ea", 0xc9, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) shutdown(r0, 0x1) [ 743.631453][ T7901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 743.796948][ T7916] input:  as /devices/virtual/input/input29 [ 743.808803][ T7902] ISOFS: Unable to identify CD-ROM format. 22:07:56 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) fallocate(r0, 0x3, 0x0, 0x8001) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xd0, &(0x7f0000000080), 0x4) 22:07:56 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x0, 0x0, "d6dd0535fc30f9a81be6b8c9937b2717415c596fffc50a0a270991acd34faeb7"}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10800, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x3f, 0x4) 22:07:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3d, 0x80000) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) [ 744.024080][ T7999] ISOFS: Unable to identify CD-ROM format. [ 744.036548][ T7901] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x40200, 0x195) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000500)={0x0, @in6={{0xa, 0x4e24, 0x396, @ipv4={[], [], @rand_addr=0x7f}, 0x8001}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) r2 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000640)={0xf000000, 0x7, 0x101, [], &(0x7f0000000600)={0xa2090b, 0x4, [], @p_u8=&(0x7f00000005c0)=0x3ff}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f00000000c0)={r2, 0xfff, 0x40}, &(0x7f0000000100)={'enc=', 'pkcs1', ' hash=', {'rmd320-generic\x00'}}, &(0x7f0000000300)="366ff08911cb9bf8ccd1e91b6f000dfe78e90d253b0db7d00ddd09f2a40ff600042712b3ce7f434d4c9e6a4f7daf2e572beacaccaf8f18f1b6bd97537b11055278a23743ef0e2a1cc659a2ec4ee1cdf02d189a8f9f7f3ea3e501c6032b61bad2923be4fe449413539df1f1b82e2d5fb2c3d002b554db3acce703a73283ef41fd624927a0fff2024081fea3436ab37f3a36b7e48ab41d5f88443ab25106ddd3e26cec6582cbb0a8a91062d36b3447b80db6e3ccb1e6f633f6f25b02dfd993f00b2a07ba21308b273dab9e19ec7c826137a34fb56f9394e4b69b22c35b8d8a1743b139d52c8d74bba97c1215fe0b87556eaecfebf0fca6ba20", &(0x7f0000000400)="7548093360867f141aeccb7bf2a744b6ad33a297e7357a222e997b59f6b0271fb4f80a6cc8fdf006156a56b40760d892baeec2ba13f754f9de7b58a3da1b309c2c1305fb7121ee04ba741ec8194cec6b319286aff9b2003d5d46cb1bb0950e052b3381218724f7f9db04e171fcd30689ee32814e43dde5afcc822490816dfed716e7b1dc4f991869f44ad7d23f3ea401dfab9d302e5367611cb3485205c1bed83ccf00407753cb411148335eac8fe41019dbb4d750ebb0dfa27396a8957dca5e11db75692ae3f516fa5552feb99c2fe6022d8652d097039f9e0e7cab32b2ce91d2") 22:07:56 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x0, 0x880) write$capi20_data(r0, 0x0, 0x0) r1 = syz_open_dev$usb(0x0, 0x40000fffffb, 0x805) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000400)=0x8, 0x4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000840), &(0x7f0000000700)=0xfffffffffffffe78) socket$inet6(0xa, 0x3, 0xfb) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x3, 0x5, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x8400, 0x0) ioctl$int_in(r4, 0x800000c0045002, &(0x7f0000000580)=0x3f) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f00000000c0)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000003c0), &(0x7f0000000540)=0x14) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000040)={0x4}) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000240)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000500)) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x80) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000000)) renameat2(r2, &(0x7f0000000440)='./file0\x00', r0, &(0x7f00000004c0)='./file0\x00', 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000000100)) r5 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r5, &(0x7f0000000000)=[{&(0x7f0000000300)="580009001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002081000418e00000004fcff", 0x58}], 0x1) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000180)) 22:07:56 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x104, 0x5}], 0x8, 0x0) r1 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@remote, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x80, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000100)="c00682bb828d4b5dbd49fa85a6b8840629af9583c5d9a8d9ac82ef043f3268ac15c86e10bebd931f1325381655687d34d12c6a58a669691b130370bca9e9095b9d481d4e384796b9b23647e27f7f23468d41d09e352abd246453f3c1de72083bc243c99b", 0x64, 0x8}, {&(0x7f0000000180)="4e33a2b621cd4711fff43fbac922f3083d3e1e939ff9525f8d53cb0167989f0e1bd69450f7c076f9f1981aefdf3c51269b787d", 0x33, 0x70f}], 0x20008, &(0x7f0000000800)=ANY=[@ANYBLOB='noloccookie,noacl,acl,loccookie,smackfsdef=$}:\\md5sum]bdev%{-,hash,fowner<', @ANYRESDEC=r1, @ANYBLOB="2c6f626a5f757365723d69736f39363630002c736d61636b66736465663d656d3176626f786e6574312e2c656d306b657972696e67706f7369785f61636573736d643573756d5e2edc2c686173682c666f776e65723d", @ANYRESDEC=r2, @ANYBLOB=',euid>', @ANYRESDEC=r3, @ANYBLOB=',permit_directio,euid<', @ANYRESDEC=r4, @ANYBLOB=',\x00']) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x400040) setsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000040)=@int=0x5, 0x4) open_by_handle_at(r0, &(0x7f0000000480)={0xfffffffffffffd3a, 0x2, "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"}, 0x80000) [ 744.245412][ T8160] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:56 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0xc02, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'bond_slave_1\x00', 0x800}) r1 = socket(0x10, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setfsuid(r2) shutdown(0xffffffffffffffff, 0x0) setfsuid(r2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x59, "b926d606971c1c96ccb6321c42ccfc591123863d1b131ccccd9a9f8475da472858282d45f95c6e3a4270d117e0beef8ddc3beb696691969c6d16d930abaeede21f46617aa754d0d9224177e72ef1ca508311a5c5046887549c"}, &(0x7f0000000080)=0x61) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r3, 0x4, 0x78e}, &(0x7f0000000100)=0x8) 22:07:56 executing program 1: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="2695468ccaad7fec92d2b1fe"], 0x1) r1 = syz_open_dev$amidi(0x0, 0x0, 0x400480) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) getresuid(&(0x7f0000000280), 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) 22:07:56 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000a00)='/dev/vcs#\x00', 0x7ff, 0x400880) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000a80)={0x0, 0x0, 0x9, [], 0x0}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000940)) r2 = openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000900)={r2, &(0x7f0000000880)="174c7e3230c4a1d3e9fbae0554f5b4de54823b2db2567b03d4b86791e7e933436b71f0a0880355b729005dd1aaf61664797e238a1b79"}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0xfffffffffffffefa, &(0x7f0000000800)={0x0}, 0x1, 0x0, 0x0, 0x4000801}, 0x20000000) getgid() fsetxattr$security_ima(r1, &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x1c) syz_emit_ethernet(0x1, &(0x7f0000000b80)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6050a09c00081100fe800200000000005601f75ff80e167382bd6100000000000000bbfe80000000000000000000000021d14a78add0f1c3b4062b4748039a6ef2d04943c67352f24151074f2573bb60489b0beb7fd713"], 0x0) clock_adjtime(0x44, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}) r3 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@empty, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getresuid(&(0x7f00000005c0), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8) ioctl(r3, 0xffffffffffffffaa, &(0x7f0000000080)) [ 744.414021][ T8160] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 744.441511][ T8094] ISOFS: Unable to identify CD-ROM format. [ 744.459820][ T26] audit: type=1800 audit(1552169276.995:190): pid=8179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17073 res=0 [ 744.529314][ T8255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:57 executing program 4: socketpair$unix(0x1, 0xa, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffffffffffff01c}, {0x6}]}, 0x10) [ 744.566743][ T26] audit: type=1804 audit(1552169276.995:191): pid=8179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir802937995/syzkaller.UkXIiW/1392/file0" dev="sda1" ino=17073 res=1 22:07:57 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x101000, 0x0) bind$rxrpc(r0, &(0x7f0000000040)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, 0x24) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000001c0)=ANY=[@ANYBLOB="3c0000001000090c000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010069706970000000010c00e009080004000000000015fea4258912831d81c14747e5cf609479f2b21e107c79b11dd8c51182c864ff9e9ee148bbe86c372571842d1db67b0a9fbf2c3cbfc6015ef362981046d40e98a22ce4a51da5b573c1c805a826a4b053604cffef14dac953f65e83546d34d46994816af59edb2f1553a9ddb31b0bd92ca225e821e34c2d00bdab5019d1f1ce87fe6529b4c4f1a003c3fe439f281719b21b91c2de33a341038289a3c60a2cebaf2f26a87b177b3c671c204c54f4ca5fd6a38cc5323a1fd79aa04cb03c4a45193a2f6b61da4aa4a0d2a418a6e5d32ee00c041bbd4b2f5c56fa4b10f7dc21b911ca30c99f66681038626da901587c0de1560b5dd70f4a9f2f1e55015069f6dcc125c1f8c94dc0bd61cd5054efed9883f4564da1d53b187204a10418283968947cf13e6af64ea4aaea3902ba96c87e1c51d2aec5a8fce344dcb709d17ce2ed45b90b41ad8bd8a19db691978adcf3d9102e8739dbc6"], 0x3c}}, 0x0) r2 = gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x3, &(0x7f00000005c0)=""/4096) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x6c89, 0x4) 22:07:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4050420}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x308, r1, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x13a}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc51}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2800000000000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x100}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xcb}]}, @TIPC_NLA_LINK={0x128, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x453}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x240000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x46d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x46b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7994}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffd}]}]}]}, 0x308}, 0x1, 0x0, 0x0, 0x1}, 0x20000005) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 22:07:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000040)={0x7f, 0x8}) 22:07:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101100, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000140)={0x1}, 0x1) r1 = socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000080)=0x8) r3 = socket$kcm(0x2, 0x2, 0x0) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000340)=@int=0x7, 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x22a, 0x0, 0x23c, 0x0, 0xc3}, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e22, 0xcc9, @ipv4={[], [], @multicast2}, 0x5}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x800, @ipv4={[], [], @multicast2}, 0x6}], 0x78) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@ipv4={[], [], @remote}, @empty, @loopback, 0x6, 0x7, 0x6, 0x100, 0x97, 0x8}) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000000c0)=0x6f) close(r3) [ 744.743573][ T26] audit: type=1800 audit(1552169276.995:192): pid=8179 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17073 res=0 [ 744.778495][ T8299] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 744.926213][ T8346] ISOFS: Unable to identify CD-ROM format. 22:07:57 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x1) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x7, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000053c0)=0x24a6, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 744.981962][ T8255] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) 22:07:57 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') ioctl$VT_RELDISP(r0, 0xb701) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x800, 0x0) connect(r1, &(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80) r2 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x3, 0x0}, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 745.208227][ T8497] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 745.246555][ T26] audit: type=1804 audit(1552169277.775:193): pid=8256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir802937995/syzkaller.UkXIiW/1392/file0" dev="sda1" ino=17073 res=1 [ 745.348809][ T26] audit: type=1804 audit(1552169277.805:194): pid=8537 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir802937995/syzkaller.UkXIiW/1392/file0" dev="sda1" ino=17073 res=1 22:07:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:57 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000040ec0)={0x0, 0x7530}) 22:07:57 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = semget(0x3, 0x2, 0x80) semtimedop(r2, &(0x7f0000000180)=[{0x7, 0x9}, {0x2, 0x80000001, 0x800}, {0x1, 0x8001, 0x1800}, {0x0, 0x4}, {0x2, 0x6ec62675, 0x1800}, {0x1, 0xffffffffffffffbc, 0x1800}, {0x3, 0x1000, 0x1800}, {0x2, 0x8, 0x800}], 0x8, &(0x7f00000001c0)={0x77359400}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000140)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x3, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, [], 0x15}, 0x8}, r1}}, 0x38) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe, @in6={0xa, 0x0, 0x0, @initdev}}}, 0x32) 22:07:57 executing program 4: rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6ffd, 0x400) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x4a, "a10349e6a239e5203407820e5e5770a63ac733279c954b6b4e08319fceaa8e5ab3a102938a84b0185ef41c161c8486bf134514832843938b308c5403d10a6ae259c122ad7fb2dd88fce1"}, &(0x7f0000000180)=0x6e) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) kcmp(r5, r5, 0xfffffffffffffffd, r3, r1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) ioctl$KVM_RUN(r3, 0xae80, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x101000, 0x8) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r4, 0x8, 0xff, r4}) [ 745.407486][ T8405] ISOFS: Unable to identify CD-ROM format. 22:07:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000040)={0xc025, 0x1}) 22:07:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x103000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0ad11f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000140)={0x0, 0x8000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0xfffffffffffffee3) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aa"], 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 22:07:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x7fffffff, 0xa7d6e8872d4fdef8, 0x0, 0x1080, 0x0) [ 745.508365][ T8557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:07:58 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20000, 0x0) dup2(r0, r1) eventfd2(0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000080)={0x2, 0x28, "678b576f4147317922586a49713f4a5f0fb46b69720be73c19d9e2bec10f48377153cb47b4d0c762"}) [ 745.562710][ T8565] Unknown ioctl -2146914659 22:07:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x109200, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x10001, 0x7ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x7, 0x4, 0x4, 0x10000, 0x800, 0x80000001, 0x4, 0x401, r2}, &(0x7f0000000140)=0x20) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) 22:07:58 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r0, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 745.735145][ T8663] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 22:07:58 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x80, 0x4) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) 22:07:58 executing program 4: r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000300)=[{&(0x7f00000001c0)="1c6c36456fb4ea83293bcaf69b928ac528a261d03984aa631ba833b1edb53b8088a92cc8fdf3e71ef38513a312e7df3f0e70e0f30f94b585a55a4045316b58d928283bb9ba970ffce2d9d316be280a7b67589abcc15da14fbc8ba4da26664c8cc7e931744a56", 0x66}, {&(0x7f0000000240)="8b8446370c65267f32644d92e7ee655b0b74ae0b92c71000042556ce9c9294a849071ba4333a6c3b1bd8efddd21502737bc4eb0ad8443d521ac069b869d82af693d2dbb1c4af691273063d784a4f909328dc8d8dcc7ecd32c913256b7d22bc358e49c5bbc88f67a94c25ed1a88c6b9fcc1a5cad92dd861d5e81bf8a816d26bc4bba33117190f748f0b5ac7846d242806423e99b347de0813b6adad1be2901756a817c23470", 0xa5}], 0x2, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r1, &(0x7f0000000180)={0x1a, 0x30f, 0x7, 0x0, 0x78, 0x0, @link_local}, 0x639) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000140)={0x5, 0x4, 0x7}) listen(r1, 0x0) read(r1, &(0x7f0000000080)=""/146, 0x92) [ 745.886073][ T8557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 745.901712][ T8694] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 745.930120][ T8685] ISOFS: Unable to identify CD-ROM format. [ 746.094008][ T8802] ISOFS: Unable to identify CD-ROM format. 22:07:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x401, 0x1, &(0x7f0000000440)=[{&(0x7f00000003c0)="6002813dd9988b958df819948a2cbe7f414c069fd66689aef97d0844f23df1cbf8edd3b9fc3e6f402271d63f332da46b0786a63c8aff4eadbfe08bd897e4ed4b1f0b7522f3b9b9fc", 0x48, 0x5}], 0x8, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 22:07:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:07:58 executing program 0: syz_open_dev$sg(0x0, 0xfffffffffffffffc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80000000000006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0xfffffffffffffffe, 0x5, {0x7, 0x1c, 0x80, 0x9000, 0x100000001, 0x0, 0x7fffffff, 0x1}}, 0x50) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) kexec_load(0x0, 0x223, &(0x7f0000000040), 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video36\x00', 0x2, 0x0) 22:07:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000300)={"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"}) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000040)={0x40000000, 0x30314442, 0x3, @stepwise={0x2, 0x7ff, 0x7f, 0x1, 0x9, 0x8}}) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000080)={0x8, @raw_data="2829a09d6d55172393863f11bd35c49d1bfa092c0c5881a7be471494cd0f8b184ef4d63768b04dfab6d98974d972c7693acd6fcb8c95c8d537e89f16542795ac563fb3aa7458552aa6630c8d094c50e085d7cc202a54fb7fb9c3a921ff91d79846b1e333f30e0d08731a024286b5abd521a4353b0d3fb46897737d4cb9e84dc14522db7375d8f0a4029ab8be2b2b2f40b26a2e94afc9510f735dff69f3a4c56d048e3c6fc02eacf5dc30df530d5441087bf515a3879cce9debe2ae9a89edd36ecf8cfe3cd43a73c9"}) [ 746.356191][ T8809] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 746.370690][ T8618] Unknown ioctl -2146914659 [ 746.473675][ T8908] ISOFS: Unable to identify CD-ROM format. [ 746.516499][ C1] net_ratelimit: 26 callbacks suppressed [ 746.516508][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 746.522262][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 746.586443][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 746.592272][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:59 executing program 5: socket$pptp(0x18, 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:07:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:07:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:07:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:07:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 746.666450][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 746.666455][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 746.666502][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 746.672252][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 746.689518][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 746.695288][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:07:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:07:59 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, 0x0, &(0x7f0000000040)=0x1fe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000080)=0xefe, 0x4) [ 746.892132][ T8942] 9pnet: Insufficient options for proto=fd [ 747.022108][ T8950] FS-Cache: Duplicate cookie detected [ 747.028278][ T8950] FS-Cache: O-cookie c=00000000a309e476 [p=00000000c051f381 fl=222 nc=0 na=1] [ 747.037709][ T8950] FS-Cache: O-cookie d=000000008ab76704 n=00000000721053e2 [ 747.045109][ T8950] FS-Cache: O-key=[10] '03000200040002000000' [ 747.051841][ T8950] FS-Cache: N-cookie c=00000000a06d6c56 [p=00000000c051f381 fl=2 nc=0 na=1] [ 747.058363][ T8953] ISOFS: Unable to identify CD-ROM format. 22:07:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:07:59 executing program 3: r0 = socket(0x40000000018, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$setsig(r0, 0xa, 0x27) setreuid(0x0, r1) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r2, 0xc) [ 747.060769][ T8950] FS-Cache: N-cookie d=000000008ab76704 n=00000000be265172 [ 747.073897][ T8950] FS-Cache: N-key=[10] '03000200040002000000' 22:07:59 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x45) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="75707065726469723d4661e47e8a859d6241c8122e2f66692ea3f532ce6c65302c6c6f77657264bdb878c4e0083204db244011348b69723d2e2f66696c65312c776f726b6469723ddf5c64a5c73faeb59e82fd4d5bfc83d3441ad5fc"]) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) link(&(0x7f0000000140)='./bus\x00', &(0x7f0000000100)='./file2\x00') stat(0x0, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x103) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ftruncate(r1, 0x8200) open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file1/file0\x00', 0x0, &(0x7f0000000500)={0x0, 0xfb, 0x89, 0x7, 0x0, "0e83f37e000f1c8f27e17a2251afe51d", "87fe785bc5854e463796e34fd65364de77c700f248c8ab7e2ec61d6107fef62389abcacd801d74da6e01ff98afcce5189a1c7caa1cf92edead8dfe2035e9677bfa0aae54816f2a85f776ec4c89edc6f28baed1918cbec76dd5558531cdac2c2afbcf7aab831dc3464c7d98041e7a4d1f73780761"}, 0x89, 0x3) 22:07:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) [ 747.423504][ T9074] ISOFS: Unable to identify CD-ROM format. 22:08:00 executing program 5: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) read(r0, &(0x7f0000000000)=""/25, 0x19) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) setuid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 747.495769][ T9088] __nla_parse: 2 callbacks suppressed [ 747.495778][ T9088] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 747.573203][ T9090] overlayfs: unrecognized mount option "lowerd½¸xÄà2Û$@4‹ir=./file1" or missing value [ 747.678763][ T9097] ISOFS: Unable to identify CD-ROM format. [ 747.701329][ T26] audit: type=1804 audit(1552169280.235:195): pid=9090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir456722681/syzkaller.yXxnYl/1212/file0/bus" dev="sda1" ino=17623 res=1 22:08:00 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xfffffef1, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x8}}, 0xffffffffffffffaa) 22:08:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) 22:08:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 747.742753][ T26] audit: type=1804 audit(1552169280.265:196): pid=9090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir456722681/syzkaller.yXxnYl/1212/file0/bus" dev="sda1" ino=17623 res=1 [ 747.856954][ T9112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) 22:08:00 executing program 5: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000000)=0x8, &(0x7f0000000040)=0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 747.884029][ T26] audit: type=1804 audit(1552169280.265:197): pid=9090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir456722681/syzkaller.yXxnYl/1212/file0/bus" dev="sda1" ino=17623 res=1 22:08:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x41a}], 0x1, &(0x7f0000000200), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x6, @mcast1}}, 0x84a, 0x8ea, 0x7, 0x9e, 0x10}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x1, 0x40, 0x0, 0x0, 0x20}, &(0x7f0000000300)=0x98) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) rt_sigsuspend(&(0x7f00000000c0)={0x7}, 0x8) [ 747.950448][ T9108] 9pnet: Insufficient options for proto=fd [ 748.018857][ T26] audit: type=1804 audit(1552169280.355:198): pid=9104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir456722681/syzkaller.yXxnYl/1212/file0/bus" dev="sda1" ino=17623 res=1 22:08:00 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f00000000c0), 0x400000000005, 0x0) write$P9_RRENAMEAT(r1, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) pipe(&(0x7f0000000040)) 22:08:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) [ 748.201843][ T26] audit: type=1804 audit(1552169280.355:199): pid=9090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir456722681/syzkaller.yXxnYl/1212/file0/bus" dev="sda1" ino=17623 res=1 22:08:00 executing program 3: write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffea) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000140)=0x800, 0xffffffffffffffe4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x0, "4f59f04a4c27c448"}) munmap(&(0x7f000021c000/0x4000)=nil, 0x4000) r2 = dup(0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00003c3000/0x3000)=nil, 0x3000, 0x2000000) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000000)=0x81) lstat(0x0, 0x0) 22:08:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, 0x0) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) pipe(&(0x7f00000004c0)) [ 748.328232][ T9123] ISOFS: Unable to identify CD-ROM format. [ 748.399632][ T9242] 9pnet: Insufficient options for proto=fd 22:08:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) 22:08:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, &(0x7f0000000080)=0x80, 0x80000) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 748.489163][ T9112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:01 executing program 0: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0xed, 0x5}, 'port0\x00', 0xc0, 0x1000, 0x377, 0x9, 0x4, 0x101, 0x0, 0x0, 0x2, 0x80000001}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000180)=0x54) 22:08:01 executing program 3: socket$packet(0x11, 0x4000000000000003, 0x300) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000180)={0xffffffffffffffff}) unshare(0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) pselect6(0x3f2, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000000)) [ 748.758844][ T9350] ISOFS: Unable to identify CD-ROM format. [ 748.764663][ T9374] IPVS: ftp: loaded support on port[0] = 21 22:08:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfa4, 0x1) getsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000040)=0x1) socket$inet6_udplite(0xa, 0x2, 0x88) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xffffff3a, 0x0, 0x0, 0x0) 22:08:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x400, 0x2) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xc0000, 0x0) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000040)="306c2dd59d4c1f3c7e8eb9bfea9d98c6d1ab1528932e42e557f493da404f135649b20fb2") ioctl$SIOCRSACCEPT(r1, 0x89e3) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x4) clock_gettime(0xfffffffffffffffd, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x7, @raw_data="3a2a767918214a5d5b53359514e0cf73336c029754def1b1c71da0d8016bc74a7f44c1f907e6d6a1c95ef21114830a364a9a965869f0a0977d3fa83914eb32628691c2fbb4cdc2e70c3a3cbfea0d7a7c45670c6f83d09a9025cd7e530d0188fdd8cf16d6af91d5fa0088db398880fddf085b53b8bcdf6777446baa618b9f138994d4be2f75d8a2c6c35d98afb1604837bbe8eeb0f228a55cf47a3514a67354ce62b8cc8fd10a11c149c58c2a19641e0066de4ee4cd031d1ad3070b3b965655ff0f9c38dd608f0854"}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000140)={r2, r3/1000+30000}, 0x10) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @host}, 0x10) [ 749.130699][ T9491] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x11, 0x0, &(0x7f0000000280)="26a4b8318b98ff4dc870bd6688a8640847", 0x0, 0x1200}, 0x28) 22:08:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f00000001c0)=0xdf8, 0x4) r3 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x40) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000200)={"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"}) bind$inet6(r2, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 22:08:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:08:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) 22:08:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 749.438478][ T9520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 749.448309][ T9497] ISOFS: Unable to identify CD-ROM format. 22:08:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 22:08:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x1) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/9) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x40, 0x80000, "266d8f99167124c637ca2c85fcb85bdf3c5fa056c7b9bc6f", {0x0, 0xfffffffffffffff9}, 0x4}) 22:08:02 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xa3, 0x0) sync_file_range(r0, 0x0, 0x80000000, 0x3) 22:08:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000400)={r1, 0xfffffffffffffffa, 0x7, r0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getgroups(0x3, &(0x7f0000000100)=[0x0, 0xee00, 0xee00]) setresgid(0x0, 0x0, r4) getgroups(0x2, &(0x7f0000000140)=[0x0, r3]) setregid(0x0, r5) write$smack_current(r0, &(0x7f0000000180)='TPROXY\x00', 0x7) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000140)={0x8000, &(0x7f0000000280)="ad27626ff4168105e964124f037999021db3a41b4095cade873ccbdd6570947741abffbc84b3c9b054658e0baf12a715277c463037e64dff605e9b0d464b92f842d897fe6c28c7c66b2697a20f06a17c017af3ceabc4e536aa1cd107dcd84cfb32aaae3ecb041e0cc5613cdf35f73cd9c29f144f9768d76213da5cec5021a5082c283591646cc9a840a9afa14e5ade567604b2ae31f5f9b762f20f0b69b03e8fa67458b339cf51ebf18455074a195d685c7844d4f24fa56b6057be583995a4b677b58f99bbe1"}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x7ff, 0x40100) getresgid(&(0x7f00000001c0), &(0x7f0000000380), &(0x7f00000003c0)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000000200)={{0xfff, 0x1}}) 22:08:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 749.680024][ T9637] ISOFS: Unable to identify CD-ROM format. 22:08:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x103000, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x0, 0x9, 0x8001, 0x20, 0x2, 0x9}) 22:08:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) [ 749.880628][ T9756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 749.891371][ T9650] 9pnet: Insufficient options for proto=fd 22:08:02 executing program 4: r0 = socket$packet(0x11, 0x8000000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x0, 0x1) msgget(0x3, 0x40) 22:08:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) [ 750.131560][ T9767] 9pnet: Insufficient options for proto=fd [ 750.219691][ T9763] ISOFS: Unable to identify CD-ROM format. 22:08:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x2ec, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000000)="89", 0x1, 0x4, 0x0, 0x6e) 22:08:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000200000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:08:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x20000000021) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x2, 0x800, 0x10) setsockopt$packet_int(r2, 0x107, 0x0, 0x0, 0x0) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000080)={0x7f, {{0xa, 0x4e24, 0x20, @local, 0xcb5}}, 0x1, 0x5, [{{0xa, 0x4e23, 0x800000000000000, @ipv4={[], [], @multicast2}, 0x101}}, {{0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x200}}, {{0xa, 0x4e20, 0x8, @remote, 0x4}}, {{0xa, 0x4e20, 0xfffffffffffffff9, @remote, 0x8d}}, {{0xa, 0x4e24, 0x7fffffff, @loopback, 0x8}}]}, 0x310) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000), 0xaf00, 0x0, 0x0, 0x101aa) 22:08:02 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x10000000}) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000080)=""/85) prctl$PR_GET_TIMERSLACK(0x1e) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 750.295719][ T9756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:03 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x43, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {0x0}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000200)={r2, &(0x7f0000000100)=""/244}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xfe3c456a153fccc, 0x0, 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0x3c5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x17) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000300)={r1, &(0x7f0000000240)=""/71}) 22:08:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:08:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz0\x00'}, 0x45c) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x801}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x50, r3, 0x6, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x40}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x1]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xa35, 0xd2e, 0x9b]}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4) 22:08:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000400)={0x3, 0x0, @pic={0x9, 0x20, 0x3ff, 0x681, 0xa8b, 0x4, 0x9, 0x20, 0x8, 0x6, 0x6, 0x0, 0x6, 0xffffffff, 0x1, 0x6}}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000640)={0xd7, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000680)={r4, 0x8001}) readv(r2, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/66, 0x42}, {&(0x7f0000000240)=""/59, 0x3b}, {&(0x7f0000000280)=""/176, 0xb0}, {&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f0000000340)=""/34, 0x22}], 0x5) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000080)=r2, 0x4) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000100)={0x9, {0x200, 0x4b, 0x0, 0x2}}) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="006d656d6f987e727920"], 0xfdef) [ 750.752059][ T9817] input: syz0 as /devices/virtual/input/input31 [ 750.769015][ T9819] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000000000), 0x1}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) 22:08:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 751.027431][ T9830] ISOFS: Unable to identify CD-ROM format. [ 751.065881][ T9817] input: syz0 as /devices/virtual/input/input32 22:08:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:08:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:03 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 22:08:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 22:08:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:03 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af22, &(0x7f00000000c0)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) 22:08:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x4) 22:08:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 751.472736][ T9968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 751.552964][ T9973] ISOFS: Unable to identify CD-ROM format. 22:08:04 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_SELECTION(r0, 0xc040563d, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0xee) [ 751.709576][T10094] QAT: Invalid ioctl 22:08:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000340)) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000280)={'dummy0\x00', 0x8401}) r3 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000040)) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000140)={0x0, {{0xa, 0x4e24, 0xb7, @loopback, 0x8ce7}}, {{0xa, 0x4e20, 0x100000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}}}, 0x108) mprotect(&(0x7f0000104000/0x2000)=nil, 0x2000, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r4, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x680000, 0x0) 22:08:04 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000080)={{0x7ff, 0x5}, {0x4dc0, 0x8}, 0x1, 0x4, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) [ 751.736070][T10094] QAT: Invalid ioctl 22:08:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 751.769310][T10098] QAT: Invalid ioctl 22:08:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000020000000ff0100000100000020000000050000000104000006876ef6bc0000000000000000009300efffff6b7e01c3ab713cce9005558e53e6f4374adfdf19d203c5270eba88d07ef11a197f0d"]) [ 751.803211][T10094] QAT: Invalid ioctl [ 751.875115][ T9968] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 751.894193][T10100] ISOFS: Unable to identify CD-ROM format. 22:08:04 executing program 3: lgetxattr(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x333900, 0x0) setsockopt$inet6_int(r1, 0x29, 0xd1, &(0x7f0000000680)=0x24000000000, 0x4) faccessat(r1, &(0x7f0000000640)='./file0\x00', 0x4, 0x1000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000900)={0x0, 0x7, 0x30}, &(0x7f0000000940)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000800)={r2, 0x9}, &(0x7f0000000880)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000008c0)={r3, 0x80, 0xeba, 0x2}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x6, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48, 0x7}, 0x0) 22:08:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='numa_maps\x00') ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000080)={0x0, 0x2, @raw_data=[0x2, 0xfffffffffffffff7, 0x4, 0x400, 0x1, 0x8, 0x1b, 0x0, 0xffffffffffff8001, 0x5, 0x401, 0x1, 0x7fffffff, 0x7, 0xa0, 0x6b]}) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 22:08:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000640)="02dbb53d6d80c76a0c78e0d38c2b5625", 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:04 executing program 5: syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0) setxattr$security_smack_transmute(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{}]}) [ 752.154708][T10221] rdma_op 00000000e0923823 conn xmit_rdma (null) 22:08:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 752.314523][T10228] ISOFS: Unable to identify CD-ROM format. 22:08:04 executing program 0: listen(0xffffffffffffffff, 0xa) socket$inet6(0xa, 0x6, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x80000, 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x602200, 0x4, 0x4002011, r1, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000001c0)=0x5ab) [ 752.487934][T10228] ISOFS: Unable to identify CD-ROM format. 22:08:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 752.582555][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 752.582581][ T26] audit: type=1804 audit(1552169285.105:202): pid=10353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir533346970/syzkaller.6WMh2D/1360/file0/bus" dev="ramfs" ino=177559 res=1 22:08:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x100000000, 0x1c7, 0x0, 0x90, 0x0) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x7, &(0x7f0000000040)=0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0xffffffffffffff2b, 0x5, 0x3f}) [ 752.738310][T10418] __nla_parse: 1 callbacks suppressed [ 752.738319][T10418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 752.756449][ C1] net_ratelimit: 25 callbacks suppressed [ 752.756457][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 752.767918][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:08:05 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x28580, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) finit_module(r1, &(0x7f0000000000)='iso9660\x00', 0x2) [ 752.809118][ T26] audit: type=1804 audit(1552169285.125:203): pid=10353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir533346970/syzkaller.6WMh2D/1360/file0/bus" dev="ramfs" ino=177559 res=1 [ 752.826449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 752.840236][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 752.906460][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 752.906489][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 752.912311][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 752.918069][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 752.930185][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<', r4}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 752.986904][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 753.047239][ T26] audit: type=1804 audit(1552169285.125:204): pid=10353 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir533346970/syzkaller.6WMh2D/1360/file0/bus" dev="ramfs" ino=177559 res=1 [ 753.089069][T10476] ISOFS: Unable to identify CD-ROM format. 22:08:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 22:08:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000080)={0x27, 0x3290eea4, 0x4}) 22:08:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$media(0x0, 0x3, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>', r3}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 753.286668][T10497] 9pnet: Insufficient options for proto=fd [ 753.353742][T10418] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 753.498879][T10505] ISOFS: Unable to identify CD-ROM format. [ 753.509594][T10514] 9pnet: Insufficient options for proto=fd 22:08:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) [ 753.737502][T10530] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 753.782924][T10527] 9pnet: Insufficient options for proto=fd [ 753.783136][T10532] 9pnet: Insufficient options for proto=fd [ 753.983058][T10531] ISOFS: Unable to identify CD-ROM format. 22:08:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x3, 0x600, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x2000010000000000) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x1, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0x7ff, 0x5]) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100020, 0x0) 22:08:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0xdf1, 0x28000) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101100) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000080)={0x0, 0x0, {0xff, 0x200, 0x301f, 0x0, 0xe, 0xe, 0x1}}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 754.219443][T10656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 754.247396][T10655] 9pnet: Insufficient options for proto=fd [ 754.299707][T10657] 9pnet: Insufficient options for proto=fd [ 754.301361][T10661] ISOFS: Unable to identify CD-ROM format. [ 754.306727][T10658] 9pnet: Insufficient options for proto=fd 22:08:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:06 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0xd1a, 0x8000) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)=""/4096, &(0x7f0000000000)=0xfffffffffffffd92) sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r1 = getpgid(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, 0x0, 0x0) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000200)) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) 22:08:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 754.525412][T10656] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 754.548146][T10774] 9pnet: Insufficient options for proto=fd 22:08:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$media(0x0, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 754.782972][T10789] 9pnet: Insufficient options for proto=fd 22:08:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 755.121475][T10805] ISOFS: Unable to identify CD-ROM format. 22:08:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 755.278855][T10902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 755.505453][T10919] ISOFS: Unable to identify CD-ROM format. 22:08:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 755.650408][T10936] ISOFS: Unable to identify CD-ROM format. 22:08:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x800) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000100)={{0x1, 0xc1c9}, {0x4, 0xffffffffffffff01}, 0xffffffff7fffffff, 0x1, 0xeb}) accept(r0, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 755.731106][T10938] 9pnet: Insufficient options for proto=fd 22:08:08 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') r1 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r1, &(0x7f0000000080)=[{{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, &(0x7f0000002740)=[{&(0x7f0000001740)="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", 0x597}], 0x1}}], 0x1, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)="22eaa66fb44ddf35b4af383095bad8e55310fcf44613131cb7b26715ca40c962f476de4ba8bacaac84e1d2dc3380cae24d0768590c14d93702d9e92c6a79e544d3353a92389d7250c5c16c876b91eb60d8234d626bdafe9d924cf974"}, 0x10) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, 0x0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r4, &(0x7f0000000140)={0x2000}) r5 = gettid() kcmp$KCMP_EPOLL_TFD(r5, r5, 0x7, 0xffffffffffffffff, 0x0) close(r4) socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000040), 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @multicast2}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x3, r5}) [ 755.822502][T10951] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 755.919002][T10961] 9pnet: Insufficient options for proto=fd 22:08:08 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 756.000954][T10963] ISOFS: Unable to identify CD-ROM format. 22:08:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 756.074643][T11065] 9pnet: Insufficient options for proto=fd [ 756.133633][T11080] 9pnet: Insufficient options for proto=fd [ 756.229970][T11075] ISOFS: Unable to identify CD-ROM format. 22:08:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:08 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:08 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = geteuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xac, 0x2, &(0x7f0000000180)=[{&(0x7f0000000300)="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", 0x1000, 0x6}, {&(0x7f0000000080)="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", 0xfe, 0x2}], 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB="2c5510347030dcc5b361743d69736f39363630002c7569643d100b62d90e5d032703b962416422bd77210c00009824ebfdc4d06ba437c68b02f20f502d485d26307054c1475ac3bde791a6b4872787fb0a447477af4d538d38a676df1d1fcb940ed37bd1ca7b010fa563099f3e4819f42d7a87c426bc20004d1f993f3029a1d2955fd4b308a5d6e7670e601edf7615c719479fe81b1de7bf313997bea5af1a42e215288837e99dd49762759efa9281290fc3a5d84fe6ecf0b2e2f1701ce0d08a4b837b5da696c007059a4d888ec1f8494a799352aea94bf0c69d51659af8ed462dfccec524e7fd20cadf1676a802c44163e0809a8fef0ce4d75621cb5319b729341638b4a3af6556e3361f9f304de196487b1d6a3b6ca0ce617a6ebe2215935b6c14c29569848376", @ANYRESDEC=r1, @ANYBLOB="2c6673757569643d77323636356236312d7b7764382d617600302d373877002d397f62617363367f2c726f6f74636f6e746578743d757365725f752c00"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 756.382466][T11093] 9pnet: Insufficient options for proto=fd [ 756.407657][T11095] 9pnet: Insufficient options for proto=fd 22:08:09 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 756.515512][T11100] ntfs: (device loop5): parse_options(): Invalid gid option argument: 0xffffffffffffffff [ 756.535170][T11106] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 756.553039][T11105] 9pnet: Insufficient options for proto=fd 22:08:09 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x9, [@dev={0xac, 0x14, 0x14, 0x14}, @broadcast, @multicast1, @local, @dev={0xac, 0x14, 0x14, 0x11}, @multicast2, @rand_addr=0xf4, @multicast2, @multicast2]}, 0x34) r2 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0xfffffffffffffff7, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x0, 0x5}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000300)=0xe4c) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98f23c4fc62d") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = gettid() getpgid(r4) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r5, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r5, r6, 0x0, 0x10000) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000000c0)={0x0, 0x4, 0x0, "1760550f2b6f740400f0eb0300000020000400"}) 22:08:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 756.692902][ T26] audit: type=1800 audit(1552169289.215:205): pid=11113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16914 res=0 [ 756.704964][T11120] 9pnet: Insufficient options for proto=fd [ 756.809045][T11124] 9pnet: Insufficient options for proto=fd [ 756.839104][T11160] 9pnet: Insufficient options for proto=fd [ 756.843513][ T26] audit: type=1804 audit(1552169289.255:206): pid=11113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir533346970/syzkaller.6WMh2D/1366/file0" dev="sda1" ino=16914 res=1 [ 756.908346][ T26] audit: type=1800 audit(1552169289.255:207): pid=11113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16914 res=0 [ 756.948972][T11228] 9pnet: Insufficient options for proto=fd 22:08:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.025086][T11111] ISOFS: Unable to identify CD-ROM format. 22:08:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 0: rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCFLSH(r1, 0x540b, 0x2f) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="73797a3044744b6b64393d53b4f42980fd3b9473871fe3abf568fccb5699098b000000"], 0x16) getsockopt$netlink(r1, 0x10e, 0x1, &(0x7f0000000200), &(0x7f0000000240)) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f0000000780)=ANY=[@ANYBLOB='C'], 0x1) write$P9_RREADLINK(r1, &(0x7f00000001c0)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f00000000c0)={0x0, 0x2710}, 0x10) splice(r0, 0x0, r2, 0x0, 0xe212, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) sync_file_range(r1, 0x0, 0x9a19, 0x2) 22:08:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.101440][T11236] 9pnet: Insufficient options for proto=fd [ 757.154384][T11242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 757.176172][T11244] 9pnet: Insufficient options for proto=fd [ 757.216862][T11111] ntfs: (device loop5): parse_options(): Invalid gid option argument: 0xffffffffffffffff 22:08:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x10) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='iso9660\x00') syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2046000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="8c020000", @ANYRES16=r2, @ANYBLOB="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"], 0x28c}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) write$UHID_INPUT2(r1, &(0x7f0000000140)={0xc, 0x3, "82be68"}, 0x9) 22:08:09 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:09 executing program 0: r0 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000000100), &(0x7f00000001c0)=0x10, 0x800) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000200)={'syzkaller0\x00', 0x7}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(0xffffffffffffffff, 0x4040aea4, &(0x7f00000000c0)={0x8, 0x2, 0x3}) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f000000b000/0x4000)=nil) syz_init_net_socket$llc(0x1a, 0x801, 0x0) r3 = syz_open_dev$sndpcmc(0x0, 0x1, 0x800) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x10000000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0) 22:08:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 757.375994][T11362] 9pnet: Insufficient options for proto=fd [ 757.403615][T11364] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.427758][T11368] 9pnet: Insufficient options for proto=fd 22:08:10 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno'}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.517268][ T26] audit: type=1804 audit(1552169290.055:208): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir839897464/syzkaller.xa1Tf6/1215/file0" dev="sda1" ino=16945 res=1 22:08:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x12) write$P9_RCLUNK(r1, &(0x7f0000000040)={0xfffffffffffffe69, 0x79, 0xffffffffffff7fff}, 0x7) setsockopt$inet_udp_encap(r1, 0x11, 0x64, 0xfffffffffffffffe, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x82, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1501de82650d136d}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@getneigh={0x14, 0x1e, 0x8, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4040}, 0x80) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001e0034002dbd2139a0bf2cb0a3700000a2027e296adaced3ded527b8b64578f904778ebabae0d9dc2bc518bae136fdfa1ce64c3a06a964499ad86136cc72e131fd3b0b9be59a004baf87a0b38c32b9883292a934009210c36f94cc6dc1fcc06aadbea79a17881e878c37e7104c41329edcdbc4f2337585ee252020931fa4cdf4ec99a5cd3156dc56465acdc50362795df19431bdbec76175c19e01003ca293e39fe578a96088e34c6c9459c4642f16b3c3f48ddaba7d66"], 0xfffffffffffffe9b}}, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000340)={0x13000, 0x5000, 0x10000, 0x1324, 0x83}) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) 22:08:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.629640][T11482] 9pnet: Insufficient options for proto=fd [ 757.715938][T11394] ISOFS: Unable to identify CD-ROM format. [ 757.817055][ T26] audit: type=1804 audit(1552169290.345:209): pid=11394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir839897464/syzkaller.xa1Tf6/1215/file0" dev="sda1" ino=16945 res=1 22:08:10 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x2, 0x0, @local}, &(0x7f0000000080)=0x80, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x9, 0x80) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') 22:08:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="240000001a0025e0046bbc04fef70f1c020b49ff00000060801108000800100001000000", 0x24) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x2) write$P9_RREMOVE(r1, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) 22:08:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0xa, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.882845][ T26] audit: type=1804 audit(1552169290.345:210): pid=11479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir839897464/syzkaller.xa1Tf6/1215/file0" dev="sda1" ino=16945 res=1 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 757.940790][T11606] 9pnet: Insufficient options for proto=fd [ 757.960948][T11607] 9pnet: Insufficient options for proto=fd 22:08:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0xf, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x10c00, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x600000, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x6) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 758.095468][T11717] 9pnet: Insufficient options for proto=fd 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 758.170405][T11731] 9pnet: Insufficient options for proto=fd [ 758.183787][T11732] 9pnet: Insufficient options for proto=fd [ 758.289469][T11639] ISOFS: Unable to identify CD-ROM format. [ 758.312374][T11761] 9pnet: Insufficient options for proto=fd 22:08:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x29dd, 0x400) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) inotify_rm_watch(r0, r1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0xf5, "0427a8c03bd160374efe5247ea33b3ef37c52e40e0e847a221561a72d8b91f489d636109c0b56c687febf56a4d0ce4fd81f45f189a0fceee2da83d9fd41083f30934aac484c3004468de819efdf15b3445fc598be698966fdd0c8772d0cf5899e940ee84177e7284d4f77e2db4a0f2aac7c2cc2eb8065a53bd4e64573b19397d8c0c82edc5ebe6dfceb477dc222b53d3cb84a268bfd68807fa78c84e6048f7642091edcde2e0e13e576209c2315296bc9ee4e143b4b902df6e42fe36e93ae11fa66c5b4d84cc1196de7144adcadcbfc88a4d4322f8e170fd2871de1bc2d4cbcd1a1e63e6951802bbeade2ebc6a310746ba902459b2"}, &(0x7f0000000180)=0xfd) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r2, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000001c0)=0x84) 22:08:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:10 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 758.458280][T11857] 9pnet: Insufficient options for proto=fd [ 758.472133][T11856] 9pnet: Insufficient options for proto=fd [ 758.490738][T11859] 9pnet: Insufficient options for proto=fd 22:08:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x80, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x4000000080000, 0x0) r2 = getuid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000280)='./file0\x00', r2, r3, 0x1000) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000003c0)) accept4$llc(r1, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000200)=0x10, 0x800) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x10001, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f585d72f2f0330fb964693faa594466696c65302c776f72686469723d2e2f6669"]) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000180)={{0x4, 0x9, 0x4, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1}, 0xcc, 0x337b, 0x1}) 22:08:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x25, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 758.659172][T11862] ISOFS: Unable to identify CD-ROM format. [ 758.692265][T11872] overlayfs: unrecognized mount option "loX]ròð3¹di?ªYDfile0" or missing value 22:08:11 executing program 5: r0 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="5b1b461c1366e49f8dd16778010708b7d63ee3ed28044e1fc31a62dd9690b6e4d70371eb133fd35f760d45373c64ad1f287cbdfbc1bb6f2104eeebe6881a98070306eb4f1165ca21566ce4b84c9affee030c6d2c0cfdc542dc4b09ebf82aa76aaf2bbfd3703185e93552ad6a5a3c0ebb1b189c986218f4f99089eb860bebeff94429300104f0cf0a6a", 0x89, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000140)='nodev\x00', &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x2f, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffb0) socket$alg(0x26, 0x5, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x10000, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000100)={@remote, @dev, @dev}, &(0x7f0000000140)=0xc) bind$alg(r2, 0x0, 0x6fa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0x20000439}], 0x4}}], 0x1, 0x0, 0x0) 22:08:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 758.986462][ C1] net_ratelimit: 23 callbacks suppressed [ 758.986470][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 758.998016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 759.016137][T12000] ISOFS: Unable to identify CD-ROM format. 22:08:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x30, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 759.066449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.072267][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdc6, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0xa) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x1000001, 0x0) r0 = request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='@\x00', 0xfffffffffffffff8) r1 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='iso9660\x00', r0) keyctl$link(0x8, r1, r1) [ 759.146439][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 759.146469][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 759.152248][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 759.158025][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 759.169432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 759.179790][T12062] 9pnet: Insufficient options for proto=fd 22:08:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 759.226487][ C0] protocol 88fb is buggy, dev hsr_slave_0 22:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x1b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x86dd, 'caif0\x00', 'veth1_to_team\x00', 'syzkaller1\x00', 'veth1_to_team\x00', @remote, [], @link_local, [], 0xe8, 0xe8, 0x120, [@ip6={'ip6\x00', 0x50, {{@dev, @ipv4={[], [], @initdev}, [], [], 0x0, 0x0, 0x88}}}]}}, @common=@mark={'mark\x00', 0x10}}]}]}, 0x228) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000000c0)={@loopback, @loopback}, &(0x7f0000000100)=0x8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f0000000400)={@default, @bcast, 0x8, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000480)=0x1, 0x4) lsetxattr$trusted_overlay_origin(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.origin\x00', &(0x7f0000000540)='y\x00', 0x2, 0x1) 22:08:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x60, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 759.370437][T12130] ISOFS: Unable to identify CD-ROM format. [ 759.378003][T12138] 9pnet: Insufficient options for proto=fd 22:08:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(0x0, 0x3, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 5: r0 = accept4$rose(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) fcntl$setpipe(r0, 0x407, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x67, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 0: setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x8}, 0x37a) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x440, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x347, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000001a00010400000000aa34c6a10a0003000096483d211954fed3c072f24441a0bcb2000000"], 0x1}}, 0x0) membarrier(0x4, 0x0) 22:08:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 759.595872][T12258] 9pnet: Insufficient options for proto=fd 22:08:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0xc0, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:12 executing program 0: r0 = socket$kcm(0x10, 0x800000000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x3f, @empty, 0x4e22, 0x1, 'dh\x00', 0x4d8c2901392d7418, 0xfffffffffffffff8, 0x76}, {@loopback, 0x4e22, 0x3, 0xec8, 0x8, 0x401}}, 0x44) sendmsg$kcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000007c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) 22:08:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 759.961892][T12266] ISOFS: Unable to identify CD-ROM format. 22:08:12 executing program 5: r0 = socket$isdn(0x22, 0x3, 0x22) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x7, {0x1}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0xec0, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:12 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, 0x0, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r1, 0x80044327, &(0x7f0000000500)) 22:08:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, 0x0, &(0x7f0000000200)='9p\x00', 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:12 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x33fe0, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0xf0}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001c00070f000000000000000007000000", @ANYRES32=r1, @ANYBLOB="ffff65e8119e0200eb6daaaaaaaa0000"], 0xff8e}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x1) [ 760.341825][T12526] ISOFS: Unable to identify CD-ROM format. 22:08:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 760.461293][T12647] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 760.499227][T12642] ISOFS: Unable to identify CD-ROM format. 22:08:13 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20000020, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:13 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="60f06ae6ee"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 22:08:13 executing program 1 (fault-call:3 fault-nth:0): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x82, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x7ffff000, 0x22, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 760.739086][T12771] ceph: device name is missing path (no : separator in `ðjæî) 22:08:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any='access=any'}, {@loose='loose'}], [{@smackfsroot={'smackfsroot', 0x3d, '*self-em1eth0#'}}, {@uid_gt={'uid>'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@hash='hash'}, {@uid_lt={'uid<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) [ 760.811406][T12766] ISOFS: Unable to identify CD-ROM format. [ 760.848318][T12779] FAULT_INJECTION: forcing a failure. [ 760.848318][T12779] name failslab, interval 1, probability 0, space 0, times 0 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0xf, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 760.910242][T12779] CPU: 0 PID: 12779 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 760.918962][T12779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.929019][T12779] Call Trace: [ 760.932326][T12779] dump_stack+0x172/0x1f0 [ 760.936673][T12779] should_fail.cold+0xa/0x15 [ 760.941270][T12779] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 760.947152][T12779] ? ___might_sleep+0x163/0x280 [ 760.952010][T12779] __should_failslab+0x121/0x190 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x67, 0x1, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000001300)=""/4096, &(0x7f0000000040)=0x1000) read$FUSE(r0, &(0x7f0000000300), 0x1000) [ 760.956948][T12779] should_failslab+0x9/0x14 [ 760.961465][T12779] __kmalloc_track_caller+0x2d8/0x740 [ 760.966870][T12779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 760.973121][T12779] ? fput_many+0x12c/0x1a0 [ 760.977545][T12779] ? strndup_user+0x77/0xd0 [ 760.982057][T12779] memdup_user+0x26/0xb0 [ 760.986299][T12779] strndup_user+0x77/0xd0 [ 760.990632][T12779] ksys_mount+0x3c/0x150 [ 760.994884][T12779] __x64_sys_mount+0xbe/0x150 [ 760.999573][T12779] do_syscall_64+0x103/0x610 [ 761.004175][T12779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.010066][T12779] RIP: 0033:0x457f29 [ 761.013967][T12779] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.033570][T12779] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 761.041981][T12779] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 761.049957][T12779] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x2, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000300)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000080)) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000000c0)={[{0x8}]}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f00000001c0)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="0788784d7c0e8661dc35d8000002", @ANYRES16=r4, @ANYBLOB="250025bd7000fddbdf25080000002000010014000300e000000100000000000000000000000008000b0073697000080004000600000008000400f9ffffff3400020008000300020000000800090002000000080002004e21000008000900ff0300000800080005000000080002004e21000008000600d55f00005800030008000500ac1414aa0800010002000000080007004e220000080001000100000008000800050000000800080004000000140002000000000000000000000000000000000008000400008000000800010000000000"], 0xd8}}, 0x8840) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000500)={&(0x7f00000002c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r5, 0x100, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x9, 0x8, 0x7f}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x1) [ 761.057928][T12779] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.065898][T12779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 761.073872][T12779] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:13 executing program 4 (fault-call:3 fault-nth:0): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:13 executing program 1 (fault-call:3 fault-nth:1): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 761.193769][T12896] ISOFS: Unable to identify CD-ROM format. [ 761.233794][T12912] FAULT_INJECTION: forcing a failure. [ 761.233794][T12912] name failslab, interval 1, probability 0, space 0, times 0 22:08:13 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x3, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 761.336654][T12912] CPU: 0 PID: 12912 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 761.345374][T12912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.355432][T12912] Call Trace: [ 761.358735][T12912] dump_stack+0x172/0x1f0 [ 761.361079][T13021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 761.363077][T12912] should_fail.cold+0xa/0x15 [ 761.363109][T12912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.376892][T12912] ? ___might_sleep+0x163/0x280 [ 761.376915][T12912] __should_failslab+0x121/0x190 [ 761.376934][T12912] should_failslab+0x9/0x14 [ 761.376956][T12912] __kmalloc_track_caller+0x2d8/0x740 [ 761.387595][T12912] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.388107][T12912] ? fput_many+0x12c/0x1a0 [ 761.388131][T12912] ? strndup_user+0x77/0xd0 [ 761.397545][T12912] memdup_user+0x26/0xb0 [ 761.397563][T12912] strndup_user+0x77/0xd0 [ 761.397581][T12912] ksys_mount+0x3c/0x150 [ 761.397601][T12912] __x64_sys_mount+0xbe/0x150 22:08:13 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 761.409176][T12912] do_syscall_64+0x103/0x610 [ 761.409199][T12912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.409210][T12912] RIP: 0033:0x457f29 [ 761.409225][T12912] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.409237][T12912] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 761.418203][T12912] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 761.418213][T12912] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 761.418222][T12912] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.418231][T12912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 761.418248][T12912] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 761.445937][T13018] FAULT_INJECTION: forcing a failure. [ 761.445937][T13018] name failslab, interval 1, probability 0, space 0, times 0 22:08:14 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x800000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x0, 0x0, 0x4e21}, {0x0, 0x192}, &(0x7f00000003c0)}, 0xffe4) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000ec0)={0x0, 0x0, 0x2080}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000500)={{0x80, 0x3, 0x0, 0x101}, 'syz0\x00', 0x1d}) r2 = socket(0xf, 0x1, 0x20000000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) bind$inet(r2, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000a00), 0x0, 0x0, 0x0, 0x0) accept4$unix(r2, &(0x7f0000000440), &(0x7f0000000340)=0x6e, 0x800) r3 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000200)=""/122) r4 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000380)='\\-\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r4) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/60) mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000300)=""/24, 0x18, 0x200000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000001bc0)="0adc1f023c123f3188a070") openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 22:08:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000080)=""/219) socketpair(0x1d, 0x80005, 0xfffffffffffffff8, &(0x7f0000000000)) [ 761.450805][T13018] CPU: 0 PID: 13018 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 761.486647][T13018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.486653][T13018] Call Trace: [ 761.486677][T13018] dump_stack+0x172/0x1f0 [ 761.486700][T13018] should_fail.cold+0xa/0x15 [ 761.486718][T13018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.486738][T13018] ? ___might_sleep+0x163/0x280 [ 761.486757][T13018] __should_failslab+0x121/0x190 [ 761.486777][T13018] should_failslab+0x9/0x14 [ 761.502699][T13018] kmem_cache_alloc+0x2b2/0x6f0 [ 761.502720][T13018] ? __might_fault+0x12b/0x1e0 [ 761.502739][T13018] getname_flags+0xd6/0x5b0 [ 761.502758][T13018] user_path_at_empty+0x2f/0x50 [ 761.502775][T13018] do_mount+0x150/0x2c40 [ 761.502796][T13018] ? copy_mount_string+0x40/0x40 [ 761.502825][T13018] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.531293][T13018] ? _copy_from_user+0xdd/0x150 [ 761.531317][T13018] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.531334][T13018] ? copy_mount_options+0x280/0x3a0 [ 761.531353][T13018] ksys_mount+0xdb/0x150 [ 761.531369][T13018] __x64_sys_mount+0xbe/0x150 [ 761.531390][T13018] do_syscall_64+0x103/0x610 [ 761.531410][T13018] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.550199][T13018] RIP: 0033:0x457f29 [ 761.550216][T13018] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 761.550224][T13018] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:08:14 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:14 executing program 4 (fault-call:3 fault-nth:1): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 761.550239][T13018] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 761.550249][T13018] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 761.550257][T13018] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.550266][T13018] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 761.550274][T13018] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 761.740591][T13030] FAULT_INJECTION: forcing a failure. [ 761.740591][T13030] name failslab, interval 1, probability 0, space 0, times 0 [ 761.792031][T13030] CPU: 0 PID: 13030 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 761.800749][T13030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.810808][T13030] Call Trace: [ 761.810836][T13030] dump_stack+0x172/0x1f0 [ 761.810861][T13030] should_fail.cold+0xa/0x15 [ 761.810882][T13030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 761.810903][T13030] ? ___might_sleep+0x163/0x280 [ 761.810924][T13030] __should_failslab+0x121/0x190 22:08:14 executing program 0: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6}}, 0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) waitid(0x1, r0, 0x0, 0x6, &(0x7f0000000080)) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 22:08:14 executing program 1 (fault-call:3 fault-nth:2): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 761.810949][T13030] should_failslab+0x9/0x14 [ 761.818535][T13030] kmem_cache_alloc+0x2b2/0x6f0 [ 761.818555][T13030] ? __might_fault+0x12b/0x1e0 [ 761.818577][T13030] getname_flags+0xd6/0x5b0 [ 761.818597][T13030] user_path_at_empty+0x2f/0x50 [ 761.818614][T13030] do_mount+0x150/0x2c40 [ 761.818634][T13030] ? copy_mount_string+0x40/0x40 [ 761.818651][T13030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.818662][T13030] ? _copy_from_user+0xdd/0x150 [ 761.818681][T13030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.833865][T13030] ? copy_mount_options+0x280/0x3a0 [ 761.833886][T13030] ksys_mount+0xdb/0x150 [ 761.833903][T13030] __x64_sys_mount+0xbe/0x150 [ 761.833927][T13030] do_syscall_64+0x103/0x610 [ 761.833947][T13030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.833962][T13030] RIP: 0033:0x457f29 [ 761.857418][T13030] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:14 executing program 4 (fault-call:3 fault-nth:2): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:14 executing program 3 (fault-call:3 fault-nth:0): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 761.857427][T13030] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 761.857442][T13030] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 761.857451][T13030] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 761.857459][T13030] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 761.857468][T13030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 761.857476][T13030] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 762.050564][T13244] FAULT_INJECTION: forcing a failure. [ 762.050564][T13244] name failslab, interval 1, probability 0, space 0, times 0 [ 762.063547][T13245] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 762.079367][T13247] FAULT_INJECTION: forcing a failure. [ 762.079367][T13247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.092579][T13247] CPU: 0 PID: 13247 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 762.101236][T13247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.101242][T13247] Call Trace: [ 762.101268][T13247] dump_stack+0x172/0x1f0 [ 762.101293][T13247] should_fail.cold+0xa/0x15 [ 762.101308][T13247] ? kernel_text_address+0x73/0xf0 [ 762.101326][T13247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.101343][T13247] ? __lock_acquire+0x548/0x3fb0 [ 762.101362][T13247] ? __save_stack_trace+0x8a/0xf0 [ 762.114691][T13247] should_fail_alloc_page+0x50/0x60 [ 762.114710][T13247] __alloc_pages_nodemask+0x1a1/0x7e0 [ 762.114732][T13247] ? __alloc_pages_slowpath+0x2900/0x2900 [ 762.114744][T13247] ? find_held_lock+0x35/0x130 [ 762.114775][T13247] ? do_syscall_64+0x103/0x610 [ 762.123655][T13247] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.123679][T13247] cache_grow_begin+0x9c/0x860 [ 762.123701][T13247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.123719][T13247] kmem_cache_alloc+0x62d/0x6f0 [ 762.123744][T13247] getname_flags+0xd6/0x5b0 [ 762.134636][T13247] user_path_at_empty+0x2f/0x50 [ 762.134656][T13247] do_mount+0x150/0x2c40 [ 762.134678][T13247] ? copy_mount_string+0x40/0x40 [ 762.134693][T13247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.134710][T13247] ? _copy_from_user+0xdd/0x150 [ 762.221503][T13247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.227743][T13247] ? copy_mount_options+0x280/0x3a0 [ 762.232951][T13247] ksys_mount+0xdb/0x150 [ 762.237189][T13247] __x64_sys_mount+0xbe/0x150 [ 762.241874][T13247] do_syscall_64+0x103/0x610 [ 762.246463][T13247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.252345][T13247] RIP: 0033:0x457f29 [ 762.256233][T13247] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.275827][T13247] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.284227][T13247] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 762.292192][T13247] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 762.300153][T13247] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.308114][T13247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 762.316079][T13247] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 762.324077][T13244] CPU: 1 PID: 13244 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 762.332763][T13244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.336337][T13248] FAULT_INJECTION: forcing a failure. [ 762.336337][T13248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 762.342815][T13244] Call Trace: [ 762.359265][T13244] dump_stack+0x172/0x1f0 [ 762.363596][T13244] should_fail.cold+0xa/0x15 [ 762.368177][T13244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.373979][T13244] ? ___might_sleep+0x163/0x280 [ 762.378832][T13244] __should_failslab+0x121/0x190 [ 762.383765][T13244] should_failslab+0x9/0x14 [ 762.388259][T13244] __kmalloc_track_caller+0x2d8/0x740 [ 762.393623][T13244] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 762.399849][T13244] ? fput_many+0x12c/0x1a0 [ 762.404260][T13244] ? strndup_user+0x77/0xd0 [ 762.408775][T13244] memdup_user+0x26/0xb0 [ 762.413024][T13244] strndup_user+0x77/0xd0 [ 762.417356][T13244] ksys_mount+0x3c/0x150 [ 762.421589][T13244] __x64_sys_mount+0xbe/0x150 [ 762.426265][T13244] do_syscall_64+0x103/0x610 [ 762.430849][T13244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.436727][T13244] RIP: 0033:0x457f29 [ 762.440621][T13244] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.460215][T13244] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.468612][T13244] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 762.476571][T13244] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 762.484527][T13244] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.492485][T13244] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 22:08:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r0, 0x15, &(0x7f0000000100)={0x3a, 0x0, 0x5}) r1 = socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000), &(0x7f00000000c0)=0x4) sendmmsg(r1, &(0x7f0000000640), 0x40000000000029b, 0x0) [ 762.500482][T13244] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 762.508471][T13248] CPU: 0 PID: 13248 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 762.517264][T13248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.527315][T13248] Call Trace: [ 762.530609][T13248] dump_stack+0x172/0x1f0 [ 762.534958][T13248] should_fail.cold+0xa/0x15 [ 762.539561][T13248] ? kernel_text_address+0x73/0xf0 [ 762.544678][T13248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.550490][T13248] ? __lock_acquire+0x548/0x3fb0 [ 762.555429][T13248] ? __save_stack_trace+0x8a/0xf0 [ 762.560464][T13248] should_fail_alloc_page+0x50/0x60 [ 762.565669][T13248] __alloc_pages_nodemask+0x1a1/0x7e0 [ 762.571054][T13248] ? __alloc_pages_slowpath+0x2900/0x2900 [ 762.576775][T13248] ? find_held_lock+0x35/0x130 [ 762.581550][T13248] ? do_syscall_64+0x103/0x610 [ 762.586323][T13248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.592152][T13248] cache_grow_begin+0x9c/0x860 [ 762.596930][T13248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.603368][T13248] kmem_cache_alloc+0x62d/0x6f0 [ 762.608241][T13248] getname_flags+0xd6/0x5b0 [ 762.608263][T13248] user_path_at_empty+0x2f/0x50 [ 762.608281][T13248] do_mount+0x150/0x2c40 [ 762.608301][T13248] ? copy_mount_string+0x40/0x40 [ 762.617633][T13248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.617648][T13248] ? _copy_from_user+0xdd/0x150 [ 762.617665][T13248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.617679][T13248] ? copy_mount_options+0x280/0x3a0 [ 762.617697][T13248] ksys_mount+0xdb/0x150 [ 762.617712][T13248] __x64_sys_mount+0xbe/0x150 [ 762.617742][T13248] do_syscall_64+0x103/0x610 [ 762.617760][T13248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.617776][T13248] RIP: 0033:0x457f29 [ 762.626913][T13248] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.626922][T13248] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:08:15 executing program 1 (fault-call:3 fault-nth:3): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 762.626936][T13248] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 762.626945][T13248] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 762.626953][T13248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.626962][T13248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 762.626970][T13248] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 762.690210][T13268] FAULT_INJECTION: forcing a failure. [ 762.690210][T13268] name failslab, interval 1, probability 0, space 0, times 0 [ 762.718640][T13268] CPU: 0 PID: 13268 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 762.733734][T13268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 762.772935][T13268] Call Trace: [ 762.776235][T13268] dump_stack+0x172/0x1f0 [ 762.780570][T13268] should_fail.cold+0xa/0x15 [ 762.780590][T13268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 762.790942][T13268] ? ___might_sleep+0x163/0x280 [ 762.790965][T13268] __should_failslab+0x121/0x190 [ 762.790983][T13268] should_failslab+0x9/0x14 [ 762.791002][T13268] kmem_cache_alloc_trace+0x2d1/0x760 [ 762.810591][T13268] alloc_fs_context+0x5a/0x640 [ 762.810610][T13268] fs_context_for_mount+0x25/0x30 [ 762.810628][T13268] do_mount+0x13d7/0x2c40 [ 762.820393][T13268] ? copy_mount_string+0x40/0x40 [ 762.820409][T13268] ? _copy_from_user+0xdd/0x150 [ 762.820430][T13268] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.820442][T13268] ? copy_mount_options+0x280/0x3a0 [ 762.820458][T13268] ksys_mount+0xdb/0x150 [ 762.834544][T13268] __x64_sys_mount+0xbe/0x150 [ 762.834566][T13268] do_syscall_64+0x103/0x610 [ 762.834584][T13268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.834597][T13268] RIP: 0033:0x457f29 [ 762.845990][T13268] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 762.845999][T13268] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 762.846013][T13268] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 762.846021][T13268] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 762.846034][T13268] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 762.854914][T13268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 762.854923][T13268] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x4, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040), 0x4) ioctl$LOOP_CLR_FD(r1, 0x4c01) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:15 executing program 4 (fault-call:3 fault-nth:3): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:15 executing program 3 (fault-call:3 fault-nth:1): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:15 executing program 1 (fault-call:3 fault-nth:4): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:15 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x5) listen(r0, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback, @local}, &(0x7f0000000140)=0xc) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x600880) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r4 = syz_open_dev$mouse(0x0, 0x0, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000180)=ANY=[@ANYBLOB="0100190000000046accd33c6"]) syz_kvm_setup_cpu$x86(r5, r7, &(0x7f000072f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x91) semget(0x1, 0x0, 0x0) ioctl$TCSETAW(r4, 0x5407, 0x0) [ 763.041673][T13371] FAULT_INJECTION: forcing a failure. [ 763.041673][T13371] name failslab, interval 1, probability 0, space 0, times 0 [ 763.088232][T13374] FAULT_INJECTION: forcing a failure. [ 763.088232][T13374] name failslab, interval 1, probability 0, space 0, times 0 [ 763.091188][T13375] FAULT_INJECTION: forcing a failure. [ 763.091188][T13375] name failslab, interval 1, probability 0, space 0, times 0 [ 763.101464][T13371] CPU: 0 PID: 13371 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 763.122325][T13371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.122331][T13371] Call Trace: [ 763.122355][T13371] dump_stack+0x172/0x1f0 [ 763.122378][T13371] should_fail.cold+0xa/0x15 [ 763.122398][T13371] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.135728][T13371] ? ___might_sleep+0x163/0x280 [ 763.135751][T13371] __should_failslab+0x121/0x190 [ 763.135770][T13371] should_failslab+0x9/0x14 [ 763.135793][T13371] kmem_cache_alloc_trace+0x2d1/0x760 [ 763.170073][T13371] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 763.171444][T13376] ISOFS: Unable to identify CD-ROM format. [ 763.175880][T13371] ? rcu_read_lock_sched_held+0x110/0x130 [ 763.175902][T13371] ? kmem_cache_alloc_trace+0x354/0x760 [ 763.175924][T13371] legacy_init_fs_context+0x48/0xe0 [ 763.175942][T13371] ? generic_parse_monolithic+0x200/0x200 [ 763.175953][T13371] alloc_fs_context+0x365/0x640 [ 763.175970][T13371] fs_context_for_mount+0x25/0x30 [ 763.213698][T13371] do_mount+0x13d7/0x2c40 [ 763.218029][T13371] ? copy_mount_string+0x40/0x40 [ 763.222960][T13371] ? _copy_from_user+0xdd/0x150 [ 763.227806][T13371] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.234039][T13371] ? copy_mount_options+0x280/0x3a0 [ 763.239240][T13371] ksys_mount+0xdb/0x150 [ 763.243481][T13371] __x64_sys_mount+0xbe/0x150 [ 763.248160][T13371] do_syscall_64+0x103/0x610 [ 763.252746][T13371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.258630][T13371] RIP: 0033:0x457f29 [ 763.262524][T13371] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.282117][T13371] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 763.290519][T13371] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 763.298477][T13371] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 763.306437][T13371] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.314403][T13371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 763.322367][T13371] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 763.330353][T13375] CPU: 1 PID: 13375 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 763.339023][T13375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.339028][T13375] Call Trace: [ 763.339052][T13375] dump_stack+0x172/0x1f0 [ 763.339079][T13375] should_fail.cold+0xa/0x15 [ 763.361298][T13375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.367115][T13375] ? ___might_sleep+0x163/0x280 [ 763.371973][T13375] __should_failslab+0x121/0x190 [ 763.371995][T13375] should_failslab+0x9/0x14 [ 763.372012][T13375] kmem_cache_alloc_trace+0x2d1/0x760 [ 763.372030][T13375] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 763.392914][T13375] ? rcu_read_lock_sched_held+0x110/0x130 [ 763.398640][T13375] ? kmem_cache_alloc_trace+0x354/0x760 [ 763.404202][T13375] legacy_init_fs_context+0x48/0xe0 [ 763.409403][T13375] ? generic_parse_monolithic+0x200/0x200 [ 763.417294][T13375] alloc_fs_context+0x365/0x640 [ 763.417314][T13375] fs_context_for_mount+0x25/0x30 [ 763.417330][T13375] do_mount+0x13d7/0x2c40 [ 763.417351][T13375] ? copy_mount_string+0x40/0x40 [ 763.417374][T13375] ? _copy_from_user+0xdd/0x150 [ 763.417390][T13375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.417401][T13375] ? copy_mount_options+0x280/0x3a0 [ 763.417423][T13375] ksys_mount+0xdb/0x150 [ 763.457372][T13375] __x64_sys_mount+0xbe/0x150 [ 763.462053][T13375] do_syscall_64+0x103/0x610 [ 763.466639][T13375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.472529][T13375] RIP: 0033:0x457f29 [ 763.476420][T13375] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 763.496021][T13375] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 763.504423][T13375] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 763.512384][T13375] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 763.520359][T13375] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.528320][T13375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 763.536296][T13375] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 763.544286][T13374] CPU: 0 PID: 13374 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 763.553311][T13374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.563675][T13374] Call Trace: [ 763.566975][T13374] dump_stack+0x172/0x1f0 [ 763.571320][T13374] should_fail.cold+0xa/0x15 [ 763.575929][T13374] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.581747][T13374] ? ___might_sleep+0x163/0x280 22:08:16 executing program 4 (fault-call:3 fault-nth:4): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 763.586606][T13374] __should_failslab+0x121/0x190 [ 763.591560][T13374] should_failslab+0x9/0x14 [ 763.596072][T13374] kmem_cache_alloc+0x2b2/0x6f0 [ 763.600936][T13374] ? __might_fault+0x12b/0x1e0 [ 763.605714][T13374] getname_flags+0xd6/0x5b0 [ 763.610227][T13374] user_path_at_empty+0x2f/0x50 [ 763.615067][T13374] do_mount+0x150/0x2c40 [ 763.619291][T13374] ? copy_mount_string+0x40/0x40 [ 763.624211][T13374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.630431][T13374] ? _copy_from_user+0xdd/0x150 [ 763.635264][T13374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 763.641481][T13374] ? copy_mount_options+0x280/0x3a0 [ 763.646662][T13374] ksys_mount+0xdb/0x150 [ 763.650884][T13374] __x64_sys_mount+0xbe/0x150 [ 763.655571][T13374] do_syscall_64+0x103/0x610 [ 763.660148][T13374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 763.666020][T13374] RIP: 0033:0x457f29 [ 763.669897][T13374] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x6, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:16 executing program 1 (fault-call:3 fault-nth:5): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 763.689476][T13374] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 763.697864][T13374] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 763.705814][T13374] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 763.713771][T13374] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 763.721734][T13374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 [ 763.729683][T13374] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:16 executing program 0: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f00001d0ffa)='ramfs\x00', 0x1000818, 0x0) r2 = creat(&(0x7f0000000140)='./file0/bus\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x44200, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getsockname$packet(r2, &(0x7f0000000a00)={0x11, 0x0, 0x0}, &(0x7f0000000a40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000b80)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000bc0)={'gre0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000d40)={@broadcast, @empty, 0x0}, &(0x7f0000000d80)=0xc) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e40)=""/182, 0xb6}], 0x1}, 0x2000) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000f80)={0x0, @multicast1, @initdev}, &(0x7f0000000fc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000002400)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000001340)=0xe8) accept$packet(r2, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000040c0)=0x14) getpeername$packet(r2, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004140)=0x14) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000006800)={@remote, 0x0}, &(0x7f0000006840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000006940)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000006a40)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000006b40)={0x0, @multicast2, @multicast2}, &(0x7f0000006b80)=0xc) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000006bc0)={@remote, 0x0}, &(0x7f0000006c00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000007280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000007240)={&(0x7f0000006c40)={0x5dc, r3, 0x0, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x10c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffff7fffffff}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x56eb}}, {0x8, 0x6, r5}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x0, 0x0, 0x1, 0x9}, {0x2, 0x2, 0x2000000000, 0x4}, {0x57b, 0x81, 0x2, 0x5}]}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r6}, {0xcc, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x2, 0x8, 0x3, 0x7}, {0x20, 0x4, 0x9, 0x7}, {0xeee0, 0x4, 0x6ef, 0xc01a}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x1b0, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xb49f}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffff001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x13c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r14}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7f, 0x1f, 0x2, 0x7}, {0x1, 0x7, 0x3, 0xffff}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x4}}, {{0x8, 0x1, r18}, {0xd0, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x400, 0x3ff, 0x6, 0x8001}, {0x1000, 0x0, 0x2, 0xff}, {0x3, 0x5, 0x9267, 0x3}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r19}}, {0x8}}}]}}]}, 0x5dc}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000200)={0x6, 0xee6e}) write$P9_RREADLINK(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f7856baa1db59172ff77faf7e5f92d6eb09db6ad7d69a5360ce491fc3b2e483"], 0x1) r20 = open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x0, 0x0) sendfile(r2, r20, 0x0, 0xff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000180)=0x200) write$FUSE_LK(r2, &(0x7f0000000100)={0x28, 0x0, 0x3, {{0xa0, 0x1, 0x2, r21}}}, 0x28) 22:08:16 executing program 3 (fault-call:3 fault-nth:2): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 763.857649][T13484] ISOFS: Unable to identify CD-ROM format. [ 763.887494][T13499] FAULT_INJECTION: forcing a failure. [ 763.887494][T13499] name failslab, interval 1, probability 0, space 0, times 0 [ 763.889190][T13500] FAULT_INJECTION: forcing a failure. [ 763.889190][T13500] name failslab, interval 1, probability 0, space 0, times 0 [ 763.907938][T13499] CPU: 1 PID: 13499 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 763.921444][T13499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.931500][T13499] Call Trace: [ 763.934802][T13499] dump_stack+0x172/0x1f0 [ 763.939152][T13499] should_fail.cold+0xa/0x15 [ 763.943753][T13499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 763.949567][T13499] ? ___might_sleep+0x163/0x280 [ 763.954428][T13499] __should_failslab+0x121/0x190 [ 763.959371][T13499] should_failslab+0x9/0x14 [ 763.963883][T13499] kmem_cache_alloc_trace+0x2d1/0x760 [ 763.968409][T13503] FAULT_INJECTION: forcing a failure. [ 763.968409][T13503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.969262][T13499] ? legacy_init_fs_context+0x48/0xe0 [ 763.987788][T13499] ? rcu_read_lock_sched_held+0x110/0x130 [ 763.993502][T13499] ? kmem_cache_alloc_trace+0x354/0x760 [ 763.999042][T13499] v9fs_mount+0x5e/0x920 [ 764.003285][T13499] ? v9fs_write_inode+0x70/0x70 [ 764.008125][T13499] legacy_get_tree+0xf2/0x200 [ 764.012795][T13499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.019027][T13499] vfs_get_tree+0x123/0x450 [ 764.023523][T13499] do_mount+0x1436/0x2c40 [ 764.027852][T13499] ? copy_mount_string+0x40/0x40 [ 764.032781][T13499] ? _copy_from_user+0xdd/0x150 [ 764.037630][T13499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.043857][T13499] ? copy_mount_options+0x280/0x3a0 [ 764.049048][T13499] ksys_mount+0xdb/0x150 [ 764.053284][T13499] __x64_sys_mount+0xbe/0x150 [ 764.057953][T13499] do_syscall_64+0x103/0x610 [ 764.062537][T13499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.068416][T13499] RIP: 0033:0x457f29 [ 764.072301][T13499] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.091887][T13499] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.100286][T13499] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 764.108371][T13499] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 764.116599][T13499] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.124556][T13499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 764.132513][T13499] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 764.140499][T13503] CPU: 0 PID: 13503 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 22:08:16 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="0e996ec5a31226a946342b5a82b98795f9284798ba69573bda3404c8d9ec14974278a58604f77332a9bc352d12e47fa3a6970bdd572359ea0daf2d56d96d32c52c78a346100c161c8d0964b577ba8d454061a2375fca01d87859fb508e90efdb5b77005173f11e9f44f07a8662734e4b6a54eacf", 0x74, 0x882f}, {&(0x7f0000000100), 0x0, 0x3921589f}, {&(0x7f0000000140)="71eb6d3d85a669e239d730053cfb61f9fff239d6c189b631d507bef300c2251271d9f76cd989b21fa28067a7eda81dad922e27770c0bb95269cf51baaf8d98d5a88e5761ced790b205c2b816ff829848d4ab01", 0x53, 0xc8}], 0x2201000, &(0x7f00000001c0)='iso9660\x00') syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:16 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) futex(&(0x7f0000000200)=0x1, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000280), 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8, 0x4000000000, 0x400, 0x3ff, 0x0, 0x2, 0x800, 0x7, 0xb219, 0x4, 0xff, 0x800, 0xbeb9, 0x4, 0x0, 0x7, 0x40, 0x4, 0x1, 0xa96, 0x0, 0x7, 0x6, 0xfff, 0x3, 0x0, 0x4, 0x6, 0x4, 0x6, 0x3ff, 0x401, 0x10000, 0x4, 0xa48, 0x5, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x20, 0x9, 0x141f2029, 0x9, 0x80000000}, r1, 0xe, r0, 0x8) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6d7d7f653d"]) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tmpfs\x00', 0x0, &(0x7f0000000180)) [ 764.149166][T13503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.159220][T13503] Call Trace: [ 764.162518][T13503] dump_stack+0x172/0x1f0 [ 764.166874][T13503] should_fail.cold+0xa/0x15 [ 764.171468][T13503] ? kernel_text_address+0x73/0xf0 [ 764.176594][T13503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.182403][T13503] ? __lock_acquire+0x548/0x3fb0 [ 764.187357][T13503] ? __save_stack_trace+0x8a/0xf0 [ 764.192394][T13503] should_fail_alloc_page+0x50/0x60 [ 764.197602][T13503] __alloc_pages_nodemask+0x1a1/0x7e0 [ 764.202986][T13503] ? __alloc_pages_slowpath+0x2900/0x2900 [ 764.208694][T13503] ? find_held_lock+0x35/0x130 [ 764.213445][T13503] ? do_syscall_64+0x103/0x610 [ 764.218189][T13503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.223976][T13503] cache_grow_begin+0x9c/0x860 [ 764.228722][T13503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.234940][T13503] kmem_cache_alloc+0x62d/0x6f0 [ 764.239774][T13503] getname_flags+0xd6/0x5b0 [ 764.244258][T13503] user_path_at_empty+0x2f/0x50 [ 764.249086][T13503] do_mount+0x150/0x2c40 [ 764.253325][T13503] ? copy_mount_string+0x40/0x40 [ 764.258266][T13503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.264496][T13503] ? _copy_from_user+0xdd/0x150 [ 764.269337][T13503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.275568][T13503] ? copy_mount_options+0x280/0x3a0 [ 764.280762][T13503] ksys_mount+0xdb/0x150 [ 764.284982][T13503] __x64_sys_mount+0xbe/0x150 [ 764.289639][T13503] do_syscall_64+0x103/0x610 [ 764.294209][T13503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.300126][T13503] RIP: 0033:0x457f29 [ 764.304000][T13503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.323590][T13503] RSP: 002b:00007f8a54c20c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.331977][T13503] RAX: ffffffffffffffda RBX: 00007f8a54c20c90 RCX: 0000000000457f29 [ 764.339941][T13503] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 764.347888][T13503] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 764.355856][T13503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c216d4 [ 764.363812][T13503] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000004 [ 764.386526][T13500] CPU: 0 PID: 13500 Comm: syz-executor.1 Not tainted 5.0.0-next-20190306 #4 [ 764.395225][T13500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.395231][T13500] Call Trace: [ 764.395253][T13500] dump_stack+0x172/0x1f0 [ 764.395274][T13500] should_fail.cold+0xa/0x15 [ 764.417492][T13500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.423295][T13500] ? ___might_sleep+0x163/0x280 [ 764.428154][T13500] __should_failslab+0x121/0x190 [ 764.433100][T13500] should_failslab+0x9/0x14 [ 764.437610][T13500] kmem_cache_alloc_trace+0x2d1/0x760 [ 764.442988][T13500] ? legacy_init_fs_context+0x48/0xe0 [ 764.448359][T13500] ? rcu_read_lock_sched_held+0x110/0x130 [ 764.448377][T13500] ? kmem_cache_alloc_trace+0x354/0x760 22:08:17 executing program 3 (fault-call:3 fault-nth:3): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 764.448402][T13500] v9fs_mount+0x5e/0x920 [ 764.448421][T13500] ? v9fs_write_inode+0x70/0x70 [ 764.448450][T13500] legacy_get_tree+0xf2/0x200 [ 764.473407][T13500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.479660][T13500] vfs_get_tree+0x123/0x450 [ 764.481047][T13610] tmpfs: Bad mount option m}e [ 764.484167][T13500] do_mount+0x1436/0x2c40 [ 764.484190][T13500] ? copy_mount_string+0x40/0x40 [ 764.484206][T13500] ? _copy_from_user+0xdd/0x150 [ 764.484223][T13500] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:08:17 executing program 4 (fault-call:3 fault-nth:5): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:17 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x4400) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000000200)) [ 764.484233][T13500] ? copy_mount_options+0x280/0x3a0 [ 764.484248][T13500] ksys_mount+0xdb/0x150 [ 764.484267][T13500] __x64_sys_mount+0xbe/0x150 [ 764.484289][T13500] do_syscall_64+0x103/0x610 [ 764.528389][T13500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.534278][T13500] RIP: 0033:0x457f29 [ 764.538174][T13500] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.557771][T13500] RSP: 002b:00007f23b9fbec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.566168][T13500] RAX: ffffffffffffffda RBX: 00007f23b9fbec90 RCX: 0000000000457f29 [ 764.574125][T13500] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 764.582081][T13500] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.590034][T13500] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23b9fbf6d4 [ 764.597989][T13500] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 764.617438][T13713] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 764.697067][T13718] FAULT_INJECTION: forcing a failure. [ 764.697067][T13718] name failslab, interval 1, probability 0, space 0, times 0 [ 764.755728][T13718] CPU: 0 PID: 13718 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 764.764463][T13718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.774524][T13718] Call Trace: [ 764.777839][T13718] dump_stack+0x172/0x1f0 [ 764.782189][T13718] should_fail.cold+0xa/0x15 [ 764.786828][T13718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 764.792628][T13718] ? ___might_sleep+0x163/0x280 [ 764.797475][T13718] __should_failslab+0x121/0x190 [ 764.802403][T13718] should_failslab+0x9/0x14 [ 764.806896][T13718] kmem_cache_alloc_trace+0x2d1/0x760 [ 764.812253][T13718] ? legacy_init_fs_context+0x48/0xe0 [ 764.817609][T13718] ? rcu_read_lock_sched_held+0x110/0x130 [ 764.823311][T13718] ? kmem_cache_alloc_trace+0x354/0x760 [ 764.828849][T13718] v9fs_mount+0x5e/0x920 [ 764.833081][T13718] ? v9fs_write_inode+0x70/0x70 [ 764.837916][T13718] legacy_get_tree+0xf2/0x200 [ 764.842579][T13718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.848807][T13718] vfs_get_tree+0x123/0x450 [ 764.853297][T13718] do_mount+0x1436/0x2c40 [ 764.857616][T13718] ? copy_mount_string+0x40/0x40 [ 764.862545][T13718] ? _copy_from_user+0xdd/0x150 [ 764.867382][T13718] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.873606][T13718] ? copy_mount_options+0x280/0x3a0 [ 764.878794][T13718] ksys_mount+0xdb/0x150 [ 764.883027][T13718] __x64_sys_mount+0xbe/0x150 [ 764.887693][T13718] do_syscall_64+0x103/0x610 [ 764.892277][T13718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.898155][T13718] RIP: 0033:0x457f29 [ 764.902036][T13718] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.921649][T13718] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 764.930043][T13718] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 764.937997][T13718] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 764.945951][T13718] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.953905][T13718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 764.961872][T13718] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:17 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x8, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:17 executing program 4 (fault-call:3 fault-nth:6): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:17 executing program 5: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cgroup.max.descendants\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs(r1, &(0x7f00000000c0)='fdinfo/4\x00') [ 765.038066][T13828] FAULT_INJECTION: forcing a failure. [ 765.038066][T13828] name failslab, interval 1, probability 0, space 0, times 0 [ 765.066524][T13828] CPU: 0 PID: 13828 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 765.075228][T13828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.075234][T13828] Call Trace: [ 765.075257][T13828] dump_stack+0x172/0x1f0 [ 765.075308][T13828] should_fail.cold+0xa/0x15 [ 765.097528][T13828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.099779][T13830] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 765.103345][T13828] ? ___might_sleep+0x163/0x280 [ 765.103367][T13828] __should_failslab+0x121/0x190 [ 765.103389][T13828] should_failslab+0x9/0x14 [ 765.117393][T13828] kmem_cache_alloc_trace+0x2d1/0x760 [ 765.117419][T13828] alloc_fs_context+0x5a/0x640 [ 765.117436][T13828] fs_context_for_mount+0x25/0x30 [ 765.117454][T13828] do_mount+0x13d7/0x2c40 [ 765.126855][T13828] ? copy_mount_string+0x40/0x40 [ 765.126872][T13828] ? _copy_from_user+0xdd/0x150 [ 765.126893][T13828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.126907][T13828] ? copy_mount_options+0x280/0x3a0 [ 765.126927][T13828] ksys_mount+0xdb/0x150 [ 765.137028][T13828] __x64_sys_mount+0xbe/0x150 [ 765.137051][T13828] do_syscall_64+0x103/0x610 [ 765.137072][T13828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.137083][T13828] RIP: 0033:0x457f29 [ 765.137101][T13828] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.146420][T13828] RSP: 002b:00007f8a54c20c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 765.146434][T13828] RAX: ffffffffffffffda RBX: 00007f8a54c20c90 RCX: 0000000000457f29 [ 765.146443][T13828] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 22:08:17 executing program 3 (fault-call:3 fault-nth:4): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 765.146451][T13828] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 765.146459][T13828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c216d4 [ 765.146468][T13828] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000004 22:08:17 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 765.318616][T13841] FAULT_INJECTION: forcing a failure. [ 765.318616][T13841] name failslab, interval 1, probability 0, space 0, times 0 [ 765.343436][T13843] FAULT_INJECTION: forcing a failure. [ 765.343436][T13843] name failslab, interval 1, probability 0, space 0, times 0 [ 765.386777][ C0] net_ratelimit: 25 callbacks suppressed [ 765.386784][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.398770][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.400068][T13843] CPU: 1 PID: 13843 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 765.404567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.416707][T13843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.416714][T13843] Call Trace: [ 765.416739][T13843] dump_stack+0x172/0x1f0 [ 765.416762][T13843] should_fail.cold+0xa/0x15 [ 765.416783][T13843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.422514][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.432538][T13843] ? ___might_sleep+0x163/0x280 [ 765.432559][T13843] __should_failslab+0x121/0x190 [ 765.432580][T13843] should_failslab+0x9/0x14 [ 765.435891][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.440145][T13843] kmem_cache_alloc_trace+0x2d1/0x760 [ 765.440159][T13843] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 765.440177][T13843] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.444755][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 765.450515][T13843] ? kmem_cache_alloc_trace+0x354/0x760 [ 765.450534][T13843] legacy_init_fs_context+0x48/0xe0 [ 765.450550][T13843] ? generic_parse_monolithic+0x200/0x200 [ 765.515158][T13843] alloc_fs_context+0x365/0x640 [ 765.520023][T13843] fs_context_for_mount+0x25/0x30 [ 765.525051][T13843] do_mount+0x13d7/0x2c40 [ 765.529391][T13843] ? copy_mount_string+0x40/0x40 [ 765.534331][T13843] ? _copy_from_user+0xdd/0x150 [ 765.539194][T13843] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.543633][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 765.545434][T13843] ? copy_mount_options+0x280/0x3a0 [ 765.545455][T13843] ksys_mount+0xdb/0x150 [ 765.545479][T13843] __x64_sys_mount+0xbe/0x150 [ 765.545503][T13843] do_syscall_64+0x103/0x610 [ 765.545520][T13843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.545536][T13843] RIP: 0033:0x457f29 [ 765.551296][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x9, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 765.556951][T13843] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.556959][T13843] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 765.556972][T13843] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 765.556980][T13843] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 765.556988][T13843] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 765.556995][T13843] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 765.557008][T13843] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 765.566130][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 765.576446][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 765.581358][T13841] CPU: 0 PID: 13841 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 765.614114][T13841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.614120][T13841] Call Trace: [ 765.614144][T13841] dump_stack+0x172/0x1f0 [ 765.614168][T13841] should_fail.cold+0xa/0x15 [ 765.614186][T13841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 765.701961][T13841] ? ___might_sleep+0x163/0x280 [ 765.701988][T13841] __should_failslab+0x121/0x190 [ 765.711749][T13841] should_failslab+0x9/0x14 [ 765.716249][T13841] kmem_cache_alloc_trace+0x2d1/0x760 [ 765.721609][T13841] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 765.727405][T13841] ? rcu_read_lock_sched_held+0x110/0x130 [ 765.727423][T13841] ? kmem_cache_alloc_trace+0x354/0x760 [ 765.727444][T13841] legacy_init_fs_context+0x48/0xe0 [ 765.727482][T13841] ? generic_parse_monolithic+0x200/0x200 [ 765.727500][T13841] alloc_fs_context+0x365/0x640 [ 765.743903][T13841] fs_context_for_mount+0x25/0x30 [ 765.759433][T13841] do_mount+0x13d7/0x2c40 [ 765.763778][T13841] ? copy_mount_string+0x40/0x40 [ 765.768705][T13841] ? _copy_from_user+0xdd/0x150 [ 765.768732][T13841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.768745][T13841] ? copy_mount_options+0x280/0x3a0 [ 765.768762][T13841] ksys_mount+0xdb/0x150 [ 765.768778][T13841] __x64_sys_mount+0xbe/0x150 [ 765.793866][T13841] do_syscall_64+0x103/0x610 [ 765.798459][T13841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.804339][T13841] RIP: 0033:0x457f29 [ 765.808228][T13841] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.827904][T13841] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 22:08:18 executing program 3 (fault-call:3 fault-nth:5): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 765.836307][T13841] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 765.844269][T13841] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 765.852226][T13841] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 765.860198][T13841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 [ 765.860208][T13841] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:18 executing program 4 (fault-call:3 fault-nth:7): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 765.991714][T13855] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 766.013308][T13839] ISOFS: Unable to identify CD-ROM format. [ 766.081043][T13868] FAULT_INJECTION: forcing a failure. [ 766.081043][T13868] name failslab, interval 1, probability 0, space 0, times 0 [ 766.102701][T13868] CPU: 1 PID: 13868 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 766.111396][T13868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.121458][T13868] Call Trace: [ 766.121485][T13868] dump_stack+0x172/0x1f0 [ 766.121510][T13868] should_fail.cold+0xa/0x15 [ 766.121531][T13868] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.121553][T13868] ? ___might_sleep+0x163/0x280 [ 766.121573][T13868] __should_failslab+0x121/0x190 [ 766.139552][T13868] should_failslab+0x9/0x14 [ 766.139570][T13868] __kmalloc_track_caller+0x2d8/0x740 [ 766.139583][T13868] ? ksys_mount+0xdb/0x150 [ 766.139594][T13868] ? __x64_sys_mount+0xbe/0x150 [ 766.139611][T13868] ? do_syscall_64+0x103/0x610 [ 766.139626][T13868] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.139647][T13868] ? v9fs_session_init+0xef/0x1960 [ 766.139664][T13868] kstrdup+0x3a/0x70 [ 766.139683][T13868] v9fs_session_init+0xef/0x1960 [ 766.149435][T13868] ? find_held_lock+0x35/0x130 [ 766.149454][T13868] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 766.149469][T13868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.149483][T13868] ? should_fail+0x1de/0x852 [ 766.149500][T13868] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.159332][T13868] ? v9fs_show_options+0x7e0/0x7e0 [ 766.159354][T13868] ? v9fs_mount+0x5e/0x920 22:08:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1020, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 766.159370][T13868] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.159391][T13868] ? kmem_cache_alloc_trace+0x354/0x760 [ 766.168623][T13868] ? legacy_init_fs_context+0x48/0xe0 [ 766.179401][T13868] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.179430][T13868] v9fs_mount+0x7d/0x920 [ 766.179447][T13868] ? v9fs_write_inode+0x70/0x70 [ 766.179462][T13868] legacy_get_tree+0xf2/0x200 [ 766.193351][T13868] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.193371][T13868] vfs_get_tree+0x123/0x450 [ 766.193389][T13868] do_mount+0x1436/0x2c40 22:08:18 executing program 4 (fault-call:3 fault-nth:8): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 766.193410][T13868] ? copy_mount_string+0x40/0x40 [ 766.193435][T13868] ? _copy_from_user+0xdd/0x150 [ 766.203832][T13868] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.214608][T13868] ? copy_mount_options+0x280/0x3a0 [ 766.214627][T13868] ksys_mount+0xdb/0x150 [ 766.214644][T13868] __x64_sys_mount+0xbe/0x150 [ 766.214666][T13868] do_syscall_64+0x103/0x610 [ 766.214684][T13868] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.214716][T13868] RIP: 0033:0x457f29 [ 766.225579][T13868] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.225587][T13868] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 766.225602][T13868] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 766.225610][T13868] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 766.225618][T13868] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 22:08:18 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x60000) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x81, 0x18000) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x4010, 0x4) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) [ 766.225626][T13868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 766.225634][T13868] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 766.388810][T13881] FAULT_INJECTION: forcing a failure. [ 766.388810][T13881] name failslab, interval 1, probability 0, space 0, times 0 [ 766.434967][T13883] FAULT_INJECTION: forcing a failure. [ 766.434967][T13883] name failslab, interval 1, probability 0, space 0, times 0 [ 766.460496][T13881] CPU: 1 PID: 13881 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 766.469188][T13881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.479238][T13881] Call Trace: [ 766.482537][T13881] dump_stack+0x172/0x1f0 [ 766.486882][T13881] should_fail.cold+0xa/0x15 [ 766.491497][T13881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.497316][T13881] ? ___might_sleep+0x163/0x280 [ 766.502187][T13881] __should_failslab+0x121/0x190 [ 766.507131][T13881] should_failslab+0x9/0x14 [ 766.511640][T13881] kmem_cache_alloc_trace+0x2d1/0x760 [ 766.517015][T13881] ? legacy_init_fs_context+0x48/0xe0 [ 766.522402][T13881] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.528123][T13881] ? kmem_cache_alloc_trace+0x354/0x760 [ 766.533680][T13881] v9fs_mount+0x5e/0x920 [ 766.538019][T13881] ? v9fs_write_inode+0x70/0x70 [ 766.542869][T13881] legacy_get_tree+0xf2/0x200 [ 766.547552][T13881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.553795][T13881] vfs_get_tree+0x123/0x450 [ 766.558304][T13881] do_mount+0x1436/0x2c40 [ 766.559974][T13888] ISOFS: Unable to identify CD-ROM format. [ 766.562635][T13881] ? copy_mount_string+0x40/0x40 [ 766.562652][T13881] ? _copy_from_user+0xdd/0x150 [ 766.562672][T13881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:08:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 766.562684][T13881] ? copy_mount_options+0x280/0x3a0 [ 766.562701][T13881] ksys_mount+0xdb/0x150 [ 766.562716][T13881] __x64_sys_mount+0xbe/0x150 [ 766.562737][T13881] do_syscall_64+0x103/0x610 [ 766.562755][T13881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.562769][T13881] RIP: 0033:0x457f29 [ 766.584535][T13881] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.584544][T13881] RSP: 002b:00007f8a54c20c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 766.584558][T13881] RAX: ffffffffffffffda RBX: 00007f8a54c20c90 RCX: 0000000000457f29 [ 766.584566][T13881] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 766.584574][T13881] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 766.584593][T13881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c216d4 [ 766.584604][T13881] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000004 [ 766.681681][T13883] CPU: 0 PID: 13883 Comm: syz-executor.4 Not tainted 5.0.0-next-20190306 #4 [ 766.690366][T13883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.700435][T13883] Call Trace: [ 766.703728][T13883] dump_stack+0x172/0x1f0 [ 766.708057][T13883] should_fail.cold+0xa/0x15 [ 766.708079][T13883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.708103][T13883] ? ___might_sleep+0x163/0x280 [ 766.708121][T13883] __should_failslab+0x121/0x190 [ 766.708146][T13883] should_failslab+0x9/0x14 [ 766.718511][T13883] kmem_cache_alloc_trace+0x2d1/0x760 [ 766.718529][T13883] ? find_held_lock+0x35/0x130 [ 766.718548][T13883] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 766.718564][T13883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.718584][T13883] p9_client_create+0xcb/0x1400 [ 766.728329][T13883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.728350][T13883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.728379][T13883] ? p9_client_zc_rpc.constprop.0+0x10c0/0x10c0 [ 766.728399][T13883] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.728418][T13883] ? __kmalloc_track_caller+0x5d1/0x740 [ 766.738241][T13883] ? ksys_mount+0xdb/0x150 [ 766.738260][T13883] ? lockdep_init_map+0x1be/0x6d0 [ 766.738287][T13883] v9fs_session_init+0x1e7/0x1960 [ 766.738302][T13883] ? v9fs_session_init+0x1e7/0x1960 [ 766.738318][T13883] ? find_held_lock+0x35/0x130 [ 766.748676][T13883] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 766.748692][T13883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.748714][T13883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 766.748734][T13883] ? v9fs_show_options+0x7e0/0x7e0 22:08:19 executing program 3 (fault-call:3 fault-nth:6): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 766.748754][T13883] ? v9fs_mount+0x5e/0x920 [ 766.759801][T13883] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.759820][T13883] ? kmem_cache_alloc_trace+0x354/0x760 [ 766.759836][T13883] ? legacy_init_fs_context+0x48/0xe0 [ 766.759850][T13883] ? rcu_read_lock_sched_held+0x110/0x130 [ 766.759872][T13883] v9fs_mount+0x7d/0x920 [ 766.771891][T13883] ? v9fs_write_inode+0x70/0x70 [ 766.771906][T13883] legacy_get_tree+0xf2/0x200 [ 766.771922][T13883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.771940][T13883] vfs_get_tree+0x123/0x450 [ 766.783854][T13883] do_mount+0x1436/0x2c40 [ 766.783877][T13883] ? copy_mount_string+0x40/0x40 [ 766.783892][T13883] ? _copy_from_user+0xdd/0x150 [ 766.783912][T13883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.793825][T13883] ? copy_mount_options+0x280/0x3a0 [ 766.793845][T13883] ksys_mount+0xdb/0x150 [ 766.793863][T13883] __x64_sys_mount+0xbe/0x150 [ 766.793886][T13883] do_syscall_64+0x103/0x610 [ 766.803894][T13883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.803906][T13883] RIP: 0033:0x457f29 [ 766.803937][T13883] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.803943][T13883] RSP: 002b:00007f049c680c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 766.813859][T13883] RAX: ffffffffffffffda RBX: 00007f049c680c90 RCX: 0000000000457f29 [ 766.813868][T13883] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 766.813876][T13883] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 766.813884][T13883] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f049c6816d4 [ 766.813893][T13883] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 [ 767.009955][T13872] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 767.096873][T13904] FAULT_INJECTION: forcing a failure. [ 767.096873][T13904] name failslab, interval 1, probability 0, space 0, times 0 [ 767.119286][T13904] CPU: 0 PID: 13904 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 767.127990][T13904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.138043][T13904] Call Trace: [ 767.141359][T13904] dump_stack+0x172/0x1f0 [ 767.145701][T13904] should_fail.cold+0xa/0x15 [ 767.145725][T13904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.156095][T13904] ? ___might_sleep+0x163/0x280 [ 767.160949][T13904] __should_failslab+0x121/0x190 [ 767.165887][T13904] should_failslab+0x9/0x14 [ 767.170387][T13904] __kmalloc_track_caller+0x2d8/0x740 [ 767.175750][T13904] ? ksys_mount+0xdb/0x150 [ 767.175763][T13904] ? __x64_sys_mount+0xbe/0x150 [ 767.175782][T13904] ? do_syscall_64+0x103/0x610 [ 767.175796][T13904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.175815][T13904] ? __lock_acquire+0x548/0x3fb0 [ 767.185034][T13904] ? v9fs_session_init+0xae/0x1960 [ 767.185055][T13904] kstrdup+0x3a/0x70 [ 767.185072][T13904] v9fs_session_init+0xae/0x1960 [ 767.185107][T13904] ? find_held_lock+0x35/0x130 [ 767.195891][T13904] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 767.195907][T13904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.195922][T13904] ? should_fail+0x1de/0x852 [ 767.195940][T13904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 767.205943][T13904] ? v9fs_show_options+0x7e0/0x7e0 22:08:19 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xa, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:19 executing program 4 (fault-call:3 fault-nth:9): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 767.205963][T13904] ? v9fs_mount+0x5e/0x920 [ 767.205983][T13904] ? rcu_read_lock_sched_held+0x110/0x130 [ 767.214782][T13904] ? kmem_cache_alloc_trace+0x354/0x760 [ 767.214798][T13904] ? legacy_init_fs_context+0x48/0xe0 [ 767.214814][T13904] ? rcu_read_lock_sched_held+0x110/0x130 [ 767.214833][T13904] v9fs_mount+0x7d/0x920 [ 767.225184][T13904] ? v9fs_write_inode+0x70/0x70 [ 767.225197][T13904] legacy_get_tree+0xf2/0x200 [ 767.225211][T13904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 767.225245][T13904] vfs_get_tree+0x123/0x450 [ 767.236026][T13904] do_mount+0x1436/0x2c40 [ 767.236049][T13904] ? copy_mount_string+0x40/0x40 [ 767.236064][T13904] ? _copy_from_user+0xdd/0x150 [ 767.236083][T13904] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 767.246941][T13904] ? copy_mount_options+0x280/0x3a0 [ 767.246959][T13904] ksys_mount+0xdb/0x150 [ 767.246976][T13904] __x64_sys_mount+0xbe/0x150 [ 767.246995][T13904] do_syscall_64+0x103/0x610 [ 767.247015][T13904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.257099][T13904] RIP: 0033:0x457f29 [ 767.257114][T13904] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.257122][T13904] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 767.257136][T13904] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 767.257144][T13904] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 22:08:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:19 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 767.257152][T13904] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 767.257164][T13904] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 [ 767.268017][T13904] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:20 executing program 3 (fault-call:3 fault-nth:7): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xc, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 767.639638][T13913] ISOFS: Unable to identify CD-ROM format. 22:08:20 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 767.692809][T13935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 22:08:20 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x2, 0x0, "ef3feb98804e556843fe30ec11a7c1b1f5ebd3dfc8b8d3c2a7db2e42413ff2a793f74f5c18d3d7038dc7ec47981bae5909cbe759168a0b776f9b32e7220220e29886267a06b1fe07d11f84f17a520ced"}, 0xd8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xe, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:20 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 767.925558][T13947] ISOFS: Unable to identify CD-ROM format. 22:08:20 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$PPPIOCSPASS(r0, 0x40107446, &(0x7f0000000200)={0x18d1cd, &(0x7f0000000180)=[{}]}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000080)) 22:08:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xf, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff8e, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fdatasync(r0) [ 768.139108][T13978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 768.159416][T13990] FAULT_INJECTION: forcing a failure. [ 768.159416][T13990] name failslab, interval 1, probability 0, space 0, times 0 [ 768.209958][T13990] CPU: 0 PID: 13990 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 768.218676][T13990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.228736][T13990] Call Trace: [ 768.232040][T13990] dump_stack+0x172/0x1f0 [ 768.236390][T13990] should_fail.cold+0xa/0x15 [ 768.240992][T13990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.246805][T13990] ? ___might_sleep+0x163/0x280 [ 768.246830][T13990] __should_failslab+0x121/0x190 [ 768.246851][T13990] should_failslab+0x9/0x14 [ 768.246871][T13990] __kmalloc_track_caller+0x2d8/0x740 [ 768.246884][T13990] ? ksys_mount+0xdb/0x150 [ 768.246895][T13990] ? __x64_sys_mount+0xbe/0x150 [ 768.246914][T13990] ? do_syscall_64+0x103/0x610 [ 768.256667][T13990] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.256692][T13990] ? v9fs_session_init+0xef/0x1960 [ 768.256712][T13990] kstrdup+0x3a/0x70 [ 768.256728][T13990] v9fs_session_init+0xef/0x1960 [ 768.256743][T13990] ? find_held_lock+0x35/0x130 22:08:20 executing program 3 (fault-call:3 fault-nth:8): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000040)="470f00580148b8f3ff0000000000000f23d80f21f835000000000f23f82e2e66460f3882820c000000660fc4e300410f2360b9800000c00f3235010000000f300f35b805000000b9d70000000f01d966b8e3000f00d00fbab30010000032", 0x5e}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x287, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000000c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x30, 0x0, 0x0, 0x117) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 768.256763][T13990] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 768.256781][T13990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.266616][T13990] ? should_fail+0x1de/0x852 [ 768.266636][T13990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.266658][T13990] ? v9fs_show_options+0x7e0/0x7e0 [ 768.266679][T13990] ? v9fs_mount+0x5e/0x920 [ 768.266695][T13990] ? rcu_read_lock_sched_held+0x110/0x130 [ 768.266715][T13990] ? kmem_cache_alloc_trace+0x354/0x760 [ 768.266728][T13990] ? legacy_init_fs_context+0x48/0xe0 [ 768.266745][T13990] ? rcu_read_lock_sched_held+0x110/0x130 [ 768.280720][T13990] v9fs_mount+0x7d/0x920 [ 768.280741][T13990] ? v9fs_write_inode+0x70/0x70 [ 768.280756][T13990] legacy_get_tree+0xf2/0x200 [ 768.280772][T13990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.280790][T13990] vfs_get_tree+0x123/0x450 [ 768.291924][T13990] do_mount+0x1436/0x2c40 [ 768.291948][T13990] ? copy_mount_string+0x40/0x40 [ 768.291965][T13990] ? _copy_from_user+0xdd/0x150 [ 768.291984][T13990] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.292001][T13990] ? copy_mount_options+0x280/0x3a0 [ 768.300797][T13990] ksys_mount+0xdb/0x150 [ 768.300814][T13990] __x64_sys_mount+0xbe/0x150 [ 768.300837][T13990] do_syscall_64+0x103/0x610 [ 768.300858][T13990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.300869][T13990] RIP: 0033:0x457f29 [ 768.300883][T13990] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:08:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1020, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 768.300891][T13990] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 768.300908][T13990] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 768.311256][T13990] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 [ 768.311265][T13990] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 768.311274][T13990] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 [ 768.311283][T13990] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:21 executing program 0: clone(0x4000003102041ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x34, 0x2, @buffer={0x0, 0x55, &(0x7f00000002c0)=""/85}, &(0x7f0000000240)="01265d085ab3267e9965ef307b84a24c2f427144ec75125b6fbbbca0d9df2a68e3b0094203341c61c61bf527a056e6909cfe4125", &(0x7f0000000340)=""/112, 0x7f, 0x2, 0x1, &(0x7f00000003c0)}) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1000, 0xfff}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000080)={r5, @in={{0x2, 0x4e20, @multicast1}}, 0x7ff, 0xc257, 0x2, 0x8, 0x8}, &(0x7f0000000180)=0x98) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x80011, r3, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 768.561646][T14196] FAULT_INJECTION: forcing a failure. [ 768.561646][T14196] name failslab, interval 1, probability 0, space 0, times 0 [ 768.564020][T13988] ISOFS: Unable to identify CD-ROM format. 22:08:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20100000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x10, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 768.648853][T14196] CPU: 1 PID: 14196 Comm: syz-executor.3 Not tainted 5.0.0-next-20190306 #4 [ 768.657572][T14196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.667630][T14196] Call Trace: [ 768.670933][T14196] dump_stack+0x172/0x1f0 [ 768.675280][T14196] should_fail.cold+0xa/0x15 [ 768.679880][T14196] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.685694][T14196] ? ___might_sleep+0x163/0x280 [ 768.690557][T14196] __should_failslab+0x121/0x190 [ 768.695505][T14196] should_failslab+0x9/0x14 [ 768.700005][T14196] kmem_cache_alloc_trace+0x2d1/0x760 [ 768.705357][T14196] ? find_held_lock+0x35/0x130 [ 768.710114][T14196] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 768.715729][T14196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.721948][T14196] p9_client_create+0xcb/0x1400 [ 768.726783][T14196] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.732570][T14196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.738791][T14196] ? p9_client_zc_rpc.constprop.0+0x10c0/0x10c0 [ 768.745010][T14196] ? rcu_read_lock_sched_held+0x110/0x130 [ 768.750709][T14196] ? __kmalloc_track_caller+0x5d1/0x740 [ 768.756234][T14196] ? ksys_mount+0xdb/0x150 [ 768.760631][T14196] ? lockdep_init_map+0x1be/0x6d0 [ 768.765669][T14196] v9fs_session_init+0x1e7/0x1960 [ 768.770673][T14196] ? v9fs_session_init+0x1e7/0x1960 [ 768.775844][T14196] ? find_held_lock+0x35/0x130 [ 768.780590][T14196] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 768.786203][T14196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.792425][T14196] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 768.798219][T14196] ? v9fs_show_options+0x7e0/0x7e0 [ 768.803322][T14196] ? v9fs_mount+0x5e/0x920 [ 768.807731][T14196] ? rcu_read_lock_sched_held+0x110/0x130 [ 768.813439][T14196] ? kmem_cache_alloc_trace+0x354/0x760 [ 768.818993][T14196] ? legacy_init_fs_context+0x48/0xe0 [ 768.824351][T14196] ? rcu_read_lock_sched_held+0x110/0x130 [ 768.830074][T14196] v9fs_mount+0x7d/0x920 [ 768.834312][T14196] ? v9fs_write_inode+0x70/0x70 [ 768.839147][T14196] legacy_get_tree+0xf2/0x200 [ 768.843800][T14196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 768.850029][T14196] vfs_get_tree+0x123/0x450 [ 768.854520][T14196] do_mount+0x1436/0x2c40 [ 768.858831][T14196] ? copy_mount_string+0x40/0x40 [ 768.863749][T14196] ? _copy_from_user+0xdd/0x150 [ 768.868586][T14196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 768.874817][T14196] ? copy_mount_options+0x280/0x3a0 [ 768.879996][T14196] ksys_mount+0xdb/0x150 [ 768.884217][T14196] __x64_sys_mount+0xbe/0x150 [ 768.888872][T14196] do_syscall_64+0x103/0x610 [ 768.893446][T14196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.899316][T14196] RIP: 0033:0x457f29 [ 768.903194][T14196] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 768.922774][T14196] RSP: 002b:00007f8a54c41c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 768.931165][T14196] RAX: ffffffffffffffda RBX: 00007f8a54c41c90 RCX: 0000000000457f29 [ 768.939128][T14196] RDX: 0000000020000200 RSI: 0000000020000080 RDI: 0000000000000000 22:08:21 executing program 3 (fault-call:3 fault-nth:9): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 768.947093][T14196] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 768.955044][T14196] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a54c426d4 [ 768.962995][T14196] R13: 00000000004c3cfd R14: 00000000004d6f18 R15: 0000000000000005 22:08:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x1, 0x60080) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000280)=0x80) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000040)) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x20000, 0x27) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000080)) capset(&(0x7f0000000640)={0x20080522}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x9}) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000010000200ff070000ab000000000000000f000000"]) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x72, 0xa, 0xffdc}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000240)={0x200000000000010d, &(0x7f00000000c0)=[{0x9, 0x4, 0x40000000000005, 0x6}, {0x9, 0x1, 0x1}]}) 22:08:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x19, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:21 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 769.265494][T14334] ISOFS: Unable to identify CD-ROM format. [ 769.302758][T14399] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:21 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:21 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 769.400393][T14421] ISOFS: Unable to identify CD-ROM format. 22:08:22 executing program 0: clone(0x803102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) migrate_pages(r0, 0x1ff, &(0x7f0000000000)=0x200, &(0x7f0000000040)=0x8) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000080)={0x3c, 0x29c1, 0x1}) wait4(0x0, 0x0, 0x0, 0x0) 22:08:22 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xfffffffffffffffa, 0x803) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x44e2c23f7874321b, 0x0) 22:08:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000140)=0x100000001, 0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xe7, "9888cb692827966483c9be5fbc81ec2c6d2cf6a3ef2215fdda7b35adda43a578661543c75ee40bcbb23111970516d151af5430c55620614e56d66a5cad6a8f812882b843c72128941881d82efb34a047f11d93c4d45b7011ecad2e0c71e7f552ab5ef087f6d6299a4ec3f5bcd14b0850a378d637bd0bf4d1eae93aa3980c6e4209a16c14fb5c5ea4369ba8b99acbcdb77aed214f0ff4483685eacbd4688ca97694cdd58e9b7ccbb883e9a63dcec63dbcfdce4888531f489905c10f3004588b1745b4e94d4ea28d55c72dbe0f48713f97420b9bdea4364461803fb5f05b6bd8034be65190f2e6f9"}, &(0x7f0000000080)=0xef) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x800, 0x9, 0xffff}, &(0x7f0000000280)=0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) 22:08:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x25, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 769.710839][T14563] ISOFS: Unable to identify CD-ROM format. 22:08:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xc0ed0000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 769.788415][T14591] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 769.905759][T14582] ISOFS: Unable to identify CD-ROM format. 22:08:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1020, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 0: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x341fcaca, 0x80002) r0 = socket(0x10, 0x4008000000800, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000000c0)=0x81a, 0x4) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/231, 0xffffffffffffff84}}], 0x12e, 0x0, 0x0) 22:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="f775d872af5351ae5d42eb14f37622647626d9c4eade35e592f8b9f97fecd458f293789dd9dc0521e79826ab9d346542e7ab897c2917b48bad6d85766f2d02db104af518d2f49dab6bebc0588dd881e4e8ec03ac06bc32bfdc84b14bb307c44a772a27677f736c2f86edee22ef3b7084de888fb01604f513742a6e784dfe76827105b183c1a484ba95c07065a7983fef67df34c64565be86651bd7671511cd8aeab12797b6929b1f4e44677bed8f37b167355398c4201389de21d017e2aebb3d1a35754c934bc56b6c0ecd127e26754f16747a8ce523", 0xd6, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)="ea34346e2e0e9d86515f4ec858dcf2168b10ace5d10699b1c4188599add6cc88cc6208c71a854770a3afc8202db7c8be5c9a854dc1dafb2c128ceb036f99d15bc6041882c44e3e939d72ab6e12d201dc4397efe8ea45ff", 0x57, 0xfffffffffffffffd) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000600)={0x4, 0x8, 0x983f, 0x6, 0x6}, 0x14) r3 = request_key(&(0x7f0000000300)='trusted\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='--&selinux*em1^^!\x00', 0x0) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r0, r1, r3}, &(0x7f0000000400)=""/71, 0x7f, &(0x7f0000000580)={&(0x7f0000000480)={'sha256-ssse3\x00'}, &(0x7f00000004c0)="22ca9a69940620b137dd36764b5010d325f1892304b955e1297634e7cc5d32ba37d7eae11f2dddb2d056c9734a38c27e4f20814cf59fa1ec1996d39a7219354097b881244a9669c5226400e99545db457d4086f70971b3a04e57b45aa95a991b248532220b51b196e08b8358b466edd4ae52f7ff49bfcb2d63cc9ae47d752df57bde29bd6c3b8f2c030b840e565bb34fc08b2ed0d522a1a4297ba510e9bbc689ecef5e1e004a6472309c56eaa2eb8052c91079467a317339d65755", 0xbb}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x63, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x4000) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000140)=0x6f20) timerfd_gettime(r0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[{0xffffffffffffffff, 0x5, 0x1f, 0x9}, {0x7, 0xffffffff, 0x4, 0x10001}, {0x3, 0x6, 0x8d, 0xffff}, {0x8001, 0x4, 0x101, 0xfffffffffffffff7}]}) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0f85403, &(0x7f0000000000)={{0x3, 0x0, 0x0, 0x0, 0x2000000000}, 0x2}) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000240), 0x4) [ 770.240741][T14769] ISOFS: Unable to identify CD-ROM format. 22:08:22 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 770.331274][T14836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 22:08:22 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:22 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffff8c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xffffffffffffff55, 0x400000) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f00000000c0)=0x1e) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r1, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000a00)="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", 0x481, 0x0, 0x0, 0x0) 22:08:23 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 770.638693][T14958] ISOFS: Unable to identify CD-ROM format. 22:08:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x67, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:23 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffff6, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x10100, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x7, 0x7}}, 0x30) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000080)={0x0, 0x1, @raw_data=[0x5, 0x7ff, 0x0, 0xff, 0x200, 0x4, 0x83c4, 0x8, 0x5, 0x3f99, 0x81, 0x20, 0x80, 0x7, 0x0, 0x8001]}) 22:08:23 executing program 0: socket$inet(0x10, 0x200000000003, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000580)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r2, 0x0) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000240)={0x5, 0x70, 0x6, 0x20, 0xbfe, 0x42f9, 0x0, 0x1000, 0x1, 0xc, 0x20, 0x2, 0x10001, 0x8, 0x200, 0xfffffffffffffffd, 0x3, 0xfffffffffffffffe, 0x1000000000000, 0x100000001, 0x80, 0x3, 0x37, 0x6, 0xb, 0x3, 0x3, 0x3f, 0x0, 0x6, 0x2, 0x8a9c, 0xffff, 0x4, 0x5, 0x9, 0x4, 0x7f, 0x0, 0xffffffff00000000, 0x2, @perf_config_ext={0x100000001, 0x5}, 0x34893, 0x24, 0x800, 0x4, 0x7, 0x1, 0x7fffffff}) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) r4 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, 0x0) listxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000013c0)=""/21, 0xfffffea1) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$pfkey(0xffffffffffffff9c, 0x0, 0xbfffe, 0x0) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 22:08:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 770.848909][T15084] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:23 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20100000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 771.075930][T15092] ISOFS: Unable to identify CD-ROM format. 22:08:23 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x100, 0x0) fstat(r0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc}, 0x0, 0x0, r0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr="ac2f4dfc745536116712af80812db0b9", 0xffffffffffffff13}}}, 0x3a) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) mknod$loop(&(0x7f0000000240)='./file0\x00', 0xc000, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r4, 0xc}}, 0x10) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000340)=0x8, 0x4) r5 = socket$nl_crypto(0x10, 0x3, 0x15) msgget(0x2, 0x208) getsockopt$IP_VS_SO_GET_SERVICES(r5, 0x0, 0x482, &(0x7f0000000280)=""/91, &(0x7f0000000300)=0x5b) 22:08:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x394, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:23 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x396, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:24 executing program 0: r0 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0x80000) connect(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, r1, 0x1, 0x6bd, 0x6, @dev={[], 0xb}}, 0x80) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x101001) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000240)) r4 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r5 = dup2(r3, r2) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x0) mq_timedreceive(r5, &(0x7f0000000600)=""/188, 0xbc, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) umount2(0x0, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x2, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) accept$unix(r4, &(0x7f0000000000)=@abs, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) bind$inet(r6, &(0x7f0000deb000)={0x2, 0x2000000004e23, @multicast1}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000500), 0x4) recvmsg(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r6, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 22:08:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 771.597436][T15256] ISOFS: Unable to identify CD-ROM format. [ 771.626433][ C0] net_ratelimit: 25 callbacks suppressed [ 771.626442][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.637935][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x500, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 771.643702][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.649486][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 771.655260][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.661044][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x100000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 771.786462][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 771.786495][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 771.792255][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 771.798036][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:08:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/4096) 22:08:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a7fc, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:24 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x8000000002000001, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000100)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x5, 0x4) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) 22:08:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x200000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a7fd, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 772.093337][T15488] ISOFS: Unable to identify CD-ROM format. 22:08:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xc0ed0000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x20100000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x4, 0x100) recvfrom$inet(r0, 0x0, 0xa42478c4, 0x102005, 0x0, 0xfffffffffffffdad) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0x3, 0x4000, 0xa0, &(0x7f0000ffc000/0x4000)=nil) fstat(r0, &(0x7f0000001b80)) r3 = gettid() getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000540)) getpgid(r3) shmctl$IPC_SET(r2, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x4, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, &(0x7f0000001a00)=[{&(0x7f00000019c0)}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x4000000000000], 0x2, 0x400, 0x2}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0xe, 0x0, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x0, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x0, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='Fvmnet1/\x00', 0xffffffffffffffff) lsetxattr$security_smack_transmute(&(0x7f0000000280)='./file1\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) add_key(&(0x7f0000000140)='d\x00\x00_resolver\x00\xe7\x82\xd1(\xf1|\x97ch\xcda\xbd\xba\xe7', 0x0, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, 0x0, 0x0) r6 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) r7 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r6) syncfs(r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x7, 0x1, 0x8, 0x2, 0x2}) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440)=[{0x0}], 0x1, r7) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x7fff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}, 0x1c) memfd_create(&(0x7f0000000100)='3\x00\x1e\x18J', 0x1) 22:08:24 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x100) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x7, 0xe, 0x4, 0x1000000, {}, {0x5, 0xc, 0x40, 0x4, 0x0, 0xfffffffffffffff7, "a8d27b49"}, 0x100000001, 0x7, @offset=0x3ff, 0x4}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, r2}) 22:08:24 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a7fe, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:24 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 772.361121][T15623] ISOFS: Unable to identify CD-ROM format. 22:08:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRESDEC=r1], 0x2}}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f0000000140)={0x2, 0x2, 0x29, "2897909fb424b593eeb01b45eb4b99215901c52d639cd0583185844ba9df0d9b1dc2fa056cc155fcf8096a7578d96e0797d814b35716bf944b349081", 0x13, "4e9b3750a2d814b9f8a8b483201ffb2a3b8893073add2a409b7609cb6fdd416e101766c125c225d95b0eaa12703f635ef6fe4213cd5cfa7f0a9fc9cf", 0xd8}) 22:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x80000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000040)=0x8000) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x800) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fff) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x307, @broadcast}, 0x44, {0x2, 0x4e22, @empty}, 'eql\x00'}) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$llc_int(r1, 0x10c, 0x2005, &(0x7f0000000280), &(0x7f0000000240)=0xffffffffffffff05) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000000c0)={{0x100000001, 0x8}, 'port1\x00', 0x2c, 0x440, 0x1, 0x800, 0xbc, 0x10001, 0x80, 0x0, 0x7, 0x4}) getrandom(&(0x7f0000001400)=""/198, 0xfffffffffffffc93, 0x2) 22:08:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a7ff, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 772.754037][T15856] ISOFS: Unable to identify CD-ROM format. 22:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x226000) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000100)={'nr0\x00', @ifru_mtu=0x7}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 22:08:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffff8c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a800, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 773.058338][T15982] ISOFS: Unable to identify CD-ROM format. 22:08:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffff6, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843090a26236925000f0004001000080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000e2d4ec6bab91d4", 0x55}], 0x1}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000100)={0x2, "f36d9bad210e0875652a2510a152e361da8dd862dc0d60f49c0e1f2fb723c455", 0x1, 0x9, 0x7, 0xff0000, 0x1020014}) 22:08:25 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a801, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:25 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xc0ed0000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 773.200772][T16083] ISOFS: Unable to identify CD-ROM format. 22:08:25 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x8, @rand_addr=0x1, 0x4e20, 0x2, 'sed\x00', 0x20, 0x9, 0x73}, 0x2c) write$evdev(r0, &(0x7f0000000080)=[{{0x77359400}, 0x11, 0x8, 0x8}, {{}, 0x17, 0x3e, 0x800}, {{r1, r2/1000+30000}, 0x5, 0xffff, 0x7}, {{}, 0x0, 0x2, 0x200}, {{0x0, 0x7530}, 0x4, 0x0, 0x800}, {{}, 0x1, 0x3ff, 0x74}, {{0x0, 0x7530}, 0x17, 0xf3, 0x10000}, {{}, 0x1, 0x8, 0x7}], 0xc0) [ 773.284149][T16117] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 773.294489][T16120] netlink: 'syz-executor.0': attribute type 15 has an invalid length. [ 773.316296][T16120] netlink: 'syz-executor.0': attribute type 15 has an invalid length. 22:08:25 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffffffffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x10000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @empty}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000280)=0xd3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={r3, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000180)={r3, 0x40}, &(0x7f00000001c0)=0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x800, 0x0) [ 773.536120][T16186] ISOFS: Unable to identify CD-ROM format. 22:08:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a802, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x300, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x80000001, &(0x7f0000000080)=0x4) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x02', 0x0, 0x0) 22:08:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10201, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x8) prctl$PR_SET_TSC(0x1a, 0x2) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f00000000c0)=""/207) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) connect$vsock_dgram(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$KDDELIO(r1, 0x4b35, 0x2) r4 = syz_open_pts(r2, 0x10000) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000200)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ashmem\x00', 0x180, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000280)=0x2c, 0x4) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000002c0)={0x39, 0x1f, 0x0, 0x3, 0x80000000}) r6 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0xffffffff, 0x2000) ioctl$DRM_IOCTL_MAP_BUFS(r4, 0xc0186419, &(0x7f00000004c0)={0x1, &(0x7f0000000340)=""/226, &(0x7f0000000480)=[{0x401, 0x1a, 0x7f, &(0x7f0000000440)=""/26}]}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x8201, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r6, 0x40bc5311, &(0x7f0000000540)={0x3, 0x2, 'client0\x00', 0x1, "295bb8c5a362a175", "ab15fecdf43e54ed6a789dbd5bd3d16b34a5b7be7813e9c0045877a91b4b520d", 0xcd5f, 0x8}) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000600)={0xf, {0x80000001, 0x7f, 0x6, 0x5}}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer2\x00', 0x545000, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vsock\x00', 0x1c3902, 0x0) ioperm(0xffffffff, 0x9, 0x1) ioctl$TIOCGSID(r7, 0x5429, &(0x7f00000006c0)=0x0) write$cgroup_pid(r3, &(0x7f0000000700)=r8, 0x12) dup2(r6, r5) userfaultfd(0x80000) r9 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000780)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r6, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x14, r9, 0x102, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000050) 22:08:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a803, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf0', 0x0, 0x0) 22:08:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffff8c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 773.909447][T16363] ISOFS: Unable to identify CD-ROM format. [ 773.954803][T16385] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:26 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x240, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:26 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000440)="24000000190007041dfffd946f6105000a600200fe00000000000800080006000400ff7e", 0x24}], 0x1}, 0x0) 22:08:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffff6, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$inet6_buf(r0, 0x29, 0xd2, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x9, 0x800400002) r2 = getpgid(0x0) r3 = geteuid() getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x7d931c99, 0xffff, 0x1, 0x6b0, 0x0, 0x7fff, 0x4, {0x0, @in6={{0xa, 0x4e23, 0x9, @ipv4={[], [], @loopback}, 0x2}}, 0x5, 0x5, 0x9, 0x4, 0x5}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x22}, 0x6}}}, 0x84) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000040)={0x2, 0x5, r2, 0x0, r3, 0x0, 0x0, 0x2}) [ 774.284826][T16501] ISOFS: Unable to identify CD-ROM format. 22:08:26 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x1a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:26 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a804, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:26 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p ', 0x0, 0x0) 22:08:26 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x100000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x20001) write$vhci(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xcc) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 22:08:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0de1fcb2d28c14180093ccafd61fbe4feaa172cfb60a8c92e2dd3be99500046c74f724"], &(0x7f0000000100)=""/174, 0x1a, 0xae, 0x1}, 0x20) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000080)=0x8) r1 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x5, 0x200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r1, &(0x7f0000000280)="d85cada492133ddd8ac408e5595d3104ce5a642bf0129d4d18e26c8ebd8464de895da44dd915fbcb28e977d3881e765bf790a797dd162807460495129f63bc7d2c6145f5f8a0bbfd063bfe9a7cbf63d839635b2e7faecb80cb4c9c5dbabd1f8420f75a4165a8bd97dd7282ff79cf415e92a78be059", &(0x7f00000000c0)=""/57}, 0x18) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) 22:08:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a805, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x200000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xedc000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 774.618918][T16742] ISOFS: Unable to identify CD-ROM format. [ 774.711005][T16797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x10', 0x0, 0x0) 22:08:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x402) write$uinput_user_dev(r0, &(0x7f0000000300)={'syz1\x00', {0x0, 0x200, 0x5, 0x400}, 0x29, [0xfffffffffffffffa, 0x5, 0x10000, 0x5, 0x3, 0x3, 0x3, 0x4, 0x100, 0x9, 0x3, 0x6, 0xfd0, 0x8000, 0x9, 0x20, 0x0, 0x4, 0x9, 0x1, 0x4, 0x1, 0x2, 0x1, 0x5, 0x0, 0xc9d, 0xa8f, 0x0, 0x821e, 0x3, 0x8, 0x1c7c, 0x5, 0x100, 0x3, 0x6, 0x400, 0xc1, 0x8, 0x6, 0x3034000000000, 0x7fff, 0x1ff, 0x9, 0x7, 0x9, 0x3, 0x7ff, 0x10001, 0xcc7f, 0x2, 0x3, 0xb82, 0xea4, 0x4, 0x2, 0x3, 0x35, 0x80, 0x6, 0x5, 0x8000, 0x2], [0x8, 0x1, 0xfff, 0x7ff, 0x8, 0x7fff, 0x80000001, 0x1c0000, 0x80000000, 0x80000000, 0x5, 0x6, 0x6, 0xa2, 0x10001, 0x100, 0x20, 0x100000000, 0x5, 0x3, 0xffffffff, 0x8, 0x3, 0x2, 0xb0, 0x5, 0x3, 0x9, 0x8000, 0x7, 0x9, 0xffff, 0x3, 0x7, 0x10001, 0x8, 0x3, 0x4, 0x1, 0x3, 0x800, 0x1, 0x1f, 0x7, 0x10000, 0x4, 0x71e0, 0xb441, 0x9, 0x8001, 0x400, 0x80, 0x401, 0xffff, 0x9, 0x1, 0x8, 0x9, 0x3, 0x734f, 0x1ff, 0x1, 0x7], [0x3f, 0x8001, 0x9, 0x10000, 0x1, 0x9, 0x1, 0x800, 0xe143, 0xffff, 0x6, 0x3, 0x8000, 0x7, 0x1f, 0xffffffffffffff1e, 0x80, 0x2, 0xfff, 0x9, 0x4, 0x100000000, 0x6, 0xe4a, 0x5, 0xa5, 0xd7, 0x2, 0x1, 0x3, 0x0, 0x9, 0x100, 0x9, 0xfffffffffffff801, 0x7fffffff, 0x2cac, 0x3b, 0xfffffffffffff801, 0x6, 0x5, 0x4, 0xa64, 0x2, 0x0, 0x7f9ae23f, 0x1, 0x6, 0xffffffff, 0x9, 0x5, 0x5, 0x3fffffffc00000, 0x0, 0x3ff, 0x100000000, 0x0, 0x100000001, 0x5, 0x40, 0x9af, 0x2, 0x0, 0x8], [0xffffffff, 0x80, 0x8, 0x8000, 0x3, 0x6, 0x101, 0x9, 0x9, 0xff, 0x4, 0x25f, 0xfbde, 0xffffffff, 0x4, 0x10000, 0xffffffff, 0x7f, 0x1ff, 0x7f00000000, 0xf9, 0x6, 0x1, 0x1000, 0x3, 0x0, 0x8, 0x8, 0x10001, 0x8, 0x6, 0x2, 0x1f, 0x2, 0x1f, 0x9, 0xfff, 0xae0d, 0x1, 0x4, 0x3ff, 0x3c4b1001, 0x8, 0x8001, 0x3, 0x1, 0x101, 0x100000001, 0x5, 0x4, 0x7, 0x81610000000, 0xb4, 0x86f, 0x4, 0x10000, 0x5, 0x3, 0x1, 0x1, 0x5, 0x3, 0x62, 0x5]}, 0x45c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000040)={0xb488, 0x3, 0x9, 0x30, 0x7, 0x40, 0x6}) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) r2 = geteuid() r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x200, 0x0) bind$bt_hci(r3, &(0x7f0000001b00)={0x1f, r1, 0x3}, 0xc) r4 = getpid() sendmsg$nl_generic(r3, &(0x7f0000001a80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001a40)={&(0x7f00000007c0)={0x1250, 0x13, 0x500, 0x70bd25, 0x25dfdbff, {0xb}, [@nested={0x1004, 0x78, [@generic="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"]}, @typed={0x8, 0x85, @pid=r4}, @typed={0x14, 0x4f, @ipv6=@empty}, @nested={0x4, 0x64}, @generic="e4724cbec17a89ca29f99b410429de543657e536992aa19f77ff664d5c70e22b82774e9dde85e033f85dd2c3f6a9112e3dc95c6b882156ca40acd492fb0b157e1be730c7205394d44f77cb383837b1c7dc2cf07cc623780844cd799c0549eb0a8f15a239d67b3f64366d2ec93e1b6608844e9a727b287195dba10ae2ece21a4faec3af2c65543d992d9f23", @nested={0x8, 0x56, [@generic="d0cc"]}, @typed={0x8, 0x2f, @u32=0x9}, @nested={0x28, 0x50, [@typed={0x8, 0x45, @ipv4=@broadcast}, @typed={0x8, 0x57, @u32=0x64fef9c7}, @generic="50d81bf0fc4c112283fc47f30255afd328a09287"]}, @nested={0x154, 0xe, [@generic="c72d92ad81dc2dba73cdb7c6807ddacb179027743b75cee7044d6bfd2f6a446c07abdc60d998cc87dc24c4dcc9b2a2766dbb4b24577fdf877f36cea4e3a88e8c98b326ba0aa3a6b6f403c5ad773d1215fcae6a8711d1de8f56ed034a57b78707b1209c4601e7cecc3e8282182297a654b82f909e26610af711e5e9a6bfd7826a1b284a8bcd0428a6f668c4d6dd2d0cf5c091326112a5", @generic="58490a958e83a0ebc9ffa58a339e8d288241717d3c525d177952d48615fd04c82966ad981af7f1aa2021ee8e7cb0ddf0ce86e6f20898c5cb71130500e696556a2ab50fbd9085ad7459372e5c3d678c22bfa729145826e8ce4b282962364afb74c4a39fdd221f15213b4028950261aeeff1bc2ba73e7adaa5705ee4c7ef1e8038167944d82ea63be95ef9da21a878a5bd5cd3a9dbceb4d89a090584a45f1981a7ec9401f148ecfa38abfdddbe5d9a4f3a4ae41de76f341d"]}, @generic]}, 0x1250}, 0x1, 0x0, 0x0, 0x20008080}, 0x40000) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@local, @in=@multicast1, 0x4e21, 0xd7ee, 0x4e23, 0x893, 0xa, 0xa0, 0xa0, 0x21, r1, r2}, {0x81, 0x6, 0x2, 0x7, 0x8, 0x1, 0x6, 0x100000000}, {0x8001, 0x325, 0x8001, 0x80}, 0x100000000, 0x6e6bbb, 0x3, 0x0, 0x1, 0x1}, {{@in=@multicast2, 0x4d6}, 0xa, @in=@multicast2, 0x3506, 0x0, 0x3, 0x40, 0x40, 0x401, 0xce}}, 0xe8) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x3, r1, 0x3, 0xffffffffffffff9c}, 0x10) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000001ac0)={0x8fd, 0xfffffffffffffffe, 0x53, 0x4, 0xe, 0x3, 0x1, 0x0, 0xa2f, 0x80000000}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:27 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) ioperm(0x0, 0x5, 0x0) clone(0x200085fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 22:08:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8001a0ffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xc0', 0x0, 0x0) 22:08:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf0ffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a806, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 775.059399][T16874] ISOFS: Unable to identify CD-ROM format. 22:08:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400000000000003, 0x0) r1 = dup(r0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/kvm\x00', 0x80000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) 22:08:27 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x6, 0x1}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:27 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x100000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a807, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:27 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) fdatasync(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x200000, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x541b, 0xa04ff9) 22:08:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x200000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 775.420926][T17075] ISOFS: Unable to identify CD-ROM format. [ 775.441701][T17129] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000001500)) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0xdf952272) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x3, 0x45) syz_open_dev$usbmon(&(0x7f0000001300)='/dev/usbmon#\x00', 0x38ad, 0x2) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) io_cancel(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000001280)=0x7fff, 0x4) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, 0x0, 0x0) times(&(0x7f0000000100)) r3 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200), 0x0, 0xfffffffffffffffa) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, 0x0) keyctl$set_timeout(0xf, r4, 0x8) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000d83ff8)=0x1111, 0x800000000002) 22:08:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x4, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default, @bcast, @default, @bcast]}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2000000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a808, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 775.794692][T17152] ISOFS: Unable to identify CD-ROM format. 22:08:28 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0xffffffffffffffff, 0x0) write$UHID_CREATE(r0, &(0x7f0000000200)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000140)=""/20, 0x14}, 0x120) write$UHID_DESTROY(r0, &(0x7f0000000380)={0xe}, 0x4) 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x2010000000000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a809, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 775.939427][T17278] ISOFS: Unable to identify CD-ROM format. 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000040)='./file0\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x800, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:28 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) read$FUSE(r0, &(0x7f0000000180), 0x1000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)={0x2, 0x1, 0xfffffffffffffff8, 0x2}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001600)={0x0, 0x7}, &(0x7f0000001640)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001680)={r2, 0x6}, 0x8) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc61) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000001200)={"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"}) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000100)={0x7b, 0x0, [0x200000490]}) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x80, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000016c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000001a00)={&(0x7f0000000040), 0xc, &(0x7f0000001700)={&(0x7f0000001780)={0x248, r6, 0x600, 0x1f, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x753d}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff9c}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x104, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xde}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb37}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe62}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @rand_addr="133ff72e319b57835ae1b3c1b458ad10", 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7011e6f2, @initdev={0xfe, 0x88, [], 0x40, 0x0}, 0x1000}}}}]}, @TIPC_NLA_BEARER={0x34, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}]}, 0x248}, 0x1, 0x0, 0x0, 0x48000}, 0x20000044) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4068aea3, &(0x7f0000001180)={0x7b, 0x0, [0x3, 0xfffffffffffffc00, 0x5, 0x1ff]}) 22:08:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffffffffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 776.102960][T17397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x02', 0x0, 0x0) [ 776.325222][T17407] ISOFS: Unable to identify CD-ROM format. 22:08:28 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000240)={0x0, 0x81, 0x2, {0x1, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000000)=0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) setsockopt$inet_dccp_buf(r2, 0x21, 0xc0, &(0x7f00000000c0), 0x0) r3 = socket(0xa, 0x2, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(r3, 0x0, 0x20, &(0x7f0000000100)="e6287b9a", 0x4) 22:08:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0010000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80a, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x56, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8979, &(0x7f0000003f00)={'gretap0\x00', @ifru_flags=0x2}) recvmmsg(0xffffffffffffff9c, &(0x7f0000003cc0)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/196, 0xc4}, {&(0x7f00000001c0)=""/48, 0x30}, {&(0x7f0000000300)=""/253, 0xfd}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000400)=""/202, 0xca}], 0x5}, 0x34b94131}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000001880)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/77, 0x4d}, {&(0x7f0000000280)=""/21, 0x15}, {&(0x7f0000001680)=""/191, 0xbf}, {&(0x7f0000001740)=""/182, 0xb6}, {&(0x7f0000001800)=""/108, 0x6c}], 0x6, &(0x7f0000001900)=""/130, 0x82}, 0x3}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f00000019c0)=""/20, 0x14}, {&(0x7f0000001a00)=""/140, 0x8c}], 0x2, &(0x7f0000001b00)=""/95, 0x5f}, 0x9}, {{&(0x7f0000001b80)=@nfc, 0x80, &(0x7f0000002100)=[{&(0x7f0000001c00)=""/112, 0x70}, {&(0x7f0000001c80)=""/82, 0x52}, {&(0x7f0000001d00)=""/174, 0xae}, {&(0x7f0000001dc0)=""/141, 0x8d}, {&(0x7f0000001e80)=""/33, 0x21}, {&(0x7f0000001ec0)=""/251, 0xfb}, {&(0x7f0000001fc0)=""/170, 0xaa}, {&(0x7f0000002080)=""/95, 0x5f}], 0x8}, 0x100}, {{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f0000002180)=""/162, 0xa2}, {&(0x7f0000002240)=""/50, 0x32}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000003280)=""/34, 0x22}], 0x4, &(0x7f0000003300)=""/144, 0x90}, 0x100}, {{&(0x7f00000033c0)=@hci, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003440)=""/125, 0x7d}, {&(0x7f00000034c0)=""/43, 0x2b}, {&(0x7f0000003500)=""/15, 0xf}, {&(0x7f0000003540)=""/22, 0x16}, {&(0x7f0000003580)=""/126, 0x7e}, {&(0x7f0000003600)=""/159, 0x9f}], 0x6, &(0x7f0000003740)=""/151, 0x97}, 0x31c3}, {{&(0x7f0000003800)=@hci, 0x80, &(0x7f0000003b80)=[{&(0x7f0000003880)=""/62, 0x3e}, {&(0x7f00000038c0)=""/207, 0xcf}, {&(0x7f00000039c0)=""/21, 0x15}, {&(0x7f0000003a00)=""/184, 0xb8}, {&(0x7f0000003ac0)=""/152, 0x98}], 0x5, &(0x7f0000003c00)=""/141, 0x8d}, 0x6a}], 0x7, 0x2, &(0x7f0000003e80)={0x0, 0x1c9c380}) accept4$alg(r1, 0x0, 0x0, 0x80800) connect$pppoe(r1, &(0x7f0000003ec0)={0x18, 0x0, {0x4, @random="ffa84311a923", 'vcan0\x00'}}, 0x1e) 22:08:29 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf0', 0x0, 0x0) 22:08:29 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x200000000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000100)) 22:08:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:29 executing program 0: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='6\t'], 0x2) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000100)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc-aes-aesni\x00'}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)="d2eb2362d69a02efcd06e787c593c8624b5eda1b132305e39719f2747f656272ba65d1ae3395502140eac649cd316f50653415236035c2207189872a13e19b34eb020bcb8cbf6dc31b965c62f875b2c84080d530b6bb80a0ecc8a7e9bf078b1d943bcb35e1208073b6eec99e332a23aea5b0766313f5783c21a0e138e82794684da0a9cda51c937f", 0x88}, {&(0x7f0000000180)="aa0ec0d2bf94", 0x6}, {&(0x7f00000002c0)="a373e241b08e47f22ff94812b83c7fc0964249ff24f9af172dcab41cf2ca2b8500c8cfa92805370f3beaf78c36fe73", 0x2f}, {&(0x7f0000000300)="3a9f85d2941a5c5db255d0f17bacd0885c0f7943bc5059b1ec16c3fbb6", 0x1d}], 0x4, &(0x7f00000003c0)=[{0x48, 0x117, 0x800, "0cd38150bfdc54b5d3109a73708fc2eb04bd91f2c0b439415c6e8ecd261f66c522e9076a8661ecf3110c17a48c7166afb55f"}, {0x58, 0x0, 0x2, "e318995adbf0fa8f1e82cbc78be3072e3a36a0b43af55501d1b99e4a58d4363f2d3789a22da0c92caf39721d1e9aa06fa1efa4e46498042f126a7c34f999d83fe3"}], 0xa0}, 0x8000) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000004c0)=@assoc_value={0x0}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000540)={r1, 0x3, 0x10}, 0xc) 22:08:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xffffffffa0018000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80b, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 776.865008][T17568] ISOFS: Unable to identify CD-ROM format. 22:08:29 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0xfffffffffffff000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 776.958747][T17589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x7c17, 0x6, 0x3, 0x9, 0x15, 0x7ff, 0x8, 0x1000000, 0x8, 0xfffffffffffffe01, 0x1, 0x3}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @ioapic}) 22:08:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x20000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x80000000}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000180)={r1, 0x6, 0x2}, 0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000040)=""/179) 22:08:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x02', 0x0, 0x0) 22:08:29 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p ', 0x0, 0x0) [ 777.231901][T17589] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:29 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:29 executing program 0: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x50) bind$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0x0, 0x3, 0x1000, 0x101, 0x100000001, 0x7}, 0x5}, 0xa) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400, 0x0) 22:08:29 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf0', 0x0, 0x0) [ 777.421771][T17622] ISOFS: Unable to identify CD-ROM format. 22:08:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80c, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:30 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:30 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x5, 0x6, 0x8, 0xffffffff, 'syz0\x00', 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:30 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x8c', 0x0, 0x0) 22:08:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r2, 0x609, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) 22:08:30 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x10', 0x0, 0x0) 22:08:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80d, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 777.866458][ C0] net_ratelimit: 22 callbacks suppressed [ 777.866467][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 777.877968][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 777.883802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 777.889612][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 777.895413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 777.901231][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:30 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p ', 0x0, 0x0) 22:08:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf6', 0x0, 0x0) 22:08:30 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xc0', 0x0, 0x0) [ 778.026470][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 778.026508][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 778.032273][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 778.038054][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 778.053764][T17800] ISOFS: Unable to identify CD-ROM format. [ 778.057435][T17897] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:30 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="57b816f018c047f9aedcaa5e8a96a4d97d8994e86d7066f2a0165bf8df98f28eb721e79e19fc0bf098249afd477d92e818e8c86b0bdd915d3ca854b80188db4eb166fc4f14", 0x45, 0xfffffffffffffffb) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x480200, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={0x0, 0xfffffffffffffffa}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000002c0)={r2, 0x8}, &(0x7f0000000300)=0x8) 22:08:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x286041, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:08:30 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:30 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:30 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80e, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:31 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x10', 0x0, 0x0) 22:08:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="010000800000000007000000000000000600000007000000070000000000000002000000000000004000000000000000ff070000000000000000000000000000000000000000000080000000000000000000000000000000030000000000000003000000000000003200000000000000000000000000000000000000000000000001000000000000000000000000000023090000000000000700000000000000350000000000000000000000000000000000000000000000020000000000000000000000000000000001000000000000050000000000000009000000000000000000000000000000000000000000000001000000000000000000000000000000ffffffff00000000b50a00000000000040000000000000000000000000000000000000000000000004000000000000000000000000000000f600000000000000d9e8000000000000ffffff7f0000000000000000000000000000000000000000000400000000000000000000000000000100000000000000010000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000"]) 22:08:31 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:31 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) [ 778.595810][T18023] ISOFS: Unable to identify CD-ROM format. 22:08:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a80f, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:31 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xc0', 0x0, 0x0) 22:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40101, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000040)={{0x0, @name="75c7fa405f4a332df979d9eb32e22b4ed9c3052d6e9ae6f4a0736d178766c4ba"}, 0x8, 0x1ff, 0xffffffffffffffff}) 22:08:31 executing program 0: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$caif(r1, &(0x7f00000003c0), 0x18) futex(0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0x1) syz_init_net_socket$rose(0xb, 0x5, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x40, &(0x7f0000000080)={[{@nfs_export_off='nfs_export=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_on='nfs_export=on'}, {@nfs_export_on='nfs_export=on'}], [{@dont_appraise='dont_appraise'}]}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f0000000180)=0x1e) [ 778.759977][T18261] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:31 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:31 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) [ 778.934129][T18272] ISOFS: Unable to identify CD-ROM format. 22:08:31 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffff4e, 0x0, 0x0, 0x0) [ 779.046609][T18295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:31 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000100)={'\x06\x00\x00\x00\x04\x00\x00\x00\x00 \x00', @ifru_names='veth0_to_bond\x00'}) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f0000000140)={0x40000000, 0x105, "4c8a01a9fc13456f09608ffc439f4a6f37cef2e243963f18575d3602ef12342b", 0x200, 0x2811, 0x0, 0x0, 0xfff, 0x9dfc, 0x7, 0x7, [0x3, 0x2, 0x4, 0x715d]}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) fdatasync(r0) 22:08:31 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xa0', 0x0, 0x0) 22:08:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a810, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = geteuid() r1 = geteuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x6, &(0x7f0000000600)=[{&(0x7f0000000080)="23baf2a2c8ea41a0cebfc7aef876e99dfeaf375f5bfed4a8f57a6bea5a54fa9a95806a026be9cbd933b8b62f5065674ad24fe4434e022240c4ec1eaab5076a25defcf954d3ca208c2e14799dc82134eaa91420a1548294ce361b66987afc41852e20bd9c6f7d640fd8b76a2ce5a3477ffca05de55b7beb677bedfcb00c80277bdf94", 0x82, 0x3db43e2b}, {&(0x7f0000000300)="ef536751e0d9ba05ada87c3b02a3f22ff2d6f033aab7b544c764b714540223cf634af8be3cde3292bcd4018b3877b57344f30b78f273a720f8abcad1cc88ce1c0c1f2aa5f845b50211cceb7b9c489879915ed2036ce8c41b7688e89808fc4804917f83e3a9431d3fd3a0c01e7b09a92cd70c1fb85c507ba4039c0bf79da17af5a57e1d765c0ef2c5cd1cb4d53a50d19a71e3cf84a1151524a72779b54c24a43c175b2afd4f7af9b51fda95ba9bcb84f4ab02065e81cb998bbc211f1d1a9962e4ea2dba75569ad2cbb7d30ca6c33c5f", 0xcf, 0x7fff}, {&(0x7f0000000140)="08a30bec63bba5ab9dd1fe0b79b572fa0198454327c91a644fe3da12deda1285102fceabc53c02696d8088394ac980", 0x2f, 0x3}, {&(0x7f0000000400)="dd79260cbf32d1dc4353274f19dbdf1de6c2a4cfed07864e538924fa798355076708752b9e3478cb0e8d9a49114abe6cc40171f285a2a55f460919a3f426162161565ddebf6ec0a315cae61b90eaead1070d408c9f324d9f16be954f731b7b334a21c796adf27d8f37bdb341b7478540c4180ec4dcd909091f076bbb43c67310d699880428ca1edea9aa2ed93d00dbd9cdfb4e1ddb4f346cef18e075418ffea7721216d7a8531f2c4ec6ee57ba888607ab1d47f811ab6e7c985e3d5f4052be839fd7786d507467f963bc0d58a2cc6d7134d559d054c883aa049804b09985574e16faa538677e767c205bc5dacbfdfa56197fcc99b52a", 0xf6}, {&(0x7f0000000500)="bbca6ff20ad3925e84329f9d4ba092e2e4c4aebeffae11b6d4537231c6e7f58634427897e20329fd0dc422bed0ee34d231ed82ec0a4ff4283e915e27897901c5fe476f794529edd21969034994883d02c490dff151a9c52fa0487aa9c2736257938ddc01fae431c04aea02e4dd224c63c81d9e02ad6cc054e9d0af22f391b4ccefbe3bb3090c193cce4db02a17b3368c104e412de2b8b3aa200fd4e0bb761a55da4974525e5a21214737f98865a1c80d498b47ac03929aba51963c6c2167ae7635912f33832966b16efbe9209cfa4856ddf33878445595e4ac825abe31d9c12ddd1c3e0ca6b92954f5de99cfacbf7d66e5aafc8b", 0xf4, 0x3ff}, {&(0x7f0000000180)="365b9567c97e4ac481d3f737f590ade536c76e0f542c53dd378d07b51f056b541fad38a520231ef255c65d007deda23a69f3e2e9f0e82335b4023577c3371dc0", 0x40, 0x4}], 0x80, &(0x7f00000006c0)={[{@nogrpid='nogrpid'}, {@nouuid='nouuid'}, {@filestreams='filestreams'}, {@noattr2='noattr2'}, {@nouuid='nouuid'}], [{@fsname={'fsname', 0x3d, 'iso9660\x00'}}, {@subj_role={'subj_role', 0x3d, 'iso9660\x00'}}, {@uid_lt={'uid<', r0}}, {@euid_lt={'euid<', r1}}]}) 22:08:31 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x8) r1 = socket$inet_dccp(0x2, 0x6, 0x0) pread64(r1, &(0x7f00000001c0)=""/215, 0xd7, 0x0) r2 = dup2(r0, r1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000180)={0x7ff, 0x1000, 0x2, 0x4, 0x401}) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000040)={0x16, 0x3a, &(0x7f0000000000)="857eb9b1abff539b6abb7db8c31e1c7154e8a68399743060825572bec26aea4c2da0cf2646767ecd8b36326db823de130646b976fbfcb717659b"}) setsockopt(r1, 0x10d, 0x800000000e, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r0, 0x2) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1a, &(0x7f00000000c0)='nodev,vboxnet1proc\x9bGPLGPL\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r5, 0x4) 22:08:31 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:31 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x9, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x57}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W>\x86E\x10*\xe7{\x15\xba)%\xdc@\x8f*\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe70BL\x7f=\xc08\xc2\xb4\x85\xfc?8\xec\x93\a[M-\xcc\b\xad\xceP9\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\x1c\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\x87\xbd\xfe\x1b\x1b\xae\xe7\xe4\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'veth1_to_bridge\x00', 0x0}) getsockname(0xffffffffffffffff, &(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x80) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x90, r1, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4880}, 0x0) r4 = add_key(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x1}, &(0x7f0000000500)="dec82c742134d30d2ddcad69fba34b0f704e2c1cdde215db78475d35d743da477be6f8402ef32ccd0f1eebda29ef6ac849d914cbe042f50d86f28fc289cd9184485ce38f307abdb6887bd8d15a91a22ca4aa9225c7ed1d024d9f6bcbcda887d5a0184962e77b080b413affb6b1b117d6271aebcdc8e25a80905d873205a36d8ff39fdba3d4076acd15dea1576cfe8fdfa3efa24683374885928236eb99f3c358f03d1aa5af84a69ead0b91a7f6d1", 0xae, 0xfffffffffffffff9) r5 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000640)) keyctl$reject(0x13, r4, 0x6, 0x4d, r5) 22:08:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 779.558002][T18533] ISOFS: Unable to identify CD-ROM format. 22:08:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a811, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:32 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 779.655220][T18599] XFS (loop5): unknown mount option [fsname=iso9660]. 22:08:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0xffffffffffffff09, 0x0, 0x0, 0x0) flock(r0, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x80000) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000300)) [ 779.760799][T18693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:32 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e20, @empty}]}, &(0x7f0000000080)=0x10) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x260c00, 0x84) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0\x00', r3}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000000c0)={r2, 0x7f}, 0x8) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000180a43ba5d806055b6fdd80b40000000140003000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 22:08:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="a204fe2254e347362098f0e31b6e74", 0xf, 0x0) keyctl$instantiate(0xc, r0, &(0x7f0000000140)=ANY=[@ANYBLOB="757064617465fe6463727970746673207472757374f365643a657468313172501388b3d4a454fd294273797374656d6e6f6465762b00"], 0x29, 0xfffffffffffffffb) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x2900, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x4, 0x2000) fanotify_mark(r1, 0x55, 0x40000000, r2, &(0x7f0000000180)='./file0\x00') 22:08:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 780.040329][T18693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:32 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a812, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x21, &(0x7f0000c86000), &(0x7f0000000000)=0x284ea92c5e2cee3a) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000100)={0x3a, "b409740c907e7bd303add8d1908f22c7831f99a3676b8831a4ee3fbb2750d97f811a2f374fe6e509a39635ef1cc288d0a5eafd9912dc3e609c33"}) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x1}, 0x4) 22:08:32 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:32 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:32 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000000)) listen(r0, 0x7) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000008c0)=@assoc_value={0x0}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000940)={r2, 0x590, 0x30}, &(0x7f0000000980)=0xc) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000a80)=ANY=[@ANYBLOB="00100000ec6adfa805b942c7f40e39efdfd7deb57b2f2d6a1ec40724aeb8fc251ad37eeee5abdb6eb32b121dd56c8c7f248ce9d19377c7e6b7f8461c6492be0dfd58aa3ad5f77b5a887ab57aa2b34ad5406af007c539f732b1e268d00ee98c5c8286923abfd9837bdecba09095997b0c933862dc91c983b59ac2830949eab24887a31d748fd846b087f5d104fb9de92f0537145ca3e7f0dced0f96445fdc86262c18fbcda1a54f1215c7dc0b408f0584d236e345c088b792ce71ca021f663ff9e249a5cd10412e21eb00cae302fddf1fe327f62a3b4299f9354c44889f0199c8efac826445459e6b583e186b97767ea5558dc3e26d5fb3c1226d05d06c45b61a21fce1f3cc104b3fad30bfed974b5b8b15e069fa59facf0daf6a91dfb71b7c065433f37a38e0c5ce02f744a7465c4949f99e0f5404d8631a1947e6c8de496ddac31b90cd45cb0daa7736ca5299230a1c074e3172b154cf145b038738a266aafab135377d2701438b79db8bf2f59974cc26a9623591608bae6689062f7930aa0677f8438b5680d683b84daf7c284d5a8b5c23154cf6f08539ba90bb4bfad38df9e02e4294c310fff931af91edc6507bc55121c482e1d4e8b4d997462d6cc444fa2d76a5f7c78f629273798ad7d93244cd60bb25badb152e9cda72b4083fd69c1df6fc0f6488827c0fdb6f5c708204fafc63fe78964113a9f88860905de84945f791dfb6d637363f40b30ce0852268c7123af9de614388dca18949674da381d108fdc3640575db4b982165360d68d31dd4aa69dcedf1f68965723ba37123569bbaaf6b98faa0cc428ec8006188a3880f0498acb753652315ba3b0ecb70084ebbeb06e57c2d17abf86592765ba21edc90fdd4ce9dca7b47dc568ad28feab2ad546c6250800039abf1be8e9fa49747e16dce3eda78a6dc9c06b0ce9360c9d6021d668d7bff6a130ee65b58e3065eeb44724b0eb46f0b5eff45a9cd64d03507ceba42b1db9a80a0d752adfe4ce45c845b654fc77f7928dcc6e7d0d832905236c14b45fc55f682d4c18c7acc707d30b49321c6b692ac76b0a52906a1550a58b24b785f691e71b4bc4d092a27155ecb193b9126bec0646bd1ecedcd182e7525765fefc90eb17d0e00eb6262a95adfc7eea271aac7a1542c6a4b83a1b430f4ed9f480ed580e565edd50f029b0d802ccd21339062e1a48aa73be7a2fbf048724d065a548d65fbcdd1cdcd59a330017aa0841999fa9837a469c46207837a72e056fc18ac9dac3f5f7d8297c4e2abbdc60a239272236e5a95284695f43bb82daff89c204488e786c041852509e073ea232d0fa110c8dec446520437190262a715790f3f1387a7113ba8aec4a9405b029b4e5c091146bc8c668c75394b1fd4a7ae1aede4e713b65186a9a20c71ee48d0751ba8b698cefd4a0573aa211c17d7f086ca26a5195b81474df871843222e6cf979e1bc24a729118b05f7b0cc9ce7c49dae1adee2446ff560691d89531e7fb8ed36cec06c1823c873c55e8323030c2658099a204d10e8539565d6c41e7a198b13f587622c41db0f042d570d90afefe0bf8c20f35dc89ea4235e88f852d9a8dd0fe49853d99944171dc53f336956bdd2ae0dce30df53a84e29ef10d45330f813dd6e5cbd76345bf11756ce655b4988d149ab4fc1a1cd896aafd064c9d30afea24c6a9996862d350e8e748e40d350e7920a22c7bcb8d16ad5af15dfdfc9cab79be493356a03de85545dcb7f08a1b3412eaed4dfbb17573963d8c9f3867f8dabe783ff6fc5bb325ee2ef76345a9bc3f81a89a4c1ec61c254afdb41882917c74fbdd4e710f99f1270ff052acf7b62eff86b6059f6cd605fc4e2b985036cebac71a60a65e3d133eebc6797fe358bf660a1a8be10a2e374bbed73309101674adfda04095352cc4cb88a031b00602954788f6a20af2a4ef812d3c21a4fe23790431145dd612fea15b9b494fae06d57d5345c802f575a87406a846be80dc3f55983ec6bdf1cf7e54b8bddcd90e093c91e7e840762b762dd9ace32a24ff4b7be8f0c119b9e2bce78d7cfd7d215239eeee9921f85d71cc04edf6c8ce1ebab4163eb06610f3c0264515c6264e11c4b5bf047f161e5914464b023ee927b4c25e4eb46cc6f1d9f511e06ed5e3cd2b65d3352da2b1086d71db1641e39bacae707d894f8a3029a4d6a9ee2e8efbea904fb94f9b94df1c10575eb1222099394b990071a1f68902210562a87e1cc288b4b80d8a82ed8e6ec97a93432427f43c4d2221efc9adaeda90a78ac1c6064908dca6b432328c84ee270bbcdb46204ccfee29218a34b82e578e4126b5ef611246ec811f0bec48807bee3f840022e85bf150e1869b07654ed49c6ee27c6af7432f8214680f70855ba4465694d350633df632367b4a23327f9a80cea298f2f75cd46dfa702585e7efcc127cf2f1c4166740b209e1be1c8926f1f7a6f7099d81373aab72adebaba98e90f0cfa3333b504b08ed42d2fbf3140154f43fe01daf47fdfb9d20a8b3024df9db8c8df12bfc476b8ecb32b17066dd8cd5ce170a447914348393f6558abe5e0350ccd052747b453c55dbee4cb5ec470e9d6644adffee0a76de1502898b8cd50974f06f01141df2b2ff1554f174835dab07adbf77eff64a152234b068cbac092f5774dcc550deec5046bdf52946afa787623c981a55cc6d2f3d229a21d8b9343fe55d2daefcbbebaf3edf3db8edc5b362e1214d7c973e0eaed47133394602117fdab5a69d1ac728cf7639932addbc6e269c3a7b83589fd8036ea739391091ac2922a4727291191f337e786b1de929b7fb4da3247b944d605fb6eeb8df5f12625228e76d4f6c1045c8f6ba87b10383ea6f4b82bf4ef8ebf82c2417f67f63e3dc54777f6b6cb9c9937222fbe99c91a4c366b3be48757ea7fac48ce00520a00987d5e9479a1bf83a41e3523d480d933b246ef710f216683aa1938d1a91ad5035026567b2ac90af3ed8322aa174503df853c7e269014f6fe901c0de64e88a1e173465197889d5b8d291f6c393b139b855dd33d42e1ecaf3dfd9d6e1957645c5da8ec398b99b4a3d7666a77bd6230bc2df423761eabfd62c197d7364f6edc83bda54222b5cb590a1be324afbf7922303f4b0eb1082406763201031ac1dedc65d69405c4ea8f656c979eca8f198c8c46dc9bf04b863cb2761f32c66200098760931aa33ea8c27249d7ca852b0977554e6c56136ee97cae9b96353754a0a22972289de8fb5a216939f5b29ef5f5b9240a3956276d44622035eb12667df1c6b0e227893907830b13a39950e3a7696c2c43c292f79cc903ea4b97a717b8ec4eb33b83cc9b45ec7b42651b886a980d0ec8ca16536565aa692c93ff73cd4d04b4a28538af22f536f5b2c4bb7558f8c101659f0fba30a333183ce4ecc06158abae83cf817592dffa4809346381b2eb1cfe22c310ce82c2add669b3848ec44bc7d60ae9798d8b627d0ebd3f31fcb7c88b9e8614b98865bd0ebd3a487ebd3557fac605ed00c230860ec4791454f7157eea146347505f1a399e6c24c2337a829ca8bb9a07da208a561e611c7e34da26a455eb8853cbd948b543708bf62ab2b7cc3e4d1bb56f7453bec9534e4b0e132caaede34ff5390b07bc931266f32785e97969894a2d24fbf841b47b8b31d7ee5a5df4b395537d974e1339dab458799f5c5282f7521d69e7c586139dfaab5ff4267351676efb7a3ac15361e15ad124ae5aac0774f4f6f7db9aed6c5134c93d36a5ecfb9e8dbcc16f1a5ee9ce4dad4457be2709130b66278d08d52ce4d7b0890b05853d3c77b771c85503ef1bae8cde7cca949437d3361347250ded66d16d9117b17e631ce9ea6eb5fba20291f5bbcf5dfaae1714306797ffe9fd459c08b7619e297e830e518b4ad3ff7367fb63b701f2652ec65e70b0e03c9895d343000c289de2400ee967c70bfd9698f20bc3ee060c107613226f36090dfc0e709c8a97e95f627745607d4af07e355bd2cfd9704c112dee89ca4926894ecfe23bf87efe81e2050305f5c026c925377e8e66f1aa64ae406a578c24386e10c5e6d5bc148c22feba55c9d835ce637d56aef2b23990e09758d7158ad9878963262b74db1b5083b39450652b7f2e5d2f48ef4f9c972fdb93a4a7a3ac70a5460a669d59fd61e6fe37ff27832556de092f19d1d917307f67a0b3f1d3f0780b841d1e417f3170ca153914d7935cf1e98988bccf7719fad0d15e54b6230592128981ab32a7b556b1212856cbaf7ca33011c8a31d157270f587d2f6d51d16cdd2f0ddb3e9cb612fe748c4ed822cf911818f730f367c3d06948afce9ba1619d2e154876013a7af4b05dacdd49c04994718ce6ecafabbaae509552ea75d3d4b4d7e1d20f444205bd42e7751801802fd01997593786e5e60caa279148ebdbea00d9a47437b45dfaae526849b429645dfdff001b6d6196761a24f4edacae892e58da532b73c2ff230fd47a40d4236ba65701292811fb93ddbce32d67d3d0dd9bf58a41a5570fd6adace7f0e25e1a95b48fffe4c941da0681e45eb865a8a822ee542c0c5cea52d7fd3c280638e24156932ebe24655708032da0295687fe52c4c8853f9c514662920bbd33807873b4054a0c25381a3e09500f552ab18ef4f5fdebae2dabd2aadc001ed3309f09d58240194de4fab55e1930579fe0e54036971ba002f24d8a480fc9d4daa97ac3c6b4cd6fff431a7503962a5ad6b1a63d56bebb04500df18a86c0096c45246a78e9d3a6b9ed688520ca45c3f9402e610ec80567673bdf1d60e395bb16e6cf3406b549d9726770997edec6d51a388eb22951165b8b515e8fe0db546b5f2099b9ea142005910308e1368131eefdbb13958d1fbcbf1038c095152735bb1bcda4024db8032f3a9d611c951c3ff545c85331d5e8049258f716e1f127ae35c8c9a78ea40a0546a64a3a63e2c7da7efa964a317cc55499042ca65556c70e55b4e2a96590cc05a57cba6a1190e03a5b5b7dbbecbac2eeefcd556185de8414a8262ec50e31806c2753598ebf9d70c86e7325caaaaa48f3c2489a0626cb9a760c48634034778eafccebbf9a8ad85740806982e8be5f0f29e5269128dc35282e1180c5e8c32ba911b68538512a7cbc5718307b9ea199e53ba412961d54185f66fcd5f7b4bbafe6ead4f88054d74e534a588b7f2e7e02a256aa76a17cb80f801841c9ca963b90731260f0fdde447c8f870e19b0b5eba460e7f5b969e4dbf17ac336ac3fa389ae8f9fec902acf1acd9c0c1bc7c6f5354a3893ed2f1342d6544a7a39a398309de6ff4d629057f8324e52be2550edbe943b5394349f809e66d6a4c7fd8dce118b059f31faf10555cf67525bec11970f113860a9a09a07fc10699fb6e707436e9e4bd458a27fcc392ac6b98a958d85e62ab6d9a35b7c7f65ebaaf047c5aa9c2c028cec9f87f007be6b7dd49da3ad71bac732c95378522a5becd13ae94b3e9c026032141474f24cc9421b3e783d67ab7776b720a7fc64b2e424d459bd76ec611aa7771c2655f1f791d2d4798fbd9cb5ddf5f147018bd7ebcdde1f5d1c1f3234faf245b76fc6a9babbf1bca5aa72177a70d3924e2e16b0fdef69cb3c98f3543e1a2dd57706a0e222ee05a5363ebd77dba1b151b3f606276f4830fe6257230196fafbea931206559fadc1b51a1f9572324b59eefc5bd8b3eee7d80da2bd1e45e9a7a8a95c582537a762d4e80893c4b9a1649faac25f4133b19b6bf79c0e76b9b69a5dc93b90e33efc23922da895fcb05b7444875067b09996ae2a5275ee535f34138a35bc2049a5b6e247b2856e425cf4cea8528657d64b94386ecf32bd3ceccd0b9545c9fa89bd222003e1c953d1a8c62fe69f6b2db9a8f72448fa55f37281949dc7319cb60bc5f06ade6eeff81e5c6d4a86d721dde95483a114ec4a7176a63560de86a11bf35a016e9c9557d197f01aeab72b38003e9c7da305b34edb0c59d8ad0a177eadae55b46dac6fe668d4641c02979ee43220daeda36150c01fd40bdd488bae185856f2d2d2e1466ba47cedf15b2cd4b88164529d49ea30b565a9178a97790ea1a5ff0f9e61cca710a81474dfcb42ba45c833d643d81451"], 0x0) r3 = syz_open_dev$audion(&(0x7f00000009c0)='/dev/audio#\x00', 0xc07, 0x40) syz_open_dev$media(&(0x7f0000000a40)='/dev/media#\x00', 0x9, 0xc0080) connect$rxrpc(r3, &(0x7f0000000a00)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @multicast1}}, 0x24) 22:08:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a813, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 780.523235][T18947] ISOFS: Unable to identify CD-ROM format. 22:08:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 780.692009][T19056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 780.775461][T19079] ISOFS: Unable to identify CD-ROM format. 22:08:33 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfb, 0x800000}, 0xc) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000000c0)={0xffff, "6fd76ce77b0760f10c7d0848947be5dcb083ea3254772f4b98ab3920a13cbf50", 0x112, 0x8, 0x95, 0x1, 0x4}) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x4000000000, 0x0, 0x0, 0x23, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000140)=0x10001, 0x4) 22:08:33 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xf7, 0x800) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000000)={0x29, 0x3, 0x0, {0x1, 0x8, 0x0, 'group_id'}}, 0x29) 22:08:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x7, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=@newtfilter={0x50, 0x2c, 0x130, 0x70bd25, 0x25dfdbff, {0x0, r1, {0x6, 0xf}, {0x7, 0x10}, {0xf, 0x8}}, [@filter_kind_options=@f_route={{0xc, 0x1, 'route\x00'}, {0x20, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0xc7}, @TCA_ROUTE4_IIF={0x14, 0x4, 'veth1_to_bridge\x00'}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) creat(&(0x7f0000000100)='./file0\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={{r3, r4/1000+30000}}) write$P9_RREADLINK(r0, &(0x7f00000003c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a814, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) accept(r0, 0x0, &(0x7f0000000000)) getpeername(r0, 0x0, 0x0) 22:08:33 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2, 0x0) 22:08:33 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a815, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0, 0x0) [ 781.408756][T19308] ISOFS: Unable to identify CD-ROM format. 22:08:34 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000080)) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0xf0f03c, 0x7}) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000600)={0x7, @sliced={0x4, [0xfff, 0x7, 0x800, 0x5, 0x7, 0x0, 0x3, 0x100000001, 0x8, 0x2, 0x1, 0x8, 0x7, 0xfffffffffffffff8, 0x0, 0xffff, 0x2, 0xffffffff, 0x0, 0x80000001, 0x2, 0x4cc7, 0x2, 0x2, 0x100000000, 0x6, 0x2, 0x3, 0x7, 0x8, 0x1ff, 0x5, 0xfffffffffffffffc, 0x10000, 0x9, 0x1f, 0xff, 0x8001, 0x2, 0xf22e, 0x8, 0x8000, 0xb9, 0x0, 0x4, 0x101, 0x5, 0xfffffffffffffff8], 0x1}}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0xfffffffffffffe00, 0x10, 0x78, 0x3ff}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={0x0, 0x6227ff17}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000004c0)={r1, 0xbf9, 0x385, 0x3f, 0xf925, 0x4, 0x245b, 0x9, {r1, @in={{0x2, 0x4e22, @local}}, 0x1, 0x1ff, 0x0, 0x7, 0x1}}, &(0x7f0000000580)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000003c0)={r1, 0x6, 0x40, 0x3, 0x9, 0x5, 0x80000001, 0x5, {r2, @in6={{0xa, 0x4e20, 0x6b86, @local, 0x64}}, 0x6, 0x100, 0x0, 0xfffffffffffff801, 0x7}}, &(0x7f0000000480)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r3, 0x3}, 0x8) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x8, @mcast1, 0x1f}, {0xa, 0x4e24, 0xfffffffffffffffe, @dev={0xfe, 0x80, [], 0x19}, 0x290c}, 0x2, [0xa6, 0x3, 0x3, 0x93b, 0x7, 0x7, 0x3, 0x20]}, 0x5c) write$FUSE_DIRENT(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a8000000000000000700000000000008000000000000000002aac7000000000000000a000000767700002f6465762f7662692300000000000000050000000000000001000080000000000a00000026ffffff656d30252d757365722e0000000000000000000000000a000000070000002fc1cb5dc00bcfa53a436465762f766269230000000000000003000000000000000600000000000000040000000600000070726f630000"], 0xa8) setsockopt(r0, 0x1, 0xde, &(0x7f00000005c0)="b31edee6053d69d6184327ef35b497de324e5b5816d59d9d8e59de709e881d89fbf1d68e7f1753ffbd83d7b64e15a68e868a63b5ed", 0x35) 22:08:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:34 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x8c', 0x0, 0x0) [ 781.509247][T19434] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0, 0x0) [ 781.655024][T19308] ISOFS: Unable to identify CD-ROM format. 22:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x17, 0x3) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x50200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)={0x194, r1, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x54367fbc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc5e0f4a}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf2}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6c}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd880}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f75}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x194}, 0x1, 0x0, 0x0, 0x20040001}, 0x48040) 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1020, 0x0) 22:08:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_STAT(0x0, 0x2, 0x0) socket$inet(0x2, 0x3, 0x2) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, &(0x7f0000000200)=0x1, 0x8) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, 0x0, 0x0) 22:08:34 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf6', 0x0, 0x0) 22:08:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x8c', 0x0, 0x0) 22:08:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a816, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, 0x0) 22:08:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x200000000001) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000180)={0x7b, 0x0, [0x40000083, 0x0, 0x40000084], [0x187]}) 22:08:34 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010, 0x0) 22:08:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xf6', 0x0, 0x0) [ 782.104683][T19572] ISOFS: Unable to identify CD-ROM format. 22:08:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8002, 0x0) 22:08:34 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a817, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:34 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc0, 0x0) 22:08:34 executing program 0: mmap(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0xc, 0x500000000000b2, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4d8000, 0x0) connect$ax25(r0, &(0x7f0000000080)={{0x3, @bcast, 0x8}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 22:08:34 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 782.334847][T19823] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:34 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf000, 0x0) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:35 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000002c0)={0x0, 0x0}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='/dev/capi20\x00'}, 0x30) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000000140)='\xd6\x00', 0xffffffffffffffff}, 0x30) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x400, 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x400, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=@RTM_GETNSID={0x4c, 0x5a, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NETNSA_PID={0x8, 0x2, r2}, @NETNSA_FD={0x8, 0x3, r3}, @NETNSA_PID={0x8, 0x2, r4}, @NETNSA_NSID={0x8, 0x1, 0x2}, @NETNSA_NSID={0x8}, @NETNSA_FD={0x8, 0x3, r5}, @NETNSA_FD={0x8, 0x3, r6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:08:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0, 0x0) 22:08:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20f00, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1, 0xbc69}}, 0x10) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x29, 0x6, 0x0, {0x4, 0x5}}, 0x29) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1a818, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) 22:08:35 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2b) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="37d6bc23ad394306000000000000000861e05a88000a2d75009af707c4f27f5b8121efaa8facf66fa6f58d41cd930900d624df7ffa5c67c429"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 22:08:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffff, 0x0) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\xff', 0x0, 0x0) [ 782.946031][T20072] ISOFS: Unable to identify CD-ROM format. 22:08:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7ffffff2, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000, 0x0) 22:08:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x4}, 0x0, &(0x7f0000000040)={0x77359400}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0)=0xffff, 0x4) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x310a0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') sendto$unix(r0, &(0x7f00000000c0)="a6c316928c8dc27237691e9a32207d72c0229901531273dae8b971840d2d1967462ad75f0cbf8859751282934374ceb55bd9c0def4763a830ec57ce52856ef24dbe4ccb6da7f2d8539a28e090fb9bc2e849b58b5f32bce66b3acc36284e01efe0f25293ac3df792c4a26baf5cee48c72cea9adfdcf5717e428925f0f7b3697da2bd9fb86eb5fc445bc552d36409860a4212e5245fe6024bb4a0e6dad6df1", 0x9e, 0x4000040, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r1, 0x80044326, &(0x7f0000000040)=0x800) 22:08:35 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000, 0x0) 22:08:35 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:35 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7ffffff8, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:35 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='overlay\x00', 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB=',lowerdir=.:file0']) chdir(&(0x7f0000000100)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000340)=""/65, 0x397) 22:08:35 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 783.383250][T20231] ISOFS: Unable to identify CD-ROM format. 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000000, 0x0) 22:08:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x549, 0x6000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x6, 0x100000000, 0x400, 0x10001, 0x0, 0x92d}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7ffffff9, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20100000, 0x0) [ 783.608343][T20367] ISOFS: Unable to identify CD-ROM format. 22:08:36 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) write$ppp(0xffffffffffffffff, &(0x7f0000000480)="02bd5837b23d75400a04cb7b5ea61d7fa405f9edca33cf9b75bb8bfda3365b6593347d421a5f111713a2a8d6b447e1d96bc0064d41fad631fba822979405ffe04e9896178bf3d02e134e6637cc7d45d849c2e0d9d47719ce05e5d1f7fd36ae2e55f8696fcb232ba532156f1dec07f8c40fca24ab4c3cbf57e609820dda440636ddd4da71f7be3919618abdeebfffaab95b3b8dac4feb6fce2fccece745c166d8b5c6088fdc9c4492381872e9898aa1b1b572396c1660b11b1d7d82041b333809ff070899710fcddec29e3a9db82656d351c720fa1a7abea69446abc2938788de70c42f80f43d6f23ac9acd67", 0xec) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) getsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000300), 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) r2 = syz_open_dev$dspn(0x0, 0x4, 0x8000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000001c0)) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) accept$nfc_llcp(r2, &(0x7f0000000200), &(0x7f0000000180)=0x60) read(r0, &(0x7f0000000400)=""/100, 0x64) r3 = dup3(r1, r0, 0x0) ioctl$IMGETDEVINFO(r3, 0x80044944, &(0x7f0000000080)={0x3}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 22:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7ffffffb, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff, 0x0) 22:08:36 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000640)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, r0, 0x0) r1 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x6, &(0x7f0000000400)=[{&(0x7f0000000080)="c08d41b2b86a35c9dbb8fddc81dc338db392e55d2cf872da46281603c45dc8c07e8fb001216c203ea750f466a0d6110705c00ab179592acb6f3970bd6a0feb3db4b9aab450d5e1649026f07671fcaa7bc23980a778693b4701", 0x59, 0x9}, {&(0x7f0000000100)="fe095982846fccc8b5330658bcc9ec", 0xf, 0x7fff}, {&(0x7f0000000300)="ccb20488303681262204725efdab57d687011625aa60ccc843bf0678429d9ffcc679d09944e05b1624916dd87a4857a7922eabde54c5b7ffcf21cee6a1e15619b35f86d142136dbedd82e0f0a050e1772fd920eb580962c1d3693de4d9b5a10b6dcf824af581c2b7621965152cc210c44bfd9cd50f66652335c9771c4ae4ef44a60c3b56e04bb9082a0621f5bbcffa83fb23d452dda9772fefa2d8344c952a74bcaef9330ab548216067f5f265f840323ecd5073a1112b4acd53cb3250a98745a720f84422c58d9e96d064b39cff4d09c651454656ce6eaff0cff94ab1e056e385c578dd4076bc964aa4540ab5a408e20a173985daab11", 0xf7}, {&(0x7f0000000140)="e2", 0x1, 0x1}, {&(0x7f0000000180)="a3d4248e8de6d3922ba221a3111047b88ff739a497b5d2cc60b3af48e00b9be4e4da8ebfa42fcf32c17be09330aa19", 0x2f, 0x20}, {&(0x7f00000001c0)="77db43eae39e09222c6bac938453c7c0e0663fdd9a4ab1bb3fb7e59777aed52cc3b021dcd7f04370ed8b533279b91a7190cce469556e", 0x36, 0x80000000}], 0x1802800, &(0x7f0000000540)={[{@nojoliet='nojoliet'}, {@map_off='map=off'}, {@map_acorn='map=acorn'}, {@unhide='unhide'}], [{@euid_lt={'euid<', r1}}, {@fowner_lt={'fowner<', r2}}, {@fsname={'fsname', 0x3d, 'iso9660\x00'}}, {@obj_type={'obj_type', 0x3d, 'system+!em1/'}}]}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x7ffffffc, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0010000, 0x0) 22:08:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffffff1f, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0018000, 0x0) [ 784.012431][T20494] ISOFS: Unable to identify CD-ROM format. [ 784.106461][ C0] net_ratelimit: 25 callbacks suppressed [ 784.106469][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.117950][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 784.123763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.129545][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 784.135344][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.141117][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 784.266474][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.266499][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 784.272276][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 784.278007][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:08:36 executing program 0: setrlimit(0x0, 0x0) msgget(0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) r1 = socket$inet(0x2, 0x3, 0x2) getsockopt(r1, 0x0, 0xd0, 0x0, &(0x7f0000000000)) 22:08:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 22:08:36 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xc0ed0000, 0x0) 22:08:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff8880868c39d8, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0x70, 0x3, 0x0, 0x9, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x40247007, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fstat(r1, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id'}}) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$autofs(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$TIOCGETD(r5, 0x5424, &(0x7f0000000940)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0x0, 0x1, 0x80101, 0x2, 0x0, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000700)='./file0\x00') write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2a0000000000008b0100000000000000be0000000000000002000000000000000035438c000000000000000000500dfb56ebe4a7d5b5985cd381565b2a81f52768fc6918856d544f74567ec85eb3ed1f1e39ea0e175c940a0f25ea929ad54af8eead74e00a844c4f18d20214af19910f71474a8a827ffb2f3aebf195bb7c3602bd50475e6eda60052a78d0e4adb3ced845474d1fa3fffec7196f0acd1f368366226b87872b5754577c6011df25101d8a9322c1e23511944183f18e7c5cc57ca042bf60ab2b068c6dae007be8335ae669e2f585058589949c83014997f71356f45016888b66fbc8cc872ff97e9b90d9985abd4d57d025b9d9f1f4dbe6d99c24efc49cce853a987f03"], 0x2d) mount(&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYPTR64=&(0x7f0000000340)=ANY=[@ANYBLOB="70e947a0528b3e4214d13042b45d697123e42470551e6cedb0649da5074decf9fe6b68cd2df42543ecd8387974ae7f1e7c0d9b791d0b763b64b8767c9d75118dd338cd899b5683c28478c2f4dd10df161a4a53bbbdb7737cccabe4f5a90f72790810523f8e2e256197947a", @ANYPTR], @ANYRESOCT=r0, @ANYRES64=r1, @ANYRES64=r2, @ANYPTR64, @ANYRES64=r0, @ANYRESDEC=r4]], 0x0, 0x0, 0x820c01, 0x0) mount(&(0x7f00000008c0)=@md0='/dev/md0\x00', &(0x7f0000000880)='./file0\x00', &(0x7f0000000740)='bdev\x00', 0x2000023, &(0x7f0000000900)='\x8auU{-\x154\x05-\xab\xc0\xcb\x1an\xd76*5\xec2c\x9f\xcf\xb8\xb6v\x9aA\x06K\x95\xd4dx#\xf8\x90\r\xf1S\xc4\xc2\a\b\x03^\xe6b\x03\xaal)eb,z4\xc9\xe8\x11Y\xacV') mount(&(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000480)={{r6, r7/1000+10000}}, &(0x7f00000004c0)) mount(&(0x7f0000000a40)=ANY=[@ANYBLOB="3040abf7d58436d7496072d88d9fb924bf91f65251c2210ce6c33f5cf63ee466a17a37b30eb2325bbc9556b9ba20d4df40a9cb69d15d3308712819f3d2f27695155ef2b723bc4fcb5d38c46f71f14089eea8a3bb9dfa1e774fccee35dc618d63aa608e"], 0x0, 0x0, 0x80000, 0x0) r8 = dup2(0xffffffffffffffff, r0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x8e9) write$FUSE_OPEN(r8, 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) preadv(r2, 0x0, 0x0, 0x2) listen(r8, 0xb6a) ioctl$int_out(0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f00000002c0)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(0x0, &(0x7f0000000780)={{}, {0x0, 0x7530}}) close(r8) 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff, 0x0) [ 784.506831][T20648] ISOFS: Unable to identify CD-ROM format. 22:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff8880868c3b98, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xb6da) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x67) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xf13, 0xfff, 0x8001, 0x782a7b08}, {0x4, 0x20, 0x80000001, 0x4}]}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x100, 0x2c}) membarrier(0x0, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000100)) 22:08:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffff000, 0x0) 22:08:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff8880893ea038, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 784.805583][T20780] ISOFS: Unable to identify CD-ROM format. 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff8c, 0x0) 22:08:37 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x4, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000006680)=[{{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/104, 0x68}], 0x1}, 0x22f90000000}, {{&(0x7f0000000500)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/6, 0x6}, {&(0x7f00000005c0)=""/66, 0x42}], 0x2}}, {{&(0x7f0000000680)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)=""/42, 0x2a}], 0x1}, 0x9}, {{&(0x7f0000000780)=@ethernet={0x0, @local}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000000800)=""/211, 0xd3}, {&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/40, 0x28}, {&(0x7f0000001940)=""/17, 0x11}, {&(0x7f0000001980)=""/44, 0x2c}, {&(0x7f00000019c0)=""/144, 0x90}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/226, 0xe2}, {&(0x7f0000002b80)=""/223, 0xdf}], 0x9}, 0x80}, {{&(0x7f0000002d40)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002dc0)=""/4, 0x4}], 0x1, &(0x7f0000002e40)=""/51, 0x33}, 0x100}, {{&(0x7f0000002e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000005000)=[{&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)=""/169, 0xa9}, {&(0x7f0000003fc0)=""/4096, 0x1000}, {&(0x7f0000004fc0)=""/24, 0x18}], 0x4, &(0x7f0000005040)=""/182, 0xb6}, 0x7fff}, {{&(0x7f0000005100)=@alg, 0x80, &(0x7f0000006200)=[{&(0x7f0000005180)=""/102, 0x66}, {&(0x7f0000005200)=""/4096, 0x1000}], 0x2, &(0x7f0000006240)=""/206, 0xce}, 0x7fffffff}, {{&(0x7f0000006340)=@caif=@dgm, 0x80, &(0x7f00000065c0)=[{&(0x7f00000063c0)=""/3, 0x3}, {&(0x7f0000006400)=""/184, 0xb8}, {&(0x7f00000064c0)=""/241, 0xf1}], 0x3, &(0x7f0000006600)=""/99, 0x63}, 0xffffffffffffffff}], 0x8, 0x0, &(0x7f0000006880)={0x0, 0x989680}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000068c0)={@ipv4={[], [], @local}, r1}, 0x14) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") getsockopt$inet6_int(r2, 0x28, 0x0, 0x0, &(0x7f0000000000)=0xffffffffffffff75) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r3, 0x50, &(0x7f0000000040)}, 0x10) 22:08:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2, 0x0) 22:08:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffff6, 0x0) 22:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a122d8, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 785.017908][T20856] ISOFS: Unable to identify CD-ROM format. 22:08:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0, 0x0) 22:08:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2000, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x3f, "70cb31ec695b9f526816d21566ce47df5b66df95b7adaf019464d61e23677943", 0x2, 0x4, 0x0, 0xd45b380000000000, 0x4, 0x7, 0xffff, 0xcb4}) write$P9_RRENAMEAT(r0, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) 22:08:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000100)=[{0x81}, {0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x8041) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={r2, @remote, @local}, 0xc) 22:08:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0ffffffff, 0x0) 22:08:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a12498, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:37 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc000000000, 0x0) 22:08:37 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2, 0x0) 22:08:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0, 0x0) [ 785.338880][T21041] ISOFS: Unable to identify CD-ROM format. 22:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a12578, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:38 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='\x93\xac\xa9S\x00\x00\x00\x00') ioctl$VT_RELDISP(r0, 0xb701) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0ffffffff, 0x0) 22:08:38 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0, 0x0) 22:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x3f, @empty, 0x1}, {0xa, 0x4e24, 0x20, @loopback, 0x2}, 0x1, [0x8, 0x9, 0x80000000, 0x15, 0xffffffffffffffe0, 0x3499ba16, 0x20, 0x7fff]}, 0x5c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x20000, 0x0) write$P9_RREADDIR(r1, &(0x7f00000000c0)={0x122, 0x29, 0x1, {0xdd, [{{0x8, 0x4, 0x3}, 0x5000000000000000, 0x2, 0x7, './file0'}, {{0x0, 0x0, 0x4}, 0xffff, 0x0, 0x7, './file0'}, {{0x28, 0x2, 0x8}, 0x1, 0x100000001, 0x7, './file0'}, {{0x2, 0x0, 0x7}, 0x5, 0x8, 0x7, './file0'}, {{0x0, 0x1, 0x6}, 0xfffffffffffffffc, 0x5, 0x7, './file0'}, {{0x2, 0x2, 0x6}, 0x2, 0x3, 0x7, './file0'}, {{0x2, 0x3, 0x3}, 0x8, 0x81, 0x7, './file0'}, {{0x40, 0x1, 0x6}, 0x8, 0x8, 0x7, './file0'}, {{0x8, 0x4}, 0xffffffffffffff80, 0xffffffffffffb1d4, 0x7, './file0'}]}}, 0x122) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1020, 0x0) 22:08:38 executing program 0: syz_open_dev$ndb(&(0x7f00000004c0)='/dev/nbd#\x00', 0x0, 0x40000) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1414aae0000001010000000600000000000000ac1414bbac1e0001ac1414"], 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x8040ae69, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000440)=0xffffffffffffff91) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) fremovexattr(r0, 0x0) r2 = creat(0x0, 0x80) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mISDNtimer\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f00000000c0)) prctl$PR_GET_FP_MODE(0x2e) syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x100) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$tun(r3, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0xb003000000000000, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000000100)) close(r4) ioctl$int_in(0xffffffffffffffff, 0x80000080045017, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./bus\x00', 0x0, &(0x7f0000000480)='y\x00', 0x2, 0x1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) 22:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a12ab8, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffffffffffff, 0x0) 22:08:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, 0x0) 22:08:38 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0, 0x0) [ 785.761725][T21185] ISOFS: Unable to identify CD-ROM format. 22:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a12c78, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100000000000000, 0x0) 22:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x35b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0, 0x0, 0x808, 0x0) 22:08:38 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1020, 0x0) 22:08:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010, 0x0) 22:08:38 executing program 0: r0 = socket(0x1e, 0x4, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000), &(0x7f0000000040)=0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) bind$pptp(r0, &(0x7f00000004c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) 22:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0xffff888098a12d58, 0x0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000000000000, 0x0) 22:08:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc0, 0x0) 22:08:38 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, 0x0) [ 786.125027][T21320] ISOFS: Unable to identify CD-ROM format. 22:08:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="19018f000000adf92522f234921de427222d236f53fdbae1ffa2b81ef5efe080a68ca884084f5a15a1aa06ff05ca6006e9a82b25000000000000"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r1, 0x0, 0x0) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000000000000, 0x0) 22:08:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x2, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x50) clock_gettime(0x6, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x6, 0x9, 0x4, 0x20100, {r1, r2/1000+10000}, {0x3, 0x9, 0x200, 0x1, 0x8, 0x8, "6accc97d"}, 0x3, 0x5, @offset=0x20, 0x4}) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:38 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf000, 0x0) 22:08:38 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010, 0x0) 22:08:38 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010000000000000, 0x0) [ 786.404269][T21555] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x6, 0x7, 0x3000}, 0x4) setxattr$security_evm(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "80313dc1f07f230253bcc14768c93e768f343d01"}, 0x15, 0x1) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access'}}, {@cache_loose='cache=loose'}]}}) 22:08:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0, 0x0) 22:08:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc0, 0x0) 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff00000000, 0x0) [ 786.510146][T21549] ISOFS: Unable to identify CD-ROM format. 22:08:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x3, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff00000000, 0x0) 22:08:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf000, 0x0) [ 786.685062][T21591] ISOFS: Unable to identify CD-ROM format. 22:08:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffff, 0x0) 22:08:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x4, 0x2d11becdb2eef13, 0x0, 0x200000, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x616, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=@gettaction={0x214, 0x32, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x50, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x18, 0x0, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x4}, @action_gd=@TCA_ACT_TAB={0x4c, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x10, 0xf, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x19, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x18, 0x4, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0xa5a5}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x37}}]}, @action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x1f, @TCA_ACT_INDEX={0x8}}, {0x10, 0x13, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0xfa}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x286}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0xa3c}}, {0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}]}, 0x214}, 0x1, 0x0, 0x0, 0x40800}, 0x800) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x3, 0x6, 0x1}) [ 786.752783][T21604] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x7}, 0x8) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0010000, 0x0) 22:08:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000, 0x0) 22:08:39 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1000000, &(0x7f0000000400)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x1}}], [{@dont_appraise='dont_appraise'}, {@uid_eq={'uid', 0x3d, r1}}, {@fowner_gt={'fowner>', r2}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>', r3}}, {@smackfshat={'smackfshat'}}, {@obj_type={'obj_type', 0x3d, 'iso9660\x00'}}]}) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xdbb, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, r0, 0x0, 0xffffffffffffffff, 0x0) r5 = dup3(r4, r4, 0x80000) ioctl$VIDIOC_ENUMSTD(r5, 0xc0485619, &(0x7f0000000540)={0x2, 0x10000, "d1c70b6891a0613a0f3e60134a2f72e564983d1fe0608bf5", {0x10001, 0x100000000}}) fcntl$setsig(r4, 0xa, 0xc) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) [ 786.940411][T21724] sctp: [Deprecated]: syz-executor.0 (pid 21724) Use of struct sctp_assoc_value in delayed_ack socket option. [ 786.940411][T21724] Use struct sctp_sack_info instead 22:08:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0, 0x0) 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0018000, 0x0) [ 787.064379][T21733] ISOFS: Unable to identify CD-ROM format. 22:08:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000, 0x0) 22:08:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x4, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x7fff) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/btrfs-control\x00', 0x20000, 0x0) write$P9_RRENAME(r3, &(0x7f0000000b80)={0x7, 0x15, 0x1}, 0x7) r4 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000080)) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r5, 0xa, &(0x7f0000000ac0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x7, 0x1, r2, &(0x7f00000001c0)="82b140afbb62fce2dc77467bb73f426d9df6c23a2866a7efd44159109876890ee1fc240ec4bc1f9a07c7f71429c1d31d8053ce15726987e8805cee330b42c8af9210eead756af14fbe85ccc457f92ab06a5504f2653d2ed83066402def3a5eb79242c9d11e9bb89192dd9e27ecd74f0ee9b9c7cfcb02e11c2ba1248c08fcbeb45ac3ff124ed2f0d07a5da2ae5f9c23ca779c54d87f1616e03b3570ea1184369e2506f851423c851c275192ea7212e410acb9436e8bad1ba9794b1f20f823d8db", 0xc0, 0x3f, 0x0, 0x1, r4}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xf, 0x1, r4, &(0x7f00000002c0)="69044876d889c4fb53358488a23d7bd5b98b540e8043d90f", 0x18, 0x6, 0x0, 0x0, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x401, r1, &(0x7f0000000340)="c56e3883cff289b2165a7890cb156322d08b086b1e8cc0b2c68fe1bea558995d8942f94c5f42feb2871aee56bd6fce178b2b828dde3ab3123b19a07328e527ae14f1f4b08e83068ca760cf95150f2782c71d8012e095ec1730466492a4ba8baaa444ab97de9fdeb0511ce7fa55e7f961c4da63dea3361b37b884cbc48325276425f40f53d5451f52ec98e8440293abd226e4ffbc91f6e30da494d402142bbf782a0ee69d055d1aa766", 0xa9, 0x6, 0x0, 0x3, r4}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x7, 0x1ddb5a38, r1, &(0x7f0000000bc0)="3959574697745eb27e2d2605f2b6e9358637c809e7fda6f245d00a06b94c48bf920f407f654a09e7afaa555f768a62b0b2fb070d5a6e6e26ac4356d6eb2753a4629e91eeaba213a3ea9274becd8a9dcef3244ad3aeeceeacdfb619db880fbcaca1cbb2247cc6f026723c7020edcbbb1111bcf0b87fa11b409c03ddd3becbe022e4472391f1683a2b46c348f9455791d03e76cf719c5fda23790c7626124289a06876ab45ab0ba2ab0761b1ced16fb60fc750804a45365112af79e3e74a95b9", 0xbf, 0x1f, 0x0, 0x434a122d8f90637d, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x2, r4, &(0x7f0000000540)="d79dd433c67709bcec84c4f23469b550a3b47c9fef1974d760668ac1f75b4cb737aa90449bc7a8f60c9afd8ee333ac8abbead93f5070", 0x36, 0x7, 0x0, 0x1, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x7, 0x7235, r2, &(0x7f00000005c0)="30cbdce0fde006399a23549b482b1bad3b42a3c3097d9f0549358fe3766bcca78c27d1d213a67de94527e370774f1c31ee951463ca2ce4a4c217fdc304045434e0ca71afe3633bd59b8d30f8ccf72c55bf73b56e0b748e0c92c975382db4f8daa371d522a73460465a7a077e67e32cd20607d1e8e13ac600ed3ff86be5a9b9e8cbbc", 0x82, 0x8}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0x3f, r1, &(0x7f00000006c0)="aad3ec03fc5eea99f72b692bd5d697618829c87c5860dd6abcb554cb24a2a286859d4af89b7501b4f4d7b6049ca6f9b0e0177bbad0b7a8c1bcb84ae2e01ce1d0cb94cebd7e84117654373e5edb2cd0a6f8992d0ddafbf1eccccbcd3fedab0cbe9f0760467df0a2ecea2bf76b65c7782ff6db48d2a9d5b982e9927283e2570c2dccd14463fd63d4e59dbe944162a392d29a421107584b6f86d143cdd6b6485923ea3aded4f6da6d640a0c20e472ae59b4aa6a2d2261de6b482f0afc56a40f4d0340e6c759d0a9067cb835dd1822c028b7a82d0ea416cb7e34f44769b45e1dfc085b15c37d89adec", 0xe7, 0x6, 0x0, 0x1, r4}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x2000000000006, 0xffffffffffffffc0, r4, &(0x7f0000000800)="bc399673e2bf4f2366b32c0264bd41722d5c3557058ca4e14dbd73cbb269e5cf0b2316c85800d285547057f55359c0ecf64bf92b28c8b3158ae0fb76d1edb360d15ca53793610f1f66e527b98105254f5ebcce9f7728de0c6e94ddd0370140a073fba9b85092312214c10e43bcdce66d0a16c34b91822d5c23c4e62e86d916459c6179f52c6f12c58ab9b888bb1ea34dd30c6869a3dd04640758fd93f14d801a0854b60ad35f3b0efd75d75dca96203705565dbc754bc44531897f874b2b026718066b84a64482bfbd8846e4aad1d66faf50b247195483ef68b4df7900224a93b4c35bd8b7", 0xe5}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0xa, 0xda, r1, &(0x7f0000000940)="6a248c46b40adee462072737735430f24f030bab0f7448fd0a2502250cf1a2b988d63dd56c70d1b353c544b394a3abcff8620e343daa8c6d202d7f2379379ec9a317cc3fb48e75c98868b83470865b06db033940f380c90711b814bd7e630fe956e738cb4cff766df7bea64c8f611e0b2fb0fd837435d4a89a5e583c5852e721feee7a4f2d28260d04dc61e85791bf075919c3d80c8cf496564d864639a3b5c42844a7c77f0ad40b00f12ba1cb487107d4208449c10a47cc", 0xb8, 0x7f, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000000a40)="889c8fed8a5a8a", 0x7, 0x80e7, 0x0, 0x3, r4}]) dup2(r1, r2) 22:08:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffff, 0x0) [ 787.251931][T21855] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffffffffff000, 0x0) 22:08:39 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000000, 0x0) [ 787.294640][T21848] ISOFS: Unable to identify CD-ROM format. 22:08:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x3, 0xfe, "e755a9121a27514ac7fe6e99723c2166cbb7ca6f307bb610bf01c67187779daff081ad911a7f935816265c3beef9da222539f94e5401367d4077d5851d308d8110160839908ad3f25cd06e88645a872614a4feeca1a29a878669f2c4542b4fa621a4840723a6098289a4d719c5be045253e3860c920da572bb9e9afb0914cded39bfe9a4c9b207af3bfdf1feee2073ce8bb1cb4e51424eabeb89218ea48ff49aa55583c8149dedb73effceedb67fb4ab73a7fd13092fefca60e3d8092a959404871514b63ee1a627e87b3020e5fefc064e9563c17c20e942977bcedac978961391f558240c3bd00b54b7bd360ac06b78cf3cb3e833e8e37d51b623e2b350"}) 22:08:39 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000, 0x0) 22:08:39 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x6, 0xb60, 0x7}, 0x6) 22:08:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20100000, 0x0) 22:08:40 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x208000, 0x50) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x12006) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/180) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2a) pipe2(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}, 0x807fd) write$P9_RLCREATE(r3, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x48, 0x2}}}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x51}, 0xc) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000140)="420343b307087aae4f9cb8621bac90ad25e82cf2d9bd", 0x16) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) mount$bpf(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x800001, &(0x7f0000000900)=ANY=[@ANYBLOB="6d6f64653d3030303030303024f4299a3030303030303032323434322c6d6f64653d30303030303030303030303030303030303030363536322c6d6f64653d30313737373737373737373737373737373737373737342c66736e616d653d76626f786e6574b06c6f2c7569643c", @ANYRESDEC=0x0, @ANYBLOB=',fowner<', @ANYRESDEC=0x0, @ANYBLOB=',smackfsdef=ppp1nodev!#\',euid<', @ANYRESDEC=r4, @ANYBLOB=',seclabel,\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000580)={0x61aa}, &(0x7f00000000c0), &(0x7f0000000600)={0x0, 0x1c9c380}, 0x8) timer_create(0x0, 0x0, &(0x7f0000000240)=0x0) timer_settime(r5, 0x0, 0x0, 0x0) ioctl$BLKIOMIN(r2, 0x1278, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 22:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8, 0x202000) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/21) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x3}, &(0x7f0000000140)=0x8) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x4000000000000000, 0x0) execveat(r0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='()user\x00', &(0x7f0000000080)='\x00', &(0x7f0000000140)='9p\x00', &(0x7f00000001c0)=',}\x00', &(0x7f0000000200)='-$selinux\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='9p\x00', &(0x7f0000000300)='9p\x00', &(0x7f0000000340)='/dev/radio#\x00'], 0x100) 22:08:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x5, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000, 0x0) 22:08:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff, 0x0) [ 787.722909][T21993] ISOFS: Unable to identify CD-ROM format. [ 787.729740][T22050] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0xba, 0xe9, &(0x7f0000000340)="a09f9a42adf196c59a2ffead7475adfc96f9236a4c3c9c5c4b55e13f5f12ba4b40c84254288379a8dbf66eba28e07f42bbe12fbaf1e8f33b8f24e1dbb8711d2859dd50fb2d0908c4fe7c14ff55ea67d0ed3ebebf467d2e960d6fc6b12476bd20492c5c9d32b949e34a3b508dc5519312917774e86a1e4122e72f51f921542975b39893cbafe1ce0ea397eb404471c7dff8bde46e032db5a4b7630b75439533d78f756a8c8bc8c6f62b49913e9af3e39f16a0063c9f7522ffe23d", &(0x7f0000000400)=""/233, 0x4}, 0x28) accept$alg(r0, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x0, 0x380000000, 0x0, 0x5}]}) read$eventfd(r0, &(0x7f0000000040), 0x8) flock(r0, 0x8) r1 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)="f947c2d33ebfafcf288253a0458ecc26261b6595d22a33ac497ecc50a206eb8a0f47baad2523a460152cf8df04260fa5d49c415de15d6a36ca543d2ca170d8ae37b428eb626eccc4eae6392a9ca0af668db23fa7734c3cd1ffdda1abc2b9ba1de0abc54f80884b7f87093254c688134445f2efa32a6dd228aa654f4349a0285c0f06df8852a19703906dd80c854f2f95b02d91331abd89ab80b5bd7b819ccdb00ee6c07bdc3e45f642a13fa078", 0xad, 0xfffffffffffffff8) keyctl$update(0x2, r1, &(0x7f0000000680)="355214ef3c1537b6a23da69e94afa3d05074ec761ec05f08230ae46b6f8e83f5d2b09899caae9c0f066068841ce0ecdc11fd860537afb5436631267f1edef6466d4ff0230059895ffe78473f59dcff530e45ebacecf8c24118c3fd7540fad629abe8ce0e98bcf245d98408af1922c01ad43e006534c3c1fc58c52def63c803e08efadaa82d04faf7c7b1553fb31732df3f0495c1e363d4e2c73b7738a6c0d224a7d3778287b97e00e2ba46eaa904846204b294c3751686c6ee7ee3105313e19c70950dd6ffe342b3e4e0359c95c1", 0xce) r2 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) accept$alg(r2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={r3, 0xd1d3, 0x4}, &(0x7f00000002c0)=0x8) 22:08:40 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x6, 0x2000) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000000c0)={[{0x5, 0x299, 0x101, 0xffffffff7fffffff, 0xdb75, 0x4, 0x0, 0x88, 0x3e, 0x0, 0xa860, 0x7fffffff, 0x40}, {0x1ff, 0x6, 0x8, 0x80000001, 0x1, 0x101, 0x80000001, 0xcb3, 0x1, 0x7f, 0x4f68, 0x4, 0xff}, {0x10001, 0x5, 0x531, 0x1, 0x6, 0x6, 0x8001, 0x7, 0x101, 0x2, 0x4, 0xfffffffffffffffe, 0x4000000000000000}]}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="c6") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000600), 0x4) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @remote}, 0xfffffffffffffea4) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000003c0)={0x5084f74d, {}, {0x2, 0x0, @remote}, {0x2, 0x4e21, @broadcast}, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0xcf39, 0x80000001, 0x244}) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r3 = syz_open_dev$dmmidi(&(0x7f0000000800)='/dev/dmmidi#\x00', 0x3, 0x20000) geteuid() getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) connect$bt_rfcomm(r3, &(0x7f0000000b80)={0x1f, {0x6, 0x20, 0x5, 0x117912bd, 0x4, 0x8}, 0xf7}, 0xa) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000440), &(0x7f0000000480)=0x40) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000100)={{0x0, @rand_addr, 0x0, 0x0, 'lc\x00', 0x0, 0x0, 0x59}, {@multicast1, 0x4e21, 0x0, 0x8}}, 0x44) getpeername$inet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000001) fallocate(r2, 0x1, 0xffffffff, 0x4) futex(&(0x7f0000000000), 0x4, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x0) shmget(0x2, 0x1000, 0x54000400, &(0x7f00002e6000/0x1000)=nil) r4 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r4, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000640)={0x0, 0x0, 0x4, 0x0, [], [{0x80000000, 0x1, 0x3, 0x0, 0x1, 0x1}, {0x4, 0x5, 0x40, 0x100000000, 0xfffffffffffffeff, 0x2}], [[], [], [], []]}) 22:08:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000000, 0x0) 22:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='\x00', 0x0, 0x141, 0x0, 0x8100d, 0x0) 22:08:40 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f00000000c0)="7084e8e3a567a83d4a5fd34a701c63342658ff2058b8128a1750c30b08a0810cc16e355d9a6c691fb3bd929b117c113a696e280c337e9cfdaa5a0be0be20e119ddf44933e3caeefb28da790049c6a223ed9caec403644d7722c5e632c9d1ecf65394e17edcb0896b0395808b4c6e7b12d512", 0x72) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000140)=0x9) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xfedf, 0x0, 0xfffffffff7ffffff, 0x0) 22:08:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="18000000004000002000002100000004000600"], 0x18}}, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0010000, 0x0) 22:08:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20100000, 0x0) 22:08:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x6, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:40 executing program 0: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x80000019) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x65}) ptrace$setopts(0x4206, r0, 0x6, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 788.132140][T22242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:40 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x100) 22:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 22:08:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0018000, 0x0) 22:08:40 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff, 0x0) 22:08:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200001, 0x0) bind$tipc(r1, &(0x7f00000000c0)=@name={0x1e, 0x2, 0x3, {{0x42, 0x3}, 0x2}}, 0x10) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/37) 22:08:40 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xc0ed0000, 0x0) [ 788.384115][T22242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) 22:08:41 executing program 0: getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, &(0x7f0000000440)=0x80) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000480)={'hsr0\x00', {0x2, 0x4e24, @empty}}) syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) mount$9p_unix(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./bus\x00', &(0x7f0000000240)='9p\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x200) sendmsg(0xffffffffffffffff, 0x0, 0x4000000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, &(0x7f0000000500)) ioctl$RTC_VL_CLR(r1, 0x7014) r3 = add_key(&(0x7f0000000280)='.dead\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000540)="bd3752df1f3956f0cf8c3331868621f5aed857787fe2176caa933f98c422c65046b5bf0c8bfd0156dc14715ab238b4e9cf289311648744ed06489298a8f9f46dd814f1a2353929c3a1aa19425b82583441e2a0f9257604b3dc2d65a4302c47a7e267aa7380b32aea9b0eec4ae769cbd0790d3b6fc1ae1ed5f8be3e1ee5d1a1a5b2330492d1ce4eef7b725858cb9307cf1df870278e1cb88e0077eb1dae11e64c508cb967341c91", 0xa7, 0xfffffffffffffff8) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000900)=[{&(0x7f00000019c0)="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", 0x1000}, {&(0x7f0000000600)="10b20b6dd3318754e31ee39a8eb7bf28d360a09e80d8e2f53a380086ff16e3d88b9b59e27fe8e6b70196ec884e6877af437ba6980e0b84c886533f7c6915860cfb441d880c5b1a18e691e05cb135297f00998fc84171e12e6f461ecdf2b2be8e16c36a00d01e2ee2741161b35039db84013783f1ae915684777b", 0x7a}, {&(0x7f0000000680)="98e741f56169d08d992728f1deebe904a1c3cbfa023a53ece8dcb30b45e4d34967cef29ad52ae0ef54e81f1c33dc5cc24686dc275d5f8ac3fae7cabb512cbf5058356f74c5f56de48de6d519127bfeaff2c27ce246f662b9a051b0ac4e59be529f9744a5c0b783f60e34bd881bd4cfb123da3d38bb3b7ccaa700a3a8d226458a29564242c134e2bfcdf1eba1f4dda843879272015701b717c9c0a1089a3144fe1150832e6b56535267e90747d6", 0xad}, {&(0x7f0000000740)="8359af83f77eac750915282aa2a2f62d5fbc7a30dcb3d91fc15d37076854ed4724a4444447109869ede95b1fc28a364115e38f12ac8ed08e0b0e7a34a003a3bcaa58ff6f2f370e4fc55f8d5ac831b19e2d2cf3c522b8d21920d50a07e835fc2d48", 0x61}, {&(0x7f0000000840)="8d266ef4dec61bc3790af0edf4b282513c4d030e6c9101a257191fa49b1050cec1c6ce008ddcd8e3fca9cb29b27091f77934f8bbe068eaa4cf1fbe8615cf6b0e419db2ce2cc3183e2960557605856e084e56eb60b10cb7c0bbd01139a7f3ed99abda1210b4e7ad79a4a40e46dbff7beb4184a86b0729fb9f9dfeed5a4d792e62bfa0478c9d2b", 0x86}], 0x5, r4) fchdir(r1) socket(0x5, 0x6, 0x70) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) unlink(&(0x7f00000002c0)='./bus\x00') mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) sendfile(r2, r2, &(0x7f00000000c0), 0x808100000000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000001140)=ANY=[@ANYBLOB="9feb0100180000000000000030000000480000000000000067c4ce35914c1d41cbe5aa428d5a9ea050c2ceb7770189c9ee58d95c908cb9db427303337a4a8f2b3d5eaec018830926a98a49a878"], 0x0, 0x4d}, 0x20) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 22:08:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0010000, 0x0) 22:08:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0/../file0\x00', 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) mount$9p_fd(0x0, &(0x7f0000001440)='./file0/../file0\x00', &(0x7f0000001480)='9p\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000000)={0x4, 0xfffffffffffffdec, 0x9, 0xb5, &(0x7f0000000140)=""/181, 0x1000, &(0x7f00000003c0)=""/4096, 0xfb, &(0x7f0000000280)=""/251}) pselect6(0x40, &(0x7f0000000080)={0x8, 0x1d, 0x7, 0x962d, 0x7, 0x0, 0x2, 0xffff}, &(0x7f0000000200)={0x41f89efc, 0x5, 0x10000, 0x401, 0x3, 0x1, 0x9, 0x3}, &(0x7f00000013c0)={0x0, 0x965, 0x5, 0xf182, 0x81, 0x0, 0x40}, &(0x7f0000001400)={0x0, 0x989680}, &(0x7f0000001500)={&(0x7f00000014c0), 0x8}) [ 788.580058][T22382] ISOFS: Unable to identify CD-ROM format. [ 788.597301][T22386] 9pnet_virtio: no channels available for device ./file1 22:08:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x7, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff, 0x0) 22:08:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x200, 0x408100) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306, @broadcast}, 0x20, {0x2, 0x4e20, @remote}, 'hwsim0\x00'}) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0018000, 0x0) 22:08:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x402, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000040)={0xb9, 0x0, 0x2, 'queue0\x00', 0x4f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:41 executing program 0: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x66) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaac0efaa000000001190780054db81034000e000000100004e2100"], 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000280)={0x3, 0x800, 0x3, {0x5, @raw_data="72c97a6ae28a1265e066695acd566d57c5cc78122b4cf655b5f62a1264f63ad17f7143a143d33d6417fda58f1978089a8dc3c48cc967f9d303e055006655ccb727d94bcc47a353d1e44ccc5c4e4590bceef3582d84d5727344883ac0d75e9e3e3bff88207178066441a1509dfc66f97efab6647c54bdf5d60c25fb783c6c83b6aa86692d8805d4cdfff797a1df58213f7a1e142245e4305a4ae1ef628cdbae66a00cf807ccad8a934b67ab475b2a3e846c2246069d769178481f09408885144f06da1a7488bf0c5d"}}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000080)={{0x48b1, 0x8}, 'port1\x00', 0x14, 0x1, 0x9, 0x9, 0x100000001, 0x5, 0x5, 0x0, 0x2, 0x5}) [ 788.818974][T22513] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='bpf\x00', 0x200000, &(0x7f0000000140)={[{@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0xffffffffffff1a64}}], [{@smackfshat={'smackfshat', 0x3d, '\\,\xcetrusted}&md5sum{'}}, {@permit_directio='permit_directio'}]}) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffff000, 0x0) [ 788.865631][T22510] ISOFS: Unable to identify CD-ROM format. 22:08:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xc0ed0000, 0x0) 22:08:41 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x40) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f0000000000)={0x35}) 22:08:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="ffc0"], 0x2) sendfile(r1, r2, &(0x7f0000d83ff8), 0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) 22:08:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x101000) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000080)={0x0, 0x619a0b8e}) [ 789.223926][T22513] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 789.263881][T22680] ISOFS: Unable to identify CD-ROM format. 22:08:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x8, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:41 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff8c, 0x0) 22:08:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff, 0x0) 22:08:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x180, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000680)={{0x7, @addr=0x10001}, 0x8, 0x1000, 0x2}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000004c0)=0xe8) r5 = getuid() mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x80000, &(0x7f0000000500)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@msize={'msize'}}, {@access_client='access=client'}, {@loose='loose'}, {@access_user='access=user'}, {@msize={'msize', 0x3d, 0x32}}, {@noextend='noextend'}], [{@uid_gt={'uid>', r1}}, {@appraise='appraise'}, {@subj_user={'subj_user'}}, {@uid_eq={'uid', 0x3d, r3}}, {@subj_user={'subj_user', 0x3d, '/dev/radio#\x00'}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt={'uid<', r5}}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@subj_user={'subj_user', 0x3d, 'ppp1!'}}]}}) syz_open_dev$radio(&(0x7f0000000640)='/dev/radio#\x00', 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:41 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200200, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect(r0, &(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) [ 789.420315][T22781] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 789.438369][T22680] ISOFS: Unable to identify CD-ROM format. 22:08:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffff6, 0x0) 22:08:42 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffff000, 0x0) 22:08:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e24, 0x1f, @ipv4={[], [], @broadcast}, 0xc39}}, [0x80000000, 0x4, 0x64a, 0x100, 0x3, 0x2, 0xff, 0x30d, 0x10001, 0xffffffffffffffff, 0x1ff, 0x4, 0x2, 0x4, 0x9]}, &(0x7f0000000040)=0x100) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e22, 0x1, @empty, 0xd73d}}, 0x2f, 0x8, 0x1, 0xc16e, 0x22}, 0x98) alarm(0xa8) statx(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x400, &(0x7f0000000380)) 22:08:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x40003) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in, @in6}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) pwritev(r0, &(0x7f00000004c0)=[{&(0x7f0000000400)="de892a1172a9957f35306680f5c6b6fa9b9ef1a952e801f7de7cb7997847b11631ce0356f5077a1734704dd23885493129e8aa0e0651a1616cefe8d77507706380e4", 0x42}, {&(0x7f0000000580)="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", 0x1000}], 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480), 0x0) fremovexattr(0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) mbind(&(0x7f0000654000/0x1000)=nil, 0x1000, 0x1, &(0x7f0000000000)=0x9, 0x400000000000, 0x7) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000280), &(0x7f0000000080)=0x60) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000200)=']\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x40000, &(0x7f0000000380)={'trans=virtio,', {[{@uname={'uname', 0x3d, '!vmnet1GPLem0eth1)nodev'}}, {@msize={'msize', 0x3d, 0x400000000}}, {@posixacl='posixacl'}], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@audit='audit'}]}}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x2000000000002) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000001580)=0xc) ptrace$setregset(0x4205, r3, 0x202, &(0x7f00000025c0)={&(0x7f00000015c0)="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", 0x1000}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x40, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 22:08:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x200, 0x3294, 0x0, 0x8, 0x5, 0x1000, 0x1, 0x7, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r2, 0x4) syz_mount_image$iso9660(&(0x7f0000000200)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x10, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:42 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff8c, 0x0) 22:08:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0ffffffff, 0x0) 22:08:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$ndb(&(0x7f0000000540)='/dev/nbd#\x00', 0x0, 0x8900) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x7, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="73182f65187050095acee216274cfbf3d5b2ab06b93bae15178d02a3cd4b95a249be255ea86e68609e4ca88a208d0b0209f54d2fa0c90b1a7cde1b0819f4624810b423b82c508d6e99efedd68d627d0a5056072389e2585d8512a0e7ea5445afbf3a9b2aa503436d0ce8c84db948d44dcae52560af864eea112af5e57aa5921ac3d6e25f06f082733cbbffb6955530cebdaf013b4ab3ad0d4117bd53f83e01250c9330aae9948ae9c88cbef151ff1278546dc005509a1898cad955dc9219ad", 0xbf, 0x7f}, {&(0x7f0000000280)="d078271626ef0504e212e227b1b33ff821a118451d8d42a4d1b05d08cc691fcc6100ab30e57c0599ab70f2018db5cc3d208462fe497235c3f3508dd758b16bc34c3590350cdbe5411dec68d1", 0x4c, 0x433}, {&(0x7f00000003c0)="15ac1bdab5c3ffa3155f3f6a1e41c762cdbcae7f8d5a20ade2f08a76e9a0a8c13c27257352a35f9eef83fd76c9eb3b9b9283f369ea5ed13a20fe5755dba341ae0057b3646b30308802de0f603b868b5e70239e1c8bb2d9ed981ba7871e9f9428e414403e45d847c6ad5f7d36da6204c82bf1d4632b2cdc2c639554d530f8526b883b154a4cbf1b8076e6eec3a6f0bab09dae405ca7d4a6c3fab15aeda906175f3d627d6c50f7124eb0b5bf2cfb7a0457a1", 0xb1, 0xff}], 0x2800002, &(0x7f00000000c0)='^\x00') lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) [ 789.805768][T22902] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 789.837601][T22892] ISOFS: Unable to identify CD-ROM format. 22:08:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc000000000, 0x0) 22:08:42 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffff6, 0x0) [ 790.022685][T22914] ISOFS: Unable to identify CD-ROM format. 22:08:42 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x80000, 0xfffffffffffffffe) r2 = dup(r1) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e21, @local}, 0xffffffffffffffd9) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000002e80)=0x214, 0x4) sendto$inet(r2, &(0x7f0000000200)="96", 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x800, 0x0) 22:08:42 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000000c0)={0x10001, 0x4, 0x7, {}, 0x800, 0x401}) r0 = open(&(0x7f0000000180)='./file0\x00', 0x200, 0x8) write$P9_RLINK(r0, &(0x7f00000001c0)={0x7, 0x47, 0x1}, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x42000, 0x0) syncfs(r0) 22:08:42 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1a0ffffffff, 0x0) 22:08:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @remote, 0x7ff}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="20000000000000008400000002000000000006000000000000b1eb00", @ANYRES32=0x0], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)}], 0x1, 0x0) 22:08:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0ffffffff, 0x0) 22:08:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x30, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCNXCL(r0, 0x540d) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:42 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc000000000, 0x0) [ 790.300543][T23004] ISOFS: Unable to identify CD-ROM format. 22:08:42 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffffffffffff, 0x0) [ 790.346483][ C0] net_ratelimit: 26 callbacks suppressed [ 790.346491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.357968][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.358070][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.369548][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.375379][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.381176][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 790.485575][T23044] ISOFS: Unable to identify CD-ROM format. [ 790.506454][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.506486][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.512267][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 790.523746][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:08:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100000000000000, 0x0) 22:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8001a0ffffffff, 0x0) 22:08:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x100000001, 0x204) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0xd69, 0x1, 0x7, 0x5, 0x3, 0x100000000, 0x401], 0x7, 0x80, 0x6, 0x80, 0xfffffffffffffafb, 0x7fff, {0x401, 0x401, 0x6, 0x401, 0x5, 0x7, 0xfffffffffffffff8, 0x400, 0x140000000000, 0x8001, 0x0, 0xf43, 0xfffffffffffffffd, 0x3, "d373ef000cf390857791af791e249bcbd5d0a78d8557fef3977c813094a62cc5"}}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) prctl$PR_CAPBSET_DROP(0x18, 0x4) getgroups(0x1, &(0x7f00000000c0)=[0xee01]) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x9c, 0x0, 0x20000, 0x0) 22:08:43 executing program 0: move_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000200)=[0x1000000001], 0xfffffffffffffffd, 0x0) 22:08:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="53672f7a77bbc44ef3e88088ce702f6f", 0x10) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000000)=0x1, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="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") syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000000000000, 0x0) 22:08:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20001) fcntl$setlease(r1, 0x400, 0x3) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040)=@fragment={0x0, 0x0, 0xd94, 0x3, 0x0, 0x0, 0x67}, 0x8) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @local}, {0x2, 0x4e23, @rand_addr=0x1000}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x715b1ac7ff06776a, 0x0, 0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100)='teql0\x00', 0x8, 0x9, 0x5}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="010001000000000088b070") unshare(0x44010000) r2 = socket$isdn_base(0x22, 0x3, 0x0) bind$isdn_base(r2, &(0x7f0000000080), 0x6) 22:08:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x48, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf0ffffffffffff, 0x0) 22:08:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) fstat(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x5f, 0x5, &(0x7f0000000480)=[{&(0x7f0000000140)="d72451978f6271374b3743019e600402ccb473125802ee5ee0da836f808634e7fa84017ae5ad1726f89a8a702d7aab06470ff7451b0badc3aa903767f4c3bd5a180c00692d0b4a563ca8572c3939bcb48cfe89d0122489d32282356799ab6b7739df3951e9ef862873932410d519342dbd62d52b0d313389a722b97dfebfbfff603ee957ee6e06c2f4a8b0a287a66c289ff7ee6fb4220c7ab4731c66a756fe4f36ad6e", 0xa3, 0x56ac3164}, {&(0x7f0000000280)="71348835fe53d039eafd99caf97f157c4c44a73dfb66205f539269caa848382a47abf1512c0af13e61b81f6d704247e3497db9a525016ee9fccf7e10bbd115c20bf923d758a59a51d607b74939013679cb976bf026a4b94c97760156e1783b0335b9a9bd1d082f76806c060ba9f60a19958f697096b915dfc682042eccbc13fa163383cad33954fad4f8fcafe46039964545333b5977f256c0ced171c96c308206e805915eb2a09be7aaffcd965dfbb2f3a890b41e57aa1730d82f3b59a4c5fbfb9146df93d36a61e18a1d1279763af38c86e6fa15db14cae1f3ab11eb3abbdc444b522ba989349da775e190", 0xec, 0xfffffffffffff50d}, {&(0x7f00000000c0)="038469ac81f7ae3d85f605d3b03b5769542cbe96d35d20d9633ed01a76a1597cfa76e74b382a9dd203d4825bde2cb08a1fd8c821c904", 0x36, 0x7f}, {&(0x7f00000003c0)="0bdd84ee3333349d02fedb0394d1e37089b5b26fd386e6aabd079e829ca731b9fd7b7cc95ec281b454eb75774ed2af280f6f2f1448605f0524c3b92596c702542244c8ee5ee71acb5fd2c1c594d46c1b6f0d332db27ea5878061edfeb30b9944", 0x60, 0x8}, {&(0x7f00000007c0)="251f0a5727061c7e223a6b9e0c57281a1512bc33e1439a000000000000000000", 0x20, 0x8}], 0x80000d, &(0x7f0000000640)=ANY=[@ANYBLOB='r,uid=\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB="2c6465636f6d706f73652c736d61636b66736861743d766d6e65743170726f638b2c646f6e745f686173682c657569643d", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r1, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYRES32=r2, @ANYRES64=r3], @ANYRES32=r3, @ANYRESHEX=r3, @ANYRES16=r1], @ANYBLOB=',\x00']) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f00000006c0)={0xf000, 0x6000, 0xa000, 0x1, 0x1000}) 22:08:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x44) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x800000023, &(0x7f00000002c0)='b', 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x32) fcntl$setstatus(r0, 0x4, 0x42803) socketpair(0x11, 0x5, 0x4, &(0x7f0000000000)) 22:08:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000000000000, 0x0) 22:08:43 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@security={'security\x00', 0xe, 0x4, 0x380, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x4, &(0x7f0000000000), {[{{@ip={@rand_addr=0x80000001, @dev={0xac, 0x14, 0x14, 0x24}, 0xffffffff, 0xff, 'bridge_slave_1\x00', 'bcsh0\x00', {0xff}, {0xff}, 0x5c, 0x3, 0x10}, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xc, 0x9, 0x5}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x2, 0x8e, 0x2}, {0x1, 0x1, 0x2}, 0x0, 0x800}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x19}, @dev={0xac, 0x14, 0x14, 0x1e}, 0x0, 0x0, 'nr0\x00', 'nlmon0\x00', {0xff}, {}, 0x5e, 0x3, 0x1}, 0x0, 0x98, 0xc0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0x0, 0x100, 0x138, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xb, 0x7, 0x2, 0x1}}, @common=@set={0x40, 'set\x00', 0x0, {{0x4, [0x7fffffff, 0x3a6f, 0x9b66, 0x7f, 0x800, 0x1f4], 0x8, 0x5}}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3f, 0x0, 0x9}, {0x4, 0x9, 0x7}, {0x7ff, 0x473, 0x10001}, 0x20000, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e0) getpgrp(0xffffffffffffffff) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 22:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100000000000000, 0x0) 22:08:43 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) socket$bt_hidp(0x1f, 0x3, 0x6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 791.114400][ T26] audit: type=1804 audit(1552169323.645:211): pid=23323 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir533346970/syzkaller.6WMh2D/1468/bus" dev="sda1" ino=17393 res=1 22:08:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010000000000000, 0x0) 22:08:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$TIOCNOTTY(r0, 0x5422) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:43 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000000000000, 0x0) 22:08:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x4c, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:43 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff00000000, 0x0) 22:08:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x622, &(0x7f0000000300)=[0xee01, r2]) fchownat(r0, &(0x7f0000000200)='./file0\x00', r1, r3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000340)={0x0, 0x4, 0x4, [], &(0x7f00000002c0)=0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0xffffffff00000001}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:nodev 000000000000057'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 22:08:44 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') [ 791.439637][T23449] __nla_parse: 3 callbacks suppressed [ 791.439646][T23449] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) readahead(r0, 0xfffffffffffffff8, 0x50) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000d0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000019c0)={0x20}, 0x1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001880)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001a00)={r5, @local, @remote}, 0xc) fdatasync(r0) ioctl$int_in(r0, 0x0, 0x0) getpgrp(0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000200)={@mcast2, 0x62, r6}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f0000000280), 0x4) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x401, 0x400000) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0xff) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x30, r2, 0x710, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x4, 0x3e98, 0x848}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x8001) ioctl$DRM_IOCTL_IRQ_BUSID(r3, 0xc0106403, &(0x7f0000000040)={0x8879, 0x800, 0x8000, 0x7}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000180)) fcntl$dupfd(r3, 0x4, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2012, r4, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x20000, 0x0) unshare(0x40000000) socket$packet(0x11, 0x3, 0x300) 22:08:46 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000000000000, 0x0) 22:08:46 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff00000000, 0x0) 22:08:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x9, 0x10000) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x40, 0xc9b, [], &(0x7f00000000c0)={0x990a6a, 0x8, [], @p_u8=&(0x7f0000000040)=0x77b}}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") syz_emit_ethernet(0x3a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaa2aaaaaaaaaaaaaaaa000800460001c21c0180000000000000141453f2e60be0a951ccf0a4edcee80f52f6824279e15315bf7b00ac8800000e00907800000000000000"], 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x87, 0x800) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x7fff, 0x8) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$sndseq(r2, &(0x7f0000000380)=[{0x5, 0x5c, 0x4, 0x7ff, @time={r3, r4+30000000}, {0x7f, 0x800}, {0x2595, 0x8}, @ext={0x8a, &(0x7f00000002c0)="c44ed132939e919545804658ffab36229dddd5d96e92d0a10f4462cb52f645c8c6844b7a33f9d7e6a6d4088ad4ce6a28ed72bbdc551254a51d98c8c17751cecb16e2221960d3dd17541bdba2c63ac09ce30928de199a623ab395474d9040f41783dbc8ae642edc8fd14458779fe511e0ee44fee95be7e9377140f3343a5be43404b3c165b89f16e941a6"}}, {0x9, 0x7ff, 0x0, 0x5, @tick=0x20, {0x80, 0x2da}, {0x1, 0x1f}, @ext={0x2f, &(0x7f00000001c0)="c4cc7ef82b3861df46c0104b04411ae88fa2fd2119cec4df8e92f4571d5b283433af57751d103d521a0ff1aaae5281"}}, {0x7, 0xb792, 0x100, 0x6, @time, {0x7fffffff, 0x800}, {0x5, 0x9}, @raw32={[0x1, 0x5, 0x9]}}], 0x90) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000000c0)={0x34, 0x0, &(0x7f0000000080)}) 22:08:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x60, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 794.054066][T23578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:46 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) recvfrom(r0, &(0x7f00000000c0)=""/60, 0x3c, 0x2022, &(0x7f0000000140)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000040)=0x4) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000000)={0x57, 0x7, 0x0, {0x4, 0x45}, {0x7f, 0xfff}, @ramp={0x9, 0x7f, {0xfffffffffffffff7, 0x7f, 0x1, 0x3}}}) 22:08:46 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0010000, 0x0) 22:08:46 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010000000000000, 0x0) 22:08:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) symlink(0x0, &(0x7f0000000040)='./file0\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001c40)={0x0, 0xfffffffffffffffc}, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x800000080011, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in6=@remote, 0x4e22, 0x4, 0x4e24, 0x8, 0xfac0ed27e1a3b8ba, 0x20, 0xa0, 0x21, r5, r6}, {0x8, 0x800, 0x1, 0x10000, 0x100000001, 0x8, 0x26, 0x9}, {0x4, 0x0, 0x6a0, 0x7ec}, 0xfc19, 0x6e6bbd, 0x0, 0x1, 0x1, 0x2}, {{@in=@dev={0xac, 0x14, 0x14, 0x17}, 0x4d4}, 0x2, @in6=@ipv4={[], [], @local}, 0x3507, 0x0, 0x0, 0x8001, 0x44, 0x2}}, 0xe8) getresuid(0x0, 0x0, 0x0) [ 794.204906][T23688] IPVS: ftp: loaded support on port[0] = 21 22:08:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x12) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) 22:08:46 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff00000000, 0x0) [ 794.479846][T23633] IPVS: ftp: loaded support on port[0] = 21 22:08:47 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x208000, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000040)={0x3d, 0x6, 0x0, {0x6, 0x6, 0x14, 0x0, 'vmnet1&#wlan1!$wlan1'}}, 0x3d) r1 = socket(0x10, 0x802, 0x0) write(r1, &(0x7f0000000180)="240000001a0025f0006bb404feff141c020b5aff6e10b500001180cc08000200ac141410", 0x24) 22:08:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0018000, 0x0) 22:08:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x200000000) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0xc000) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f00000000c0)=0x4e1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000040)={0x0, 0x7fff}) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)={0x0, @speck128, 0x0, "5c50546e97be4cba"}) 22:08:47 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff00000000, 0x0) 22:08:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x68, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:47 executing program 5: r0 = gettid() clock_nanosleep(0x0, 0x1, &(0x7f00000000c0)={0x77359400}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) wait4(r0, &(0x7f0000000000), 0x80000000, &(0x7f0000000100)) syz_extract_tcp_res(&(0x7f0000000040), 0x7fffffff, 0xcb) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000014) 22:08:47 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0010000, 0x0) 22:08:47 executing program 0: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={r2, 0x20, "99661ec4cb4136def3ef1dfb3ae58b1073a43a70a794d06890021f009a8b6b76"}, &(0x7f00000001c0)=0x28) ptrace$cont(0x1f, r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000140)) [ 794.769196][T23863] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffffffffff000, 0x0) 22:08:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x18000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="9f42", &(0x7f0000000040)="03209b2a563679b07808f72613a9d53dea3bfd35a8f54063e8adab24fc1bbc73d200"}, 0x20) fstat(r0, &(0x7f0000000280)) 22:08:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x7, 0x10) socket$inet6_sctp(0xa, 0x5, 0x84) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="6f733200282923007deb78173ba588276938e2e60fa73aafae0a404a3d9728592f92392d4a2db550414d94b752ae9f54ac0252c39fbe4b3c1a579708be9a81f1fc819947f077878e48"], &(0x7f0000000100)=""/34, 0x22) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d00810fe00f80ecdb4cb9d96b63190400000000000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) 22:08:47 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffffffa0018000, 0x0) 22:08:47 executing program 0: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x10}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 22:08:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) fstatfs(r0, &(0x7f0000000280)=""/227) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x104003, 0x0) 22:08:47 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x7f, 0x20, 0xfffffffffffffffb, 0x2, 0x0, 0x2b, 0x4, 0x1, 0x100000001, 0xcf, 0xfffffffffffffff9, 0x3, 0xe803, 0x4, 0xffff, 0x1, 0x1, 0x1ff, 0x1000, 0x0, 0x1ff, 0x81, 0x81, 0x2, 0x2, 0x1ff, 0x8, 0x6, 0xfd, 0x5, 0xc37, 0x0, 0x6, 0x100000001, 0x7, 0x8, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000040), 0x5}, 0x240, 0x658, 0x9, 0x0, 0x3168, 0x8, 0x3}, 0x0, 0xe, r0, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000140)={{0x36, 0x5}, 'port0\x00', 0x2, 0x40, 0x3, 0x0, 0x8, 0x1, 0xad9, 0x0, 0x3, 0x4f}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:47 executing program 5: mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='yeah\x00', 0xfffffffffffffd58) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffe0000002010000000a0000007f000001ac1414bbe0000001ac145553631856613a14bb7f020001ac1e010180000000ac1414aaace46dc523f90d8bf34f07ff877a26242e56d495853bcb78a34695987a703e734e87bdecea8188d263c2c0cba0c12881ff17a26721f7ed163b26525b5be2bd133af620ecf58cc9bacf363e7c2fb3df6035fef76f207f41791b53dd8c42"], 0x38) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000280)={0x6, 0xa97ef6accaa4db42, 0x4, 0xa0200102, {r4, r5/1000+10000}, {0x3, 0xc, 0x4, 0x4, 0x401, 0x8001, "ca3a9737"}, 0x3, 0x3, @fd=r0, 0x4}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x10) 22:08:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x6c, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:47 executing program 0: r0 = geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$admmidi(&(0x7f00000004c0)='/dev/admmidi#\x00', 0xc1, 0x400) fchown(r2, r0, r1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in=@empty, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x102) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_NEW_CTX(r4, 0x40086425, &(0x7f0000000400)={r5, 0x2}) ioctl$KVM_SET_VAPIC_ADDR(r4, 0x4008ae93, &(0x7f0000000500)=0x1001) r6 = geteuid() setresuid(r3, r0, r6) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140), 0x4) ioctl$PPPIOCSACTIVE(r4, 0x40107446, &(0x7f0000000480)={0x2, &(0x7f0000000440)=[{0x33f, 0x1, 0x80000000, 0x9c}, {0x7, 0x1194, 0x78, 0x8}]}) 22:08:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000000)=0x1ff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:47 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffffffffff000, 0x0) [ 795.259510][T24074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:47 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40002) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x3, 0x9, 0x4, 0x9, 0x4, 0x0, 0x80000001, 0x8000, 0x11e8, 0x3, 0x2}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x1ff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xfffffffffffffffd) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) unlink(&(0x7f0000000180)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) recvfrom$x25(r0, &(0x7f00000000c0)=""/141, 0x8d, 0x40000000, &(0x7f0000000300)={0x9, @remote={[], 0x0}}, 0x12) ioctl$TIOCSTI(r0, 0x5412, 0x9) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) 22:08:48 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x4889, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400, 0x0) 22:08:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r2, 0x0, 0x100000000000005, &(0x7f0000000000)=0x7, 0x4) close(r1) lseek(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x2) 22:08:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = dup3(r0, r0, 0x80000) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000040)="7da4886089aaab613a265a08a4c317f9", 0x10) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x8201, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r1, 0x1c, 0x0, @ib={0x1b, 0xfffffffffffffffa, 0xffff, {"8d0183638d8090a752eee05ccd5929d3"}, 0x100, 0x3, 0x7}}}, 0xa0) unlinkat(r0, &(0x7f0000000180)='./file1\x00', 0x200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x200000000000000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x74, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 795.847191][T24270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:48 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20080, 0x0) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000380)={[{0xe}]}) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000240)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}) 22:08:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) fcntl$notify(r0, 0x402, 0x8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000005d40)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000880)=@newlink={0x50, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x4, @mcast1={0xff, 0x1, [0xc, 0xf0ffff]}}]}}}, @IFLA_MASTER={0x8, 0xa, 0x33e0}]}, 0x50}}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x22) fcntl$setstatus(r0, 0x4, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10200, 0x40) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x2, 0x400}, 'port0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 0x8, 0x800, 0x5, 0x8, 0x4, 0x7, 0xcd7, 0x0, 0x5, 0x1000000000000003}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x2, 0x0) sendto(r0, &(0x7f00000001c0)="0254bb482e7652752c1b94b201abd701913b9ecd5795f64dcecf752564a3b8fa0dc081c0e48ac7044d29b7fa0f2f8f544b1cc85f94c05c0fedcccb07ecc52b9aca16e751105ab400", 0x48, 0x0, &(0x7f0000000240)=@vsock={0x28, 0x0, 0xffffffff}, 0x80) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000180)={0xb4, 0x100000001, 0x2fed}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'sit0\x00', 0x1100}) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xa2, &(0x7f00000000c0)=ANY=[@ANYBLOB="7525820aedb8aaaaaaaaaabb080501002fa526279aae19f3177159abda453e8f7771e01f52cc4200bd677dd66b2605ee195c7da4fcc17e184b59a88f59993d2fad68c2fb0273ab36c9fb7ba5a22905983d9c4c6cf05d126d6b968f87e6adcfa05d84361ed5f4b20eaf1cdaac5627ddf913a8b499eff53f2393b3f3d66fcf840cd60344770bc478e5cb18ff6781cfd35f1ba22904086e7b6d554a3fe589dd273f9af2"], 0x0) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x120, 0x0, 0x0, 0x0, 0xffffffffffffff1b}}], 0x400000000000082, 0x200000000000005e, 0x0) 22:08:48 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x7a, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 796.197643][T24326] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 796.247580][T24333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getitimer(0x0, &(0x7f00000000c0)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) ioctl$RTC_AIE_OFF(r1, 0x7002) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:48 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='team_slave_0\x00', 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:49 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x501000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x1, 0x4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:49 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x600000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x0) read$eventfd(r0, &(0x7f00000000c0), 0x8) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x4, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000003c0)=""/4096) 22:08:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="73000000ff00000009000000069b0ae5fcb6586ee5484ecf84c60a3652f870e9b3fcb51b1dbe02f29697e9d0c2bc1742b72d840aa6e25c9b4c0af90cdc6807fb0058fdeee7d7c7b2f3a4078daf837f890c53b8e3bc2949e9d3ce610528daddab38f40514d33fdc2f9207c3d00bd2739f0a953a941ccf64"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0xd, 0x2, 0x3ff) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)) ppoll(&(0x7f0000000100)=[{r2, 0x40}, {r1, 0x8}, {r2, 0x201}, {r2, 0x1282}, {r2, 0x10}, {r3, 0x200}, {r3, 0xa0}], 0x7, &(0x7f0000000180), &(0x7f00000001c0)={0x9395}, 0x8) write(r3, &(0x7f0000000140)="1f0000000209fffffd3b54c007110000f30501000b000200000003000000cf", 0x1f) fdatasync(r0) [ 796.503311][T24334] device sit0 entered promiscuous mode 22:08:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', 'GPLvboxnet1+\\prockeyringtrusted\x00'}, &(0x7f0000000040)='/dev/radio#\x00', 0xc, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 796.586444][ C0] net_ratelimit: 24 callbacks suppressed [ 796.586452][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.597958][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.603766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.609563][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.615368][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.621164][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:08:49 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1f, 0x482e80) write$capi20_data(r0, &(0x7f00000003c0)={{0x10, 0x8, 0xff, 0x82, 0x7, 0x1ff}, 0x30, "00562d378447e9768d1d848d6e6d7b6abae832b59a86f558363d7c02b96d777b8aaddfeec79f55414c5242e131cd4e44"}, 0x42) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042bbd7000fedbdf250400000020001976f2d66626b5db070008000200050000000c000400000000000000000008000200d60000005149b83fe16d866b2d94cd569504eb5a227c8343ed015667188765f7e959ee9a80049285cace87800957f3af23af86e3ce766ba556b899fba2dea8ec1e36670ec0ed2dbbbdf316de6afab03341ebf8933e75df9cb4ba887cca23a9c077978e920dca5f74"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20004800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:49 executing program 0: syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0xe28, 0x0, &(0x7f0000000100), 0x40000000000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) fsetxattr$security_smack_transmute(r1, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x3) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x1, 0x800) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000100)=""/6) [ 796.746467][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.746498][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 796.752282][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.758078][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 796.848656][T24421] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 797.424409][T24586] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:50 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) prctl$PR_SET_FP_MODE(0x2d, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0) 22:08:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$packet(0x11, 0xffffffffffffffff, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980), 0x0, 0x0, 0xfffffffffffffe03}, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f00000001c0)="8392cd30912ac0fb172f868a570b6f0d3ddf63dc7c904e9b6706027315becb57fc97e7930adde93d271ba3d7daa4744ce2db0a86d4846e2c96cfd2c103822454951befab4b2f0dca93d4a993563f7e772a606fa9d3c00ec1d0c2910f958001fa4459ab", 0x63}, {&(0x7f0000000000)="cc", 0x1}, {&(0x7f0000000240)="c6ef57ef7f49266b3c84b35467371107cb03d4658b199ef998eb1b1e7c4c6ff08fda09026e58e7e65b7caf49d0054cdfc2ff8a8f9e3d3f00349aa26f78a413ee9a60ace436aa0355294b3b28fdf4be2315a735827b0bad935288b39ec50ba4dc2c1a081a0a6f63585798d935ceef2409606bd6b240be2ea2328b1b65ef5e911acc3921aeb26bbe459f715f03419cf765d4638fa4b0498977837c8fd4861d5afdefa1c1438f44d91dd73f5c485c1fe3b0d5f6025ec10c789d3f737c46bcbaa5b19b6f0b17c34bf3a7e68ac0d12d1091ec8ea972e58a70033a4a", 0xd9}, {&(0x7f00000000c0)="53f2f2a00524ba736cd7514a360d6a4d21a4627ca46b4f6d8135a4ae6a168c30d4be", 0x22}, {&(0x7f0000000780)="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", 0x1000}], 0x5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000002c0)=ANY=[]) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') symlink(0x0, 0x0) 22:08:50 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f00000003c0)={0x80}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40, 0x0) sendmsg$tipc(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x2, {{0x611ac4cd54c6d894, 0x1}, 0x4}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000100)="38a3fe8c82899d0fba1f00454d004ced24935bef1b711f661feaf4a51e67cd2b513bf12e309e38988c6fbcfe0e2e07daf54b7ff6c0bb8780ebc8d14adcb8e626738441058fbd555cb59457eb5bb9f15f2f3c07c5a34b2a4560ff66115a", 0x5d}], 0x1, &(0x7f0000000280)="4bf1cfa499c4230c1256d6afee0176c9ba5595103e8bcd9cd81cb81255c463e591d9eb4441cf0e024c5ca573783c6b8d3caa633ea56d8bcf9358e76ce476f33f6133baca1d69140b564c345c5216cea4989b4c0b9527f3fc601aafc06907f6e64f397663e5c4765eaf31ef24da46ac8ff409e1864ffdd9c7bb8f363b769428b4fe2324622ae10118beaef012ab225060c3c2", 0x92, 0x20000010}, 0x20000000) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x1) fcntl$getownex(r1, 0x10, &(0x7f0000000400)={0x0, 0x0}) ptrace$poke(0x4, r2, &(0x7f0000000440), 0x9fe) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x2, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 797.530381][T24592] QAT: Invalid ioctl [ 797.593087][T24592] QAT: Invalid ioctl 22:08:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0xf0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:50 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x42) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$FS_IOC_FSGETXATTR(r0, 0x8008550e, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0bdbe}) 22:08:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$9p_xen(&(0x7f0000000000)='9p\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=xen,mmap,uid=', @ANYRESDEC=r0, @ANYBLOB=',dont_appraise,uid=', @ANYRESDEC=r1, @ANYBLOB="2c04"]) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) fstat(r2, &(0x7f0000000300)) 22:08:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000005d40)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000880)=@newlink={0x50, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x4, @mcast1={0xff, 0x1, [0xc, 0xf0ffff]}}]}}}, @IFLA_MASTER={0x8, 0xa, 0x33e0}]}, 0x50}}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x22) fcntl$setstatus(r0, 0x4, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:50 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) getpeername(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000040)=0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:50 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 797.714301][T24614] 9pnet: Could not find request transport: xen 22:08:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) write$P9_RVERSION(r0, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0xdf6, 0x6, '9P2000'}, 0x13) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000fa0307041dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000005304ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) sched_rr_get_interval(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) sendmsg$rds(r0, &(0x7f0000001a40)={&(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10, &(0x7f0000001500)=[{&(0x7f0000000080)}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/168, 0xa8}, {&(0x7f0000001200)=""/21, 0x15}, {&(0x7f0000001340)=""/171, 0xab}, {&(0x7f0000001240)=""/18, 0x12}, {&(0x7f0000001400)=""/233, 0xe9}, {&(0x7f0000001280)=""/63, 0x3f}], 0x8, &(0x7f0000001800)=[@rdma_dest={0x18, 0x114, 0x2, {0xfffffffffffffff9, 0x1}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x8d3}, @mask_fadd={0x58, 0x114, 0x8, {{0x80000001, 0x100000001}, &(0x7f0000001580)=0x7, &(0x7f00000015c0)=0x7, 0x7, 0x7fffffff, 0x7, 0x1ff, 0x10, 0x2}}, @mask_fadd={0x58, 0x114, 0x8, {{0x2, 0x1}, &(0x7f0000001600)=0x8, &(0x7f0000001640)=0x63b, 0xfffffffffffffff9, 0x10000, 0x2, 0xfffffffffffffff7, 0x2, 0x8}}, @mask_fadd={0x58, 0x114, 0x8, {{0x5, 0x91}, &(0x7f0000001680)=0xfffffffffffffff7, &(0x7f00000016c0)=0x3, 0x7, 0x4, 0x9, 0x4, 0x1, 0x4}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x8}, &(0x7f0000001700)=0x100, &(0x7f0000001740)=0x1, 0x0, 0xd7e, 0x20, 0x8, 0x39, 0xc0}}, @fadd={0x58, 0x114, 0x6, {{0x1}, &(0x7f0000001780)=0x7fffffff, &(0x7f00000017c0)=0x800, 0x10000, 0x10000, 0xee, 0xffffffffffff0001, 0x4, 0x3ff}}, @rdma_dest={0x18, 0x114, 0x2, {0xfffffffffffffffd, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x78}], 0x218, 0x20000041}, 0x811) syz_open_dev$usbmon(0x0, 0xfffffffffffffff8, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') preadv(r3, &(0x7f0000000480), 0x1000000000000214, 0x0) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000080)={r3, 0x0, 0x64ca, 0x1}) 22:08:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x20, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x3, @loopback, 0x8}}, 0x1, 0x3, 0x6861, 0xcb7, 0x100}, &(0x7f0000000040)=0x98) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="000000005c5691cda2"], 0x8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000300)=0x2, 0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000340)={r1, 0x3ff}, &(0x7f00000002c0)=0x8) [ 797.778890][T24717] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 797.804990][T24715] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 22:08:50 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x801) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140)=0x3, 0x4) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x5) 22:08:50 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='bpf\x00', 0x101082, &(0x7f0000000280)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x2f}}, {@mode={'mode', 0x3d, 0x7ff}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) connect$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:50 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0xfffffffffffffffc) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x3, 0x7, 0x4, 0xffffffffffffffbd, 0x4, 0x1}) 22:08:50 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x1a0, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) syz_init_net_socket$netrom(0x6, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0x40) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000280)="dc828b60e7be8f7cf36e43602888719956c4de16e7c108dab312186d5d05532b3e6d978612d4b883edae8d1a713529e9fc279afe4c0c0b792d8da2ab1edd192f363b6ce49c8cbce2efbb050ad5c433d0ddef54588b25d329ff598e41e655051d60ff7cbcb31353df16938746790aedd30de466161b2a8f8e8ef55f5c2e78bd79fc36d861ea7f166f0524b35d040327efa4ea9529895d4267e9ad960d6b57386b127926c26d221d41ad4da3e263ef488213851a322abefeb2318031f2a109723ea087c81d871523008241a8") 22:08:50 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2000000000, 0x4040) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x2466}) socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x220, 0x0, 0x0, 0x10000007a) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x200000486]}) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x300, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f00000001c0)={0x3, @bcast, r6}) 22:08:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x87, 0x440400) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/109) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x40186f40, 0x73fffc) 22:08:50 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x6, 0x8}, 'port0\x00', 0x10, 0x8, 0x6, 0x7920000000, 0x834, 0x1, 0x4f77, 0x0, 0x4, 0x3ff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$TCSBRK(r1, 0x5409, 0x8001) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x10000, 0x0) 22:08:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x14, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r1]}, 0x8c) write(r1, &(0x7f0000000040)="c9cf9541", 0x4) 22:08:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) [ 798.385179][T24857] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8000000) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000003c0)={0x0, 0x1, 0x11, 0x2, 0x1000}) r1 = dup2(r0, r0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x100, 0x10000, 0xb4, &(0x7f0000000140)="230cf921ccab519c7dd081ebda880bfce39fe6a5a16c6ad02d7b0bd6a01b301b3b1d314932b86cf959d20e5d080aef6c5ee223ee605d990293db04ad4a5fdf42dde119dedc1c35e3566dac4aa6cee2e6b27b3552afcf85f3dfe1f97ae3063070c07c6676a451da167eba8f2172af1ccf2ccd4014f672bdf475fbd49dcd8eba9fba580ee7678a82116faacf9d488f8f1a85ff2fd907cd186f01b48263048b1079dfcb2a405e79ee9fa4051f2a42a51cca45e7c8d9"}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="00000000efea420badf0da8c71d73c2d35bcf9fc5b81072d3ba0b7e8f56fda0950fafa21534a024726685372a26cfb6ab00cf02c975a7ab383b0ca07a42065adfe8cdf520a98b0dca0b255acac40cefc2d9a37da00000000003bb4816bfeebb5f24dadf01a01bce3ed5bad2e0389fafb6df2001d5e45e1456bee077c9404614ea2001e18011e48b3582168e8ed3a93d7", @ANYRES16=r2, @ANYBLOB="0800000000000000df251a00b49cd1b6e0eb9b220000000c00140693d885797a3100ffc45b72753ab61b33e0770a6ecde2e3e4f7333f49992050a786c0c37b98960c1cba402efbced0eff7d54c9d7e56e18d64dadd231e5eb7dcbbd22f3c600fb01aac2fad95d9fe6ce29d2316e26d711d4300ddc4adf08275b9775ab5915cf6ddc00000a3b4913880edad439c85e0272b49c9a4ad6cefa924dab27d6eb8eef83d342e87123a3ab5e888b328510941423d79a7ed8cb7421e02ef1748"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8010) r3 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$KVM_SET_BOOT_CPU_ID(r3, 0xae78, &(0x7f0000000040)) 22:08:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xab7, 0x40) bind$tipc(r0, &(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e21}}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0x27c) close(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x2, r2}], {0x4, 0x7}, [{0x8, 0x1, r3}, {0x8, 0x5, r4}], {0x10, 0x5}, {0x20, 0x2}}, 0x44, 0x3) r5 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r5, 0xc0405602, &(0x7f0000000680)={0x5, 0xb, 0x2, "106f096d43ece375cdd622ef8c6c52efa44e1c6117391cd3e6130a1a33a39e1e", 0x7a323159}) 22:08:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x100000000, 0x200) syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) pipe2(&(0x7f0000000200), 0x800) r0 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0xfffffffffffffffb, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x40000000003ff) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 22:08:51 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x4}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={r4, 0x1}, &(0x7f0000000100)=0x8) connect$inet6(r0, &(0x7f0000000000), 0x1c) sendto$inet6(r0, &(0x7f0000000200)="354edb4c010d58e84b7ea1c1cc16a8716d6da5a800f6a20363916459d4b319dcbef5985e96df85bb", 0x28, 0x800, 0x0, 0xfffffd0f) [ 798.630311][T24981] (unnamed net_device) (uninitialized): option lp_interval: invalid value (18446744073709551615) 22:08:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) [ 798.672835][T24981] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 22:08:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x300, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@gettfilter={0x2c, 0x2e, 0x601, 0x70bd2b, 0x25dfdbfc, {0x0, r1, {0x1, 0xffff}, {0xfff1, 0xb}, {0xc, 0x1}}, [{0x8, 0xb, 0x3f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 798.721890][T24992] (unnamed net_device) (uninitialized): option lp_interval: invalid value (18446744073709551615) 22:08:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x10, r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x93f) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x501080, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d0d1710d", @ANYRES16=r2, @ANYBLOB="02002bbd7000fddbdf250600000030000500080001006962000008000100756470001c0002000800020000000000080001001000000008000400000000001400020008000100050000000800010003000000b4000100100001007564703a73797a3000000000080003000900000044000200080001000b0000000800030000000000080002000700000008000300030000000800020034000000080001001e00000008000400ffff000008000400f8ffffff38000400200001000a004e220000000013fac76ccbc6d2dc067a0d04e3e6007c0ca1e6491400020002004e24ffffffff000000000000000008000300000000000c000200080003000000000008000300060000001c0004000c00010073797a31000000000c00010073797a310000000014000200080001000000000008000100ff03000040000600080001000600000008000100bc0000000400020008000100070000000800010009000000040002000800010002000000040002000800010006000000680005002c00020008000200010000000800010006000000080004008000000008000200a80200000800030042070000240002000800010001000000080003006d95576e08000300ffffffff080004001bd200000800010069620000080001006574680004000200"], 0x1e4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) r3 = syz_open_dev$radio(&(0x7f0000000600)='/dev/radio#\x00', 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r3, 0x0, 0xc, &(0x7f0000000000)='/dev/radio#\x00'}, 0x30) r5 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x8, 0x0) futimesat(r5, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)={{}, {0x0, 0x2710}}) ioprio_set$pid(0x3, r4, 0x2) [ 798.813980][T24992] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 22:08:51 executing program 5: getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380), 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$evdev(0x0, 0x20, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000180), &(0x7f00000000c0)=0x60) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x272bbd9859ca12b2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000340)={r0, &(0x7f00000003c0)="baee9110f85aab2190d8520a21f0d335199a88b45555e02028fe5e3c38971d31e0a7e8283e328e620c566d72f2e6e4b87ca73de0252659de8e05480ad6655635fd0682d7d45500f5fa538af2f5ca7d467b7680486f76", &(0x7f0000000500)=""/4096}, 0x18) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) r3 = request_key(&(0x7f0000000480)='rxrpc_s\x00', &(0x7f0000001500)={'syz', 0x2}, &(0x7f0000001540)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0xfffffffffffffffd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001580)={0x0, 0x0}, &(0x7f00000015c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) keyctl$chown(0x4, r3, r4, r5) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f0000000300)={0x1, {0x77359400}, 0x7, 0x2}) setpriority(0x2, 0x0, 0x10002) umount2(&(0x7f0000000200)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) socket(0x0, 0x4, 0x8000) r6 = syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xfffffffffffffff7) r7 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x200, 0x10000) write$selinux_attr(r7, &(0x7f0000000440)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27) sendfile(r1, r6, 0x0, 0x22000400000000) 22:08:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 798.866806][T25048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0xfffffffffffffffc, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x1110c0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000004c0)=0xe8) mount$9p_xen(&(0x7f0000000000)='wlan0securityvmnet1eth1#\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x10000, &(0x7f0000000500)={'trans=xen,', {[{@privport='privport'}], [{@uid_lt={'uid<', r2}}, {@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r3}}, {@subj_user={'subj_user', 0x3d, '-wlan0ppp0$+cpuset'}}, {@measure='measure'}]}}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:51 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) fsetxattr(r0, &(0x7f0000000100)=@known='security.selinux\x00', &(0x7f0000000140)='\x00', 0x1, 0x0) 22:08:51 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 799.055021][T25121] 9pnet: Could not find request transport: xen [ 799.085414][T25123] 9pnet: Could not find request transport: xen 22:08:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f00000006c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={0x3367}, &(0x7f0000000140), &(0x7f00000000c0)={r0, r1+10000000}, 0x8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$btrfs(&(0x7f00000001c0)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x1ff, 0x3, &(0x7f0000000480)=[{&(0x7f00000002c0)="cd22ae4c297412db7f930e8243ba82ff51b3f00f695ff0d5fa481338a477745d37294d587719bf02174290d2662dbc384ca67bdacece1cb084d070b96d74a2a3c584f8fc60e8c40a0fb54019fe41b360af603a1f758c45e6ed229f3c214d8b827d165d4909f6419b9d27dc79ae5f5d80039abf1c7fa6e309da2f98bd73f489eb2e79bb9a6de9a35fcb2551b7e6727717", 0x90, 0x2}, {&(0x7f0000000380)="4130601562a10a31d6ed8f6fd20f91b018936b06133e64606047dd467c41281aef88e0994412516126df7b5107362fd2", 0x30, 0xd8db}, {&(0x7f00000003c0)="33779f92f0dbfb88b28f8eb26490aa0e7627bde3fb1f57617767e761e5b1f653a238ba84794f42de8c451bbd38b2bc9a5ad5fa86ce62c71e08cc3eb278cb79fc58a65ec88fcdf80e0fd6d8425073f5fb49e2d70e5eaa509cc401278d947a7f5a489ebcddbbbfa42649ab8232384c726bf94a2ef9199b255c320c7bbf9c56c6421a1526cf", 0x84, 0xffffffffffff2560}], 0x28, &(0x7f00000005c0)={[{@compress_algo={'compress', 0x3d, 'no'}}, {@compress_force_algo={'compress-force', 0x3d, 'no'}}, {@discard='discard'}, {@nodatacow='nodatacow'}, {@compress_force='compress-force'}, {@space_cache='space_cache'}], [{@measure='measure'}, {@euid_lt={'euid<', r2}}, {@dont_measure='dont_measure'}, {@appraise='appraise'}, {@dont_measure='dont_measure'}, {@fsname={'fsname', 0x3d, '/dev/ptmx\x00'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'w/!]'}}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}]}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x500, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:51 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x84000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x252f, 0x0) r2 = inotify_init() ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000040)={0x80000000, 0x9, 0x5f42a097}) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d8de6c02aa9801aef518ef821dc49d241f0ad56688892d93d1de641e1f351bf8f162e704044233fd7be4a311a579a2523434d347993f6c89ff796588861d1ceefc4a78f69ebea70413e71860cf5706de5b0d7a8a89db04f94db26", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0xb, 0x1c, "bbb561d57338dc67e0a768b626049df71799c0c4f6b8d3ccec1b7d9636b2c518a35db764ba233f0d1290dabb5d5913433f5cc1117a5bd0529a9f8f30a43169bb", "4c8e3f8c19479fabdf0f7cf710b59e977a6d65384b39930b68baa1e4ea731fec", [0x7fff, 0x3f]}) ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f0000000340)={0x4d}) 22:08:51 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r0, 0x7, 0x2}, 0x14) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x680bce18, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000100)="2287a0af1287c0f50a40c3daacc607b1f156030ed6246d0257045eab82041ac440849e0177b9fbfda0e163987d329cdbed32b369a83a41fbc26d451cd80d109e556862c2a596d898f44f5e790849209651e5226186988738e4c0992ca9fbb00555ed144194d4495e478066da7d8521fc075afe5524d50bb7187f6c7c3602db25e44f203a42d77d037180ffa2531bdd63acf02e83685d7b282e676b3af1c48bab762c884c7c36a7c0cb") 22:08:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:anacron_exec_t:s0\x00', 0x24, 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000000)={0x80000000}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 799.323657][T25247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 799.412990][T25254] 9pnet: Insufficient options for proto=fd [ 799.441734][T25289] 9pnet: Insufficient options for proto=fd 22:08:52 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1000, 0x80401) r0 = perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 22:08:52 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x9ffd, 0x4) 22:08:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x4, 0x0) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000140)={{0x2, 0x4e24, @multicast2}, {0x306, @dev={[], 0x13}}, 0x6, {0x2, 0x4e23, @remote}, 'veth0_to_bond\x00'}) 22:08:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x10}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) 22:08:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x280602, 0x0) fchmodat(r1, &(0x7f0000000380)='./file0\x00', 0x10) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x1, 0x2) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0x1, &(0x7f00000000c0)=[{&(0x7f00000003c0)="18f7c517b21a4a4d038099ebf252af89ffbe4a3595c0321f6e755b394bc5bf0f4226a619b02902380d7d150a31ed99462a330620cedf7c9a4f1a3effdaae067601410e7a6dac01b5663b8d5d4309fc62252662a988708735e3813761c3806f0052b3713c6b0bf9bc5a345e7ec15f5e0fc1c343581d6b8f6e8996476f8349ad345f6c329dc0c7312b2ed5248822c5206ecf67c1ddcb9395822206bf446457e836225ec8d3451a94434d6815f08cdb6923c0d304563783a67c847ee114d2315cf5703b916417962e1d1545d33af65cdeea73bb00621226f347222b30c38362747c11bd2df0e0d3506a524b9dbc431a25493fc465a44e4b013ca6de047e4baf8180140d5006e6e58f10e59af6660a9ede867cab51eb8b91dc795ef6864ba531c9fb8e4dd949ec1a01906ceae6c7babe6a3b0c98e63cf340cc2b859c7d28da88f4025350b5c4b87ccc605e332361cee16d3abad9ea872c3d716891615eebdbba9b51d42e24bcc3ad431fad5a0e9bb1e4574236c9a52f70cf2d14e1ccc4801ba2a7e230a99d099c59a6a9cd930209886e90a8a949f1c9bf4a57b9da79193360f2687b5aa30f053be4561c23d741650742d59ba0308d5573fa4d7e7cb8ca31c374dc37ad88abf029d25b349ad037188ac05b0f218fb6eda81f60d5b245c898cb0c7d9b35fc2fdc012b05153afba6a87511bb6ba781d0af79a34c4bed14e484b30fac0cac42b9c10b6a2f1770d12a541b7a2946d6d0fd9f8b32d5aee9a3cf0eb5776ba2e4ef7dd339fd1448bf0df36c9f4c91484455f0121582d4381db92392a9171bb9d4d9c442b1c394bb8bb5cacb9221802e6c462d802025c2476a715a15662c3a86327ff09ca1778b75e82b4d503d8b439b101f63b97df6ccb29509935a6070f39a68dde3555872083a91f7d7f56eb5e9d11537c96be819f3f5c30b93dcb88fe492eab8c45e76c000bdf468d75c3c5d558da2bc4c9775c31a399e5a3905e67642274f126cf8616db6a8b2da368b9121849dfbf0e0c95bb840e5cbe13fbb6238f4ba7b532d77b4da4a8faad7ceeb5eec7b4c03f7dafa6f97ad281cf9400a005e48deca705416ca0ee699b4030571601d326ce0b199f145b2e7b39652e5fc8678709a8168341436ba50eaf4bcdec56b9361df5de4518ffa2c443774f0d077cf13c9a2067245d1e565ec2683ba7567acce615b7d3a7d138db2003a9a9034157b13a1953bbc4d1366b036a8e261d765b445b3b632836b7c2e7ef0ea6b6f76f2820686d2e8e96950d47e86389c7bd04d18cbac00324f19d696249d8dd70f1fb17e62b73d21cbfb82e8b4795129e76d61bd25ca9e6bd43ff09ce828921f5353b216d8af2abbc6790f44b8e2c793acf5eaea3db878f1f441dcc88e819874765a522e3803b54799f97d2301620e79cdeac829f2e09d046c1decc20c932408c30b2edec667d6f012fc16dfc5b4d1ff5e5e474cd5fae90e57c6c810188c62527e34c8e53d55dff48ca1c3c3a0e78284cd6a6fbce187922a3855dd33968f022fbd55a9d2e92f97dc8cc053ba00427e331a9846888b7f7123d722bf7432b0d93b683f297658db0e9d37fb897ebdca710bc4e45090a5597866395cd9463b5e1f4bb16f8cdc1fe797a6af57a47943c7b0f75fdb163f134fcb27d9fc7ed2a8b6a3f1c00d7965348480daf791ca9a2adf2943a2dbb1d2ff9024844f4c1ba7abfce4c384fcd38ef8acfd1e5c71e167275d10bd6ca3913d5a73bf491f80f605106a78d02706565addd72156d44a9a4fd0c9128f4b6cc907180919ed1105e29617f725190ca9a2580e85ca56c8cb94acc3ca888de020478c33540a933ca972d9f9fe522b396445bd8ffd49fb7a4f2735c7c03e3d880ac5ea6ada50d0d555fd7c0486b264c389cca7b09c02e657b00ab77e263adafda8b4954e36328eb68730ea68285e77732499a5d06949e178edeccd5bcc65dc40d9a046a8c5bbbf3628403c667160c3f1c06bc8013fdbe19a4d9293962653dc2a77db203efe447cf73e51d1bd7b3ba0c7d6ab2a09b6563d6daae2e3becf3a5d6627ba48c68f02ba580a1f7d9a657ab977b856c57495cce1d163b3ccde53df459be9b01841afde808ad9a05f5811c980345f2698c42c5ca9b26f54748b4807f3a1751f2207de0a716faae0bfed5da122affdea2bbf552be5e893ed970f69210d876d67c822adf19f95b9677cd555eadbe092371f3b5e10d00c4cee2bbcc192ff21244e837608ee3e3d5717b6b75f35b598da39feed2021eaca5279ffde12ff7f4e8cb2be884ea06f044372174aa32efde52c877bfd2426458bcd67f69e3928bcd6bb716e9fb978a0a841fe0559be1ee31109bfdd9c88b94761faece123e8f52e2d617c4d4f946914377881292399551032d34ac44fd5dad13c4af951133cae55390e5f36a97bd92d5f2c1f1494970aa29d8f9e1323d42c39b5e289dc470b713e9ec749fb1eedfb053daba9ef2afd9e90b527c5d0ffd8558ed82e52e3260808285b4a9f3ae88f5435a53142fc2a2f3ac7011bda54a787b9020239450b9f16a043fd60d0eabce3d97a31043b9894f32ca5095afb5f751fcb4d1076218edae613567e72d09193faa730500251fe963492ba06787e2c5b985ec288d8a6e780caee812161e25107070d32eface890f7032c0b29f1e4c14453a4683a98f035e1d2300f1e2db8bad007b862effea760f5f16561201b79006be9b5f3f0cf77c5c698fba6eed7f329b8ed598e9c5e76f067d54cb8b7f9092ce9527ac1c4412fff4f5d7352b8e66998fa826491596d35627a72b32179d2b32fa0f35c521a4cf97ae1f9744b7c3dd647d8de946362f61eef4da7ce62fe0a8f4b3aface9653d03f3f157ed9c808904804ce44544dcd2a00105e62a9d0ff0774a9f03ecdc1e0871500cb648ca0efbc63a1e3a941110d21b6df7019d018fb5326447f89c4abdde5d019eb7338c78eba733d0e53a05526b0d679a0a36648b6a50b94bef0a35aa0a576dd479e28332f269b860a6609cd6d6997944521ec9d7e0c8da2a633ecf5c6dc44f8fa1811b37990ba066e35f23921a115c68bccad11a1554df319e0d8c4aedd29632287f187856f9ff0095a27f34a08852e25fb4d938127d5e14adad723e0165e540367559b456ab8927a89c17f05365979a37e5b597e3f6267bd20c8ef5ec063d49ca22e8addeb4153e91894059318515339ffdd85543b1b72cf9225f55d4ed842d742d6fcc47b57dfdfa40e050ed5f962d86a8e0c9c525498d9a8159197c77c134c0db7e2df5e3d1e24ca6b2ceeff9ca998d6072a308dcf86760fe3f7f396fefeebe1576ee0454f44327a8f025686d4fb168a04edef548a731663e279847994fd82a9ccc29356dff4241325498ce2a1a10c8165294e0a7a420dc3680c07b37437abe665e9fe4ef64a867fae1efa0174d8eb26bd1b0e75ef2f263a8303b04230efac9f222c8372e7e0eec11129c600dcc098b441f700049bfa88671db0cbf1f005f8137d6ff46478dde8570cc6d0c9a755582f727e8d292cfce51ef2fb17f56c3b4cd38d798637fa326f7583b7ed052158c501034fa556ebad3d9e0b84d40ade18ec34a6cb5c4765d35f2821c254d33e401723fb8ef5cea740315a65d2473dd549c04cbd47f306eb4f1a3e396effcd29f685ff2f31b5928ede11811c8679e87a7da30c21846706d4a8640a7345ee12854ba6ba4356786f90893f0010e3d296c6e979f0530c7e385859b76ab0afa38489f25f2b79cbc907ffd033f1d505d1a1e26d05992254e6b2ab5deb4fd5752ebe93e4507bfe613d249375d34b2b8b03cb1a604c24ee4cd582b2fd83c690aab386bcd09212e7d9d18f06a5d0921bb1ce3ddd245ec0e8711d9b8aa66092358b1963853527e4b1fb7b82061f10d44dd3a314c1a16d69e2eb0e47309a32d858149d2cbbf807f9e42fcfd42a141347393194176943e0b78989be4546f4076592568d5a38031339c827f33129afad374c02d8b22841a76cbf40f8ae6022caf2d96a09a0b778c71ba63c87556da86fe22d982f62a1c598b48a0c1cf6e677f6a586af9fcb3cb37d819276bf8379a43b8a00d193c7545d8e7cb608d1d04f6f2e4d061eb8ccf99f5408fcef5fd3d03201cdfc48761f98d5ff170d582a0726239a9e1ec3056e4b7b430dc352e2b538216dce47c90b2cbd7ec5a8eadea68c69c5ef624d8112d7c731ea5012dea160f5c8616540152348843e7a5ed57b2fb1832bb8f6dba89370deeaa5c4ea367b97dd986ac99e3d3e8e9a301c8cceb04a71cc8c9fbef247d417edadc82b84f161fd7756d5b5db0957cd1c68982a2668a1b6b419d52571003171d801f822ae898e5a3fcf5c25155d477d60301791a9bd8c6b0e1107bafd1ccb7f0781711aeb4c6a25ab4541bdeef16076dc034b55952d738288dd1df29a1b9e51bb67c79c04306208a4231602295ab97ee328e8234ceebe2556d8cd5d4c55a4d1076c818a0aacd6791180c994204e5b8d15b9ec124feff64a22eb703b3cfb16a0151ed52e49c3ebb8e537a4b62597ab80ebee8865912b59b65e9d2ce01436db9178633909fe634e3616a9c600452018d9c140223d5d9016fab9ad331215e39aac3be36af32a9e822e81b61c8dfcad4976dde383c819d0e826f5c8e83f3eccfcd172ebab1bed0bd5dee79fd8ca4af613ef7839d1b7775a7313fbfb1d655f8f90139eae7b8003f7f7a85b85abf1d63f3d0f9536c2e093cc241800a06192b02fc1ccb38715c98c243f938a1fe6548da0308c2075ea5405f9949ac0dd1e9ad18b1e1c6fe3fd2f8464019e969c2557242e3308959c1e5026c375a9fdac88a858b7b4f281f762b04b3f20e7d5030f195f2507cd13afd940cb035b369bdb73a3ff29ee1206dcd5924ed64564f392ce9ed46b5eb866add35f3b66b9d230dbdc2a66c563e733686f1adb51aed25a9a272db1a7fd30ee07dfef12d0339da644f6cc1efeec117816481f2dbd63e62cbb7a305a8c0232823bfb784c55a5a9511c553b51011b94f221f1471afb86214862972f084af9b950389395f994973fa4d702254c5ccdda21628ae49518ba69dc5c615d7b82d71452180d50fb32a97bd3147b87996ab01bfa3bfbac170e6301b16a6900cfefbd5cfdcf14e379d7960b202addd99b62b81e39e9a06f4567f70cf09592f9a328593a85070d2397251ab6b76bc19657569f0b0a8dbecddab41db5785ad19e06a034152299880b6ed7ab2ff8ddbe0d352ba40f4e84c9c48d3628067cdd99619460a0cb1651326bbfc258ce41118468ba72bc1a1f2e4ad78f9e6e5df546de0684204346101c8cbc08997705ab27f774825679049c7092e99ce849441e70d9161a7a8c01ca6428980f240786d29df7b72c702d18515769443b380d8ae0f5d27bd2fd8107837a87827373b2e4be7543ab65e4db711c894292f948caade86ad7484564358f1b43a0e875ac1374160f6f7640152f12f8bd0c38ee7d602b32f0a27734e2e08eff7e03147d003559ca99a9a8cdcbc13048a8ea02ee4fb67eabf8f427cfaf5230570ba017cab87af2070efbf189333cf7e80087111b8fcd763b635d97d695653442cc6d5199fecd1d55daec82cdc76ce79c37621530ad6a364edf314bae65b7c58439d8cfbe21d0e8e49a776aecb27c0fae1381b6cfc161ef6a6669a997ed7a51b63e7f709a04476c0a7eee36bd3912c43e72ccd7fc29804d09bb40569989248cb375b05dedf71fe5209113d840098d92dea0f6776e5488fb18a03bcb228a2893c624b7a5aaf40a3e66bd20394035e5b570f29462d421450d7fe6a2f553", 0x1000}], 0x2000000, &(0x7f00000013c0)={[{@noquota='noquota'}, {@norecovery='norecovery'}, {@data_writeback='data=writeback'}, {@noinit_itable='noinit_itable'}, {@noinit_itable='noinit_itable'}, {@block_validity='block_validity'}, {@resgid={'resgid', 0x3d, r2}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x18b7}}], [{@obj_role={'obj_role', 0x3d, 'vboxnet1'}}, {@smackfsdef={'smackfsdef', 0x3d, '9p\x00'}}, {@euid_gt={'euid>', r3}}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:52 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = dup2(r0, r1) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000040)=0x4, 0x4) [ 799.716545][T25247] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x800, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x4) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:52 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x143100) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000040)=0x2, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0xfffffff5, &(0x7f0000000540)=0x9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) write$FUSE_STATFS(0xffffffffffffffff, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000140)='lo:\x01%mime_type$(-^*\x00') setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x10000, 0x100) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, 0x0) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000400)={r4, 0x3, 0x7, 0x7f, 0x7, 0x7, 0xfff}) ioctl$int_in(r0, 0x8000000002a701, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f00000007c0)) eventfd(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000200)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r3, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r5, 0x2}}, 0x10) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000004c0)={0x0, 0xfffffffffffffffd, 0x55, 0x9, @buffer={0x0, 0x24, &(0x7f0000000280)=""/36}, &(0x7f0000000300)="f337487a8507504dfd217deb6dff3e9b3a2c3184c1ceb646f96c324f1286c329f0fba7f91d837bcd578077722e6ba9cdd5cabff89349f826e77a733c51dc5a0f0314f747ca00211151b4e5a1f6276f92a51e5690bc", 0x0, 0xb1d, 0x0, 0x0, 0x0}) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) rseq(&(0x7f0000000080), 0x20, 0x1, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f00000000c0)) 22:08:52 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x0, 0x9, 0x20, [], &(0x7f0000000000)=0x6}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x600, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:52 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3194, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000100)=""/196) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x800) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x8}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r2, 0x8000000008009375, &(0x7f00000003c0)="010000000000000018") [ 800.246301][T25510] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x800, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e20, 0x7f, @dev={0xfe, 0x80, [], 0x19}, 0x1f}}, 0x0, 0x7ff, 0x0, "fc4b27f034765a254ccc67b13a0ae5163dac7104e1cbf55270d2344012cefc72f2ad5f64dd27486c3a305b9909b73770919b1e07a81a04fef1fb57fa4d36733891c2e8e0f4ff0e2e97ce37a09bac6e37"}, 0xd8) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000080)=0x81, 0x4) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0x1000, "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"}, &(0x7f00000013c0)=0x1008) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000001400)=r2, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000002c0)={@loopback, @remote}, &(0x7f0000000300)=0x8) 22:08:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1, 0x0) 22:08:52 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x400040, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x2) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x40020, &(0x7f00000000c0)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x81}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x80000001}}], [{@subj_role={'subj_role', 0x3d, 'ext3\x00'}}, {@fsname={'fsname', 0x3d, '[)em1securitywlan0bdev-'}}]}) 22:08:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) fallocate(r0, 0x40, 0x7f, 0x5) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3d, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000000)=0x100000001, 0x4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1009}}, 0x20) msgget(0x2, 0xa) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8}, 0x10) 22:08:53 executing program 5: mkdir(&(0x7f0000000380)='./file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000180)='./file0/f.le.\x00') mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) execve(&(0x7f0000000080)='.//ile0/file0\x00', &(0x7f0000000240)=[&(0x7f0000000200)='overlay\x00'], &(0x7f0000000600)=[&(0x7f0000000340)='overlay\x00', &(0x7f00000003c0)='overlay\x00', &(0x7f0000000400)='bdevem0&/}\x00', &(0x7f0000000440)='overlay\x00', &(0x7f0000000480)='overlay\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='vboxnet0)wlan1eth1*\x00', &(0x7f0000000540)='overlay\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='overlay\x00']) mkdir(&(0x7f0000000000)='.//ile0/file0\x00', 0x0) open(&(0x7f00000001c0)='.//ile0\x00', 0x0, 0x0) 22:08:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x67b, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:53 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = gettid() sched_setscheduler(r0, 0x6, &(0x7f0000000000)=0xb22) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000000)={0x0, 0x6, 0x80000000000, 0x1}) 22:08:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000140)="8e438a39aa037633d4da816333c7b02ec2deabcbc22fc03eb9d3f3d8d126b52a31a4761a4dbdbfc65da4fd7bbc13e5015a872a66bbd53c3ebc167720332f96035f7efced47917bb74a23b0f945a65789a0ff91339dbd532f48e0eedcf0ac346699b7ad14d8adee622a07ba44f491e3a125a561bb", 0x74}, {&(0x7f0000000240)="36c2a9b22142074479b31c3ea90ee9e62ec90601452b526704639110e697404a768b9159e300bc3ba31d8938a2dabf48ae4908e3bdba9520adf178a46eef751e01784c2c296f50b570ccd3188b", 0x4d}, {&(0x7f00000003c0)="694c8035c88bf57ace1e2a1ff55cbd8bd1e7bd89f58e918e9f356fd42696bbaddea9ee5c2a5d7d43ada7d3c5842999920fee379fd8d0001e06908720448a5ffb5fd2ff82cc6dc966d11bec0b1a07a3118509ac1dd1d729c3f91099ec097512cb8440e16188525180fec9ed8232d9f1e30972dfd735c82f7edf4b88814402e0326f4b38d61477f972b018864d80d06ce3127e2b5725f68259ccd67cedc5abc93e82abac54dd68cc8561c3f30252910e372d33e98b81837a119cfe6fb0b2282cc9f63940391c324c6a628edc59c06e851a0b9d0febf83d7b", 0xd7}, {&(0x7f0000000040)="5048e016284c0916dd", 0x9}, {&(0x7f00000000c0)='\t', 0x1}, {&(0x7f00000002c0)="f0c54869616fa009307b71059c9e4667c9ce908d8d7b53bf10a304f52d6a64c5d282374dc58df7f81a950d5c69c0274fd4802fdfbce67b2099e758a1c2dc0846273100033ef1765c0647aa6ec4f17b29fbd3b3c191cccbe9b67f", 0x5a}], 0x6) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x5, &(0x7f0000000280)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='limits\x00') ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x404040, 0x0) [ 801.283192][T25760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 22:08:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000040)='9p\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x50000, &(0x7f0000000540)={'trans=xen,', {[{@cachetag={'cachetag', 0x3d, ')'}}, {@version_L='version=9p2000.L'}, {@access_any='access=any'}, {@aname={'aname', 0x3d, '/dev/ptmx\x00'}}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}, {@afid={'afid'}}, {@loose='loose'}, {@debug={'debug', 0x3d, 0xbc0}}, {@cache_none='cache=none'}], [{@euid_lt={'euid<', r1}}, {@subj_type={'subj_type', 0x3d, 'keyring^.wlan1^wlan1md5sumuser}selinux'}}, {@euid_gt={'euid>', r2}}, {@fowner_lt={'fowner<', r3}}, {@measure='measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'GPL\\'}}, {@uid_eq={'uid', 0x3d, r4}}]}}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, 0x0) 22:08:54 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x121) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/156) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 801.488749][T25766] [ 801.491127][T25766] ====================================================== [ 801.498138][T25766] WARNING: possible circular locking dependency detected [ 801.505146][T25766] 5.0.0-next-20190306 #4 Not tainted [ 801.510415][T25766] ------------------------------------------------------ [ 801.517439][T25766] syz-executor.5/25766 is trying to acquire lock: [ 801.523853][T25766] 00000000d8cdc20d (&ovl_i_mutex_dir_key[depth]){++++}, at: lookup_slow+0x4a/0x80 [ 801.533054][T25766] [ 801.533054][T25766] but task is already holding lock: [ 801.540410][T25766] 000000000f2fd748 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 801.550498][T25766] [ 801.550498][T25766] which lock already depends on the new lock. [ 801.550498][T25766] [ 801.561357][T25766] [ 801.561357][T25766] the existing dependency chain (in reverse order) is: [ 801.570359][T25766] [ 801.570359][T25766] -> #3 (&sig->cred_guard_mutex){+.+.}: [ 801.576864][T25760] kobject: 'wlan740' (000000003b92f8d8): kobject_uevent_env [ 801.578081][T25766] lock_acquire+0x16f/0x3f0 [ 801.578098][T25766] __mutex_lock+0xf7/0x1310 [ 801.578115][T25766] mutex_lock_killable_nested+0x16/0x20 [ 801.588695][T25760] kobject: 'wlan740' (000000003b92f8d8): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740' [ 801.590371][T25766] lock_trace+0x4a/0xe0 [ 801.590383][T25766] proc_pid_stack+0x13e/0x2c0 [ 801.590400][T25766] proc_single_show+0xf6/0x170 [ 801.604434][T25760] kobject: 'queues' (000000003a6f1f3d): kobject_add_internal: parent: 'wlan740', set: '' [ 801.613833][T25766] seq_read+0x4db/0x1130 [ 801.613848][T25766] do_iter_read+0x4a9/0x660 [ 801.613859][T25766] vfs_readv+0xf0/0x160 [ 801.613875][T25766] do_preadv+0x1c4/0x280 [ 801.618754][T25760] kobject: 'queues' (000000003a6f1f3d): kobject_uevent_env [ 801.623695][T25766] __x64_sys_preadv+0x9a/0xf0 [ 801.623711][T25766] do_syscall_64+0x103/0x610 [ 801.623724][T25766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.623732][T25766] [ 801.623732][T25766] -> #2 (&p->lock){+.+.}: [ 801.629060][T25760] kobject: 'queues' (000000003a6f1f3d): kobject_uevent_env: filter function caused the event to drop! [ 801.639287][T25766] lock_acquire+0x16f/0x3f0 [ 801.639302][T25766] __mutex_lock+0xf7/0x1310 [ 801.639314][T25766] mutex_lock_nested+0x16/0x20 [ 801.639329][T25766] seq_read+0x71/0x1130 [ 801.644137][T25760] kobject: 'rx-0' (00000000408d7fad): kobject_add_internal: parent: 'queues', set: 'queues' [ 801.649058][T25766] proc_reg_read+0x1fe/0x2c0 [ 801.649070][T25766] do_iter_read+0x4a9/0x660 [ 801.649082][T25766] vfs_readv+0xf0/0x160 [ 801.649092][T25766] default_file_splice_read+0x475/0x890 [ 801.649106][T25766] do_splice_to+0x12a/0x190 [ 801.653843][T25760] kobject: 'rx-0' (00000000408d7fad): kobject_uevent_env [ 801.658484][T25766] splice_direct_to_actor+0x2d2/0x970 [ 801.658496][T25766] do_splice_direct+0x1da/0x2a0 [ 801.658508][T25766] do_sendfile+0x597/0xd00 [ 801.658518][T25766] __x64_sys_sendfile64+0x1dd/0x220 [ 801.658535][T25766] do_syscall_64+0x103/0x610 [ 801.665777][T25760] kobject: 'rx-0' (00000000408d7fad): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740/queues/rx-0' [ 801.670863][T25766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.670867][T25766] [ 801.670867][T25766] -> #1 (sb_writers#3){.+.+}: [ 801.670890][T25766] lock_acquire+0x16f/0x3f0 [ 801.670905][T25766] __sb_start_write+0x20b/0x360 [ 801.676098][T25760] kobject: 'tx-0' (00000000a149fd10): kobject_add_internal: parent: 'queues', set: 'queues' [ 801.682370][T25766] mnt_want_write+0x3f/0xc0 [ 801.682383][T25766] ovl_want_write+0x76/0xa0 [ 801.682393][T25766] ovl_create_object+0xb3/0x2c0 [ 801.682401][T25766] ovl_create+0x28/0x30 [ 801.682424][T25766] lookup_open+0x12e0/0x1b10 [ 801.689061][T25760] kobject: 'tx-0' (00000000a149fd10): kobject_uevent_env [ 801.699786][T25766] path_openat+0x14ac/0x46e0 [ 801.699797][T25766] do_filp_open+0x1a1/0x280 [ 801.699808][T25766] do_sys_open+0x3fe/0x5d0 [ 801.699818][T25766] __x64_sys_creat+0x61/0x80 22:08:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$TIOCCBRK(r0, 0x5428) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000280)=""/211) 22:08:54 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$peek(0x1, r0, &(0x7f00000000c0)) r1 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 22:08:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x700, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 801.699835][T25766] do_syscall_64+0x103/0x610 [ 801.704910][T25760] kobject: 'tx-0' (00000000a149fd10): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740/queues/tx-0' [ 801.709826][T25766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.709829][T25766] [ 801.709829][T25766] -> #0 (&ovl_i_mutex_dir_key[depth]){++++}: [ 801.709851][T25766] __lock_acquire+0x239c/0x3fb0 [ 801.709859][T25766] lock_acquire+0x16f/0x3f0 [ 801.709877][T25766] down_read+0x3b/0x90 22:08:54 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8000, 0x0) [ 801.715266][T25760] kobject: 'tx-1' (00000000c537fb70): kobject_add_internal: parent: 'queues', set: 'queues' [ 801.719781][T25766] lookup_slow+0x4a/0x80 [ 801.719793][T25766] walk_component+0x74b/0x2000 [ 801.719804][T25766] link_path_walk.part.0+0x594/0x1340 [ 801.719814][T25766] path_openat+0x202/0x46e0 [ 801.719829][T25766] do_filp_open+0x1a1/0x280 [ 801.730063][T25760] kobject: 'tx-1' (00000000c537fb70): kobject_uevent_env [ 801.734948][T25766] do_open_execat+0x137/0x690 [ 801.734961][T25766] __do_execve_file.isra.0+0x178d/0x23f0 [ 801.734972][T25766] __x64_sys_execve+0x8f/0xc0 [ 801.734990][T25766] do_syscall_64+0x103/0x610 [ 801.740073][T25760] kobject: 'tx-1' (00000000c537fb70): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740/queues/tx-1' [ 801.744629][T25766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 801.744633][T25766] [ 801.744633][T25766] other info that might help us debug this: [ 801.744633][T25766] [ 801.744637][T25766] Chain exists of: [ 801.744637][T25766] &ovl_i_mutex_dir_key[depth] --> &p->lock --> &sig->cred_guard_mutex [ 801.744637][T25766] [ 801.744657][T25766] Possible unsafe locking scenario: [ 801.744657][T25766] [ 801.750842][T25760] kobject: 'tx-2' (00000000f336aa37): kobject_add_internal: parent: 'queues', set: 'queues' [ 801.755686][T25766] CPU0 CPU1 [ 801.755689][T25766] ---- ---- [ 801.755691][T25766] lock(&sig->cred_guard_mutex); [ 801.755699][T25766] lock(&p->lock); [ 801.755706][T25766] lock(&sig->cred_guard_mutex); [ 801.755713][T25766] lock(&ovl_i_mutex_dir_key[depth]); [ 801.755725][T25766] [ 801.755725][T25766] *** DEADLOCK *** [ 801.755725][T25766] [ 801.762891][T25760] kobject: 'tx-2' (00000000f336aa37): kobject_uevent_env [ 801.768583][T25766] 1 lock held by syz-executor.5/25766: [ 801.768586][T25766] #0: 000000000f2fd748 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 801.768616][T25766] [ 801.768616][T25766] stack backtrace: [ 801.768634][T25766] CPU: 1 PID: 25766 Comm: syz-executor.5 Not tainted 5.0.0-next-20190306 #4 [ 801.774078][T25760] kobject: 'tx-2' (00000000f336aa37): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740/queues/tx-2' [ 801.779057][T25766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.779061][T25766] Call Trace: [ 801.779082][T25766] dump_stack+0x172/0x1f0 [ 801.779100][T25766] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 801.779118][T25766] check_prev_add.constprop.0+0xf11/0x23c0 [ 801.784933][T25760] kobject: 'tx-3' (0000000075433bfd): kobject_add_internal: parent: 'queues', set: 'queues' [ 801.789891][T25766] ? check_usage+0x570/0x570 [ 801.789909][T25766] ? is_dynamic_key+0x1c0/0x1c0 [ 801.789921][T25766] ? __lockdep_reset_lock+0x450/0x450 [ 801.789941][T25766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 801.803264][T25760] kobject: 'tx-3' (0000000075433bfd): kobject_uevent_env [ 801.809475][T25766] ? find_first_zero_bit+0x9a/0xc0 [ 801.809490][T25766] __lock_acquire+0x239c/0x3fb0 [ 801.809507][T25766] ? mark_held_locks+0xf0/0xf0 [ 801.809522][T25766] ? __d_lookup+0x433/0x760 [ 801.816429][T25760] kobject: 'tx-3' (0000000075433bfd): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim752/net/wlan740/queues/tx-3' [ 801.821340][T25766] lock_acquire+0x16f/0x3f0 [ 801.821351][T25766] ? lookup_slow+0x4a/0x80 [ 801.821371][T25766] down_read+0x3b/0x90 [ 801.827765][T25760] kobject: 'batman_adv' (00000000d07c8a11): kobject_add_internal: parent: 'wlan740', set: '' [ 801.836744][T25766] ? lookup_slow+0x4a/0x80 [ 801.836756][T25766] lookup_slow+0x4a/0x80 [ 801.836769][T25766] walk_component+0x74b/0x2000 [ 801.836781][T25766] ? capable_wrt_inode_uidgid+0x92/0xd0 [ 801.836795][T25766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.836811][T25766] ? path_init+0x18f0/0x18f0 [ 801.856620][ T7437] kobject: 'regulatory.0' (000000005b2ac962): kobject_uevent_env [ 801.856826][T25766] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 801.861957][ T7437] kobject: 'regulatory.0' (000000005b2ac962): fill_kobj_path: path = '/devices/platform/regulatory.0' [ 801.868902][T25766] ? revert_creds+0x1a3/0x200 [ 801.868915][T25766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.868935][T25766] ? security_inode_permission+0xd5/0x110 [ 801.945442][T25890] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 801.946776][T25766] ? inode_permission+0xb4/0x570 [ 801.946791][T25766] link_path_walk.part.0+0x594/0x1340 [ 801.946810][T25766] ? walk_component+0x2000/0x2000 [ 801.958942][T25890] kobject: 'hwsim753' (0000000098dcfe18): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 801.962706][T25766] path_openat+0x202/0x46e0 [ 801.962728][T25766] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 801.985294][T25890] kobject: 'hwsim753' (0000000098dcfe18): kobject_uevent_env [ 801.991138][T25766] ? __kmalloc+0x15c/0x740 [ 801.991158][T25766] ? security_prepare_creds+0x123/0x190 [ 801.991172][T25766] ? prepare_creds+0x2f5/0x3f0 [ 801.991191][T25766] ? prepare_exec_creds+0x12/0xf0 [ 802.007349][T25890] kobject: 'hwsim753' (0000000098dcfe18): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753' [ 802.014638][T25766] ? __do_execve_file.isra.0+0x393/0x23f0 [ 802.014651][T25766] ? __x64_sys_execve+0x8f/0xc0 [ 802.014673][T25766] ? do_syscall_64+0x103/0x610 [ 802.031579][T25890] kobject: 'hwsim753' (0000000098dcfe18): kobject_uevent_env [ 802.045316][T25766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.045336][T25766] ? __lock_acquire+0x548/0x3fb0 [ 802.045351][T25766] ? prepare_exec_creds+0x12/0xf0 [ 802.045369][T25766] do_filp_open+0x1a1/0x280 [ 802.056316][T25890] kobject: 'hwsim753' (0000000098dcfe18): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753' [ 802.062849][T25766] ? may_open_dev+0x100/0x100 [ 802.062873][T25766] ? __lock_acquire+0x548/0x3fb0 [ 802.062895][T25766] do_open_execat+0x137/0x690 [ 802.068579][T25890] kobject: 'ieee80211' (0000000032045209): kobject_add_internal: parent: 'hwsim753', set: '(null)' [ 802.073589][T25766] ? unregister_binfmt+0x170/0x170 [ 802.073604][T25766] ? lock_downgrade+0x880/0x880 [ 802.073625][T25766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.078715][T25890] kobject: 'phy753' (00000000831ef6e0): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 802.084920][T25766] ? kasan_check_read+0x11/0x20 [ 802.084935][T25766] ? do_raw_spin_unlock+0x57/0x270 [ 802.084955][T25766] __do_execve_file.isra.0+0x178d/0x23f0 [ 802.092689][T25890] kobject: 'phy753' (00000000831ef6e0): kobject_uevent_env [ 802.097897][T25766] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 802.097918][T25766] ? copy_strings_kernel+0x110/0x110 [ 802.097931][T25766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 802.097960][T25766] ? getname_flags+0x277/0x5b0 [ 802.106162][T25890] kobject: 'phy753' (00000000831ef6e0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/ieee80211/phy753' [ 802.113093][T25766] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.113109][T25766] __x64_sys_execve+0x8f/0xc0 [ 802.113126][T25766] do_syscall_64+0x103/0x610 [ 802.113144][T25766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 802.141060][T25890] kobject: 'rfkill755' (0000000000b96cef): kobject_add_internal: parent: 'phy753', set: 'devices' [ 802.143591][T25766] RIP: 0033:0x457f29 [ 802.143606][T25766] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 802.143613][T25766] RSP: 002b:00007f55072e3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 802.143645][T25766] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 802.157098][T25890] kobject: 'rfkill755' (0000000000b96cef): kobject_uevent_env [ 802.166869][T25766] RDX: 0000000020000600 RSI: 0000000020000240 RDI: 0000000020000080 [ 802.166876][T25766] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 802.166884][T25766] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55072e46d4 [ 802.166890][T25766] R13: 00000000004be513 R14: 00000000004cee00 R15: 00000000ffffffff [ 802.168416][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 802.173176][T25890] kobject: 'rfkill755' (0000000000b96cef): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/ieee80211/phy753/rfkill755' [ 802.174526][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 802.174857][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 802.205470][T25890] ieee80211 phy753: Selected rate control algorithm 'minstrel_ht' [ 802.223152][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 802.235351][T25890] kobject: 'net' (000000007085b049): kobject_add_internal: parent: 'hwsim753', set: '(null)' [ 802.242177][ T3875] kobject: 'loop2' (00000000d3e434b5): kobject_uevent_env [ 802.249216][T25890] kobject: 'wlan741' (0000000039a6cb06): kobject_add_internal: parent: 'net', set: 'devices' [ 802.257948][ T3875] kobject: 'loop2' (00000000d3e434b5): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 802.278263][T25890] kobject: 'wlan741' (0000000039a6cb06): kobject_uevent_env [ 802.282301][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 802.285713][T25890] kobject: 'wlan741' (0000000039a6cb06): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741' [ 802.290057][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 802.300485][T25890] kobject: 'queues' (00000000d1a03e2e): kobject_add_internal: parent: 'wlan741', set: '' [ 802.307166][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 802.320183][T25890] kobject: 'queues' (00000000d1a03e2e): kobject_uevent_env [ 802.325388][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 802.347791][T25890] kobject: 'queues' (00000000d1a03e2e): kobject_uevent_env: filter function caused the event to drop! [ 802.366807][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 802.369225][T25890] kobject: 'rx-0' (000000007851e920): kobject_add_internal: parent: 'queues', set: 'queues' [ 802.372687][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 802.377738][T25890] kobject: 'rx-0' (000000007851e920): kobject_uevent_env [ 802.391257][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 802.398868][T25890] kobject: 'rx-0' (000000007851e920): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741/queues/rx-0' [ 802.408031][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 802.417183][T25890] kobject: 'tx-0' (000000009c5eb2fd): kobject_add_internal: parent: 'queues', set: 'queues' [ 802.485254][T25901] overlayfs: filesystem on './file0' not supported as upperdir [ 802.501882][T25890] kobject: 'tx-0' (000000009c5eb2fd): kobject_uevent_env [ 802.835108][ C0] net_ratelimit: 24 callbacks suppressed [ 802.835114][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.835144][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 802.835195][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.835214][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 802.835255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.835274][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 802.986441][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 802.991695][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 802.997351][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 803.003029][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 803.009347][T25890] kobject: 'tx-0' (000000009c5eb2fd): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741/queues/tx-0' [ 803.056353][T25890] kobject: 'tx-1' (0000000020188f2c): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.067850][T25890] kobject: 'tx-1' (0000000020188f2c): kobject_uevent_env [ 803.074923][T25890] kobject: 'tx-1' (0000000020188f2c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741/queues/tx-1' [ 803.088653][T25890] kobject: 'tx-2' (000000006e37392e): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.098867][T25890] kobject: 'tx-2' (000000006e37392e): kobject_uevent_env [ 803.105917][T25890] kobject: 'tx-2' (000000006e37392e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741/queues/tx-2' [ 803.119197][T25890] kobject: 'tx-3' (0000000086464c41): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.129356][T25890] kobject: 'tx-3' (0000000086464c41): kobject_uevent_env [ 803.136455][T25890] kobject: 'tx-3' (0000000086464c41): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim753/net/wlan741/queues/tx-3' [ 803.150447][T25890] kobject: 'batman_adv' (00000000604dcaf1): kobject_add_internal: parent: 'wlan741', set: '' [ 803.161689][ T7437] kobject: 'regulatory.0' (000000005b2ac962): kobject_uevent_env [ 803.176499][ T7437] kobject: 'regulatory.0' (000000005b2ac962): fill_kobj_path: path = '/devices/platform/regulatory.0' [ 803.180275][ T3875] kobject: 'loop2' (00000000d3e434b5): kobject_uevent_env 22:08:55 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0xffffffffffffffff}, 0x0, 0xb}}, 0x2ce) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000780)={0x10, 0x30, 0xfa00, {&(0x7f00000006c0), 0x3, {0xa, 0x4e23, 0x6b, @local, 0x100000000}, r2}}, 0x38) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r3 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000007c0)={0x3b47, 0x4, 0x6}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) connect$pppoe(r3, &(0x7f0000000640)={0x18, 0x0, {0x1, @empty, 'rose0\x00'}}, 0x1e) openat$mixer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/mixer\x00', 0x80, 0x0) ioctl$BLKGETSIZE(r3, 0x1260, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x220000, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@mmap='mmap'}, {@cache_fscache='cache=fscache'}, {@uname={'uname', 0x3d, '9p\x00'}}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@uid_gt={'uid>', r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/ptmx\x00'}}, {@euid_eq={'euid', 0x3d, r6}}]}}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x80000000000, 0x0) 22:08:55 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x200000002, 0x4) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @broadcast}, 0x10) r3 = socket(0x100000010, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8924, &(0x7f0000000000)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040), 0x4) recvmmsg(r0, &(0x7f0000005600)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/36, 0x24}, {&(0x7f0000000140)=""/186, 0xba}, {&(0x7f0000000280)=""/42, 0x2a}, {&(0x7f00000002c0)=""/12, 0xc}, {&(0x7f00000003c0)=""/231, 0xe7}, {&(0x7f0000000300)=""/102, 0x66}, {&(0x7f00000004c0)=""/127, 0x7f}], 0x7, &(0x7f00000005c0)=""/75, 0x4b}, 0x7fff}, {{&(0x7f0000000640)=@l2, 0x80, &(0x7f0000001800)=[{&(0x7f00000006c0)=""/194, 0xc2}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/21, 0x15}], 0x3, &(0x7f0000001840)=""/199, 0xc7}, 0x80}, {{&(0x7f0000001940)=@caif=@dbg, 0x80, &(0x7f0000001c80)=[{&(0x7f00000019c0)=""/224, 0xe0}, {&(0x7f0000001ac0)=""/143, 0x8f}, {&(0x7f0000001b80)=""/22, 0x16}, {&(0x7f0000001bc0)=""/168, 0xa8}], 0x4}, 0x4}, {{&(0x7f0000001cc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d40)=""/11, 0xb}], 0x1, &(0x7f0000001dc0)=""/192, 0xc0}}, {{&(0x7f0000001e80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001f00)=""/137, 0x89}, {&(0x7f0000001fc0)=""/235, 0xeb}, {&(0x7f00000020c0)}, {&(0x7f0000002100)=""/146, 0x92}], 0x4, &(0x7f0000002200)=""/4096, 0x1000}, 0x10000}, {{&(0x7f0000003200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000005580)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000004280)=""/203, 0xcb}, {&(0x7f0000004380)=""/10, 0xa}, {&(0x7f00000043c0)=""/4096, 0x1000}, {&(0x7f00000053c0)=""/193, 0xc1}, {&(0x7f00000054c0)=""/139, 0x8b}], 0x6}, 0xcf0f}], 0x6, 0x1, 0x0) 22:08:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x4000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x8000, 0x4, 0x200}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_rr_get_interval(r2, &(0x7f0000000180)) 22:08:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0xf22, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) [ 803.199173][ T3875] kobject: 'loop2' (00000000d3e434b5): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 803.256795][T25912] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 803.264528][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 803.266268][T25912] kobject: 'hwsim754' (00000000347e9aa5): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 803.289714][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:08:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) dup3(r0, r0, 0x80000) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 22:08:55 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x302856c4, 0x800) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:55 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x40000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x8000, {{0xa, 0x4e23, 0x20, @mcast2, 0x8}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa589}}]}, 0x110) [ 803.347800][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env 22:08:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x4000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x8000, 0x4, 0x200}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_rr_get_interval(r2, &(0x7f0000000180)) 22:08:55 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) 22:08:55 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x101000, 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 803.391866][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 803.395943][T25912] kobject: 'hwsim754' (00000000347e9aa5): kobject_uevent_env 22:08:56 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0}, &(0x7f0000000140)=0xc) sched_rr_get_interval(r2, &(0x7f0000000180)) 22:08:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8000, 0x2000) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000180)=0x7ff, 0x4) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000d40)={0x3bae9f04, {{0x2, 0x4e24, @local}}}, 0x88) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)={0x4}) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x10000002000000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) r11 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000c40)=ANY=[@ANYBLOB="02000000010000000000000002000200", @ANYRES32=r3, @ANYBLOB="02000600", @ANYRES32=r4, @ANYBLOB="02000500", @ANYRES32=r5, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="02000200", @ANYRES32=r7, @ANYBLOB="02000200", @ANYRES32=r8, @ANYBLOB="040003000000000008000300", @ANYRES32=r9, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r10, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r11, @ANYBLOB="08000200", @ANYRES32=r12, @ANYBLOB="08000400", @ANYRES32=r13, @ANYBLOB="10000400369abb4089b67d8f446f9aa2"], 0x7c, 0x2) [ 803.438767][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 803.440592][T25912] kobject: 'hwsim754' (00000000347e9aa5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754' [ 803.472817][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:08:56 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x80) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) fchmodat(r0, &(0x7f0000000140)='./file0/file0\x00', 0x28) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x80000001, &(0x7f00000000c0)=0x4) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x10001, 0x4) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) [ 803.505779][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 803.511935][T25912] kobject: 'hwsim754' (00000000347e9aa5): kobject_uevent_env [ 803.529308][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 803.557921][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 803.565263][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 803.580712][T25912] kobject: 'hwsim754' (00000000347e9aa5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754' [ 803.583909][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 803.609300][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 803.617093][T25912] kobject: 'ieee80211' (00000000d19651f8): kobject_add_internal: parent: 'hwsim754', set: '(null)' [ 803.625136][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 803.633265][T25912] kobject: 'phy754' (00000000c8f9280c): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 803.637688][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 803.648474][T25912] kobject: 'phy754' (00000000c8f9280c): kobject_uevent_env [ 803.659743][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 803.666411][T25912] kobject: 'phy754' (00000000c8f9280c): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/ieee80211/phy754' [ 803.672974][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 803.696312][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 803.704751][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 803.710604][T25912] kobject: 'rfkill756' (00000000e60434fa): kobject_add_internal: parent: 'phy754', set: 'devices' [ 803.717741][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 803.728039][T25912] kobject: 'rfkill756' (00000000e60434fa): kobject_uevent_env [ 803.732749][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 803.742154][T25912] kobject: 'rfkill756' (00000000e60434fa): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/ieee80211/phy754/rfkill756' [ 803.750924][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 803.769882][T25912] ieee80211 phy754: Selected rate control algorithm 'minstrel_ht' [ 803.771566][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 803.783884][T25912] kobject: 'net' (000000005eadb8c7): kobject_add_internal: parent: 'hwsim754', set: '(null)' [ 803.790100][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 803.799513][T25912] kobject: 'wlan742' (0000000002c18cad): kobject_add_internal: parent: 'net', set: 'devices' [ 803.806783][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 803.819191][T25912] kobject: 'wlan742' (0000000002c18cad): kobject_uevent_env [ 803.846462][T25912] kobject: 'wlan742' (0000000002c18cad): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742' [ 803.876468][T25912] kobject: 'queues' (00000000b6a7ac1e): kobject_add_internal: parent: 'wlan742', set: '' [ 803.887294][T25912] kobject: 'queues' (00000000b6a7ac1e): kobject_uevent_env [ 803.895289][T25912] kobject: 'queues' (00000000b6a7ac1e): kobject_uevent_env: filter function caused the event to drop! [ 803.909820][T25912] kobject: 'rx-0' (00000000287a6e0a): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.920229][T25912] kobject: 'rx-0' (00000000287a6e0a): kobject_uevent_env [ 803.927548][T25912] kobject: 'rx-0' (00000000287a6e0a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742/queues/rx-0' [ 803.940842][T25912] kobject: 'tx-0' (000000004e724c2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.950992][T25912] kobject: 'tx-0' (000000004e724c2f): kobject_uevent_env [ 803.958062][T25912] kobject: 'tx-0' (000000004e724c2f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742/queues/tx-0' [ 803.971325][T25912] kobject: 'tx-1' (000000007fcd89d1): kobject_add_internal: parent: 'queues', set: 'queues' [ 803.981546][T25912] kobject: 'tx-1' (000000007fcd89d1): kobject_uevent_env [ 803.988601][T25912] kobject: 'tx-1' (000000007fcd89d1): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742/queues/tx-1' [ 804.001879][T25912] kobject: 'tx-2' (0000000073fb9b08): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.012033][T25912] kobject: 'tx-2' (0000000073fb9b08): kobject_uevent_env [ 804.019095][T25912] kobject: 'tx-2' (0000000073fb9b08): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742/queues/tx-2' [ 804.032356][T25912] kobject: 'tx-3' (00000000258c0dc5): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.042554][T25912] kobject: 'tx-3' (00000000258c0dc5): kobject_uevent_env [ 804.049787][T25912] kobject: 'tx-3' (00000000258c0dc5): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim754/net/wlan742/queues/tx-3' [ 804.063924][T25912] kobject: 'batman_adv' (0000000057b935cd): kobject_add_internal: parent: 'wlan742', set: '' 22:08:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x1f00, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x3, r1}) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000480)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r3, 0x210, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1a98}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xffffffff80000001}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x401}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x80, 0x2, 0x0, 0xfff]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) signalfd4(r2, &(0x7f0000000000)={0x3}, 0x8, 0x800) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1f, 0xc, &(0x7f0000000280)=@raw=[@exit, @jmp={0x5, 0x10001, 0xf, 0x7, 0xb, 0xc, 0x8}, @ldst={0x2, 0x1, 0x6, 0x8, 0x3, 0x50, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x8}, @alu={0xc62b313c991109b, 0x7, 0x7, 0x7, 0xf, 0xfffffffffffffff0, 0xffffffffffffffff}, @ldst={0x0, 0x0, 0x1, 0x9, 0x9, 0xe, 0xffffffffffffffff}, @ldst={0x1, 0x2, 0x3, 0x6, 0x0, 0x2}, @jmp={0x5, 0x4, 0xc, 0x0, 0xa, 0xffffffffffffffc0, 0xffffffffffffffff}, @map={0x18, 0x2, 0x1, 0x0, r2}, @ldst={0x0, 0x1, 0x7, 0xf, 0x2, 0x30, 0x10}], &(0x7f00000001c0)='GPL\x00', 0x40, 0x25, &(0x7f0000000300)=""/37, 0x41000, 0x0, [], r4, 0x9}, 0x48) 22:08:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x4000) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x8000, 0x4, 0x200}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) sched_rr_get_interval(r2, &(0x7f0000000180)) 22:08:56 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:56 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e24, 0x6, @local, 0x1ff}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x3, 0x8, 0x8, 0x0, 0xfffffffffffffeff}, 0x14) 22:08:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x3, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x4000) sched_rr_get_interval(0x0, &(0x7f0000000180)) [ 804.217859][T26082] kobject: 'hwsim755' (00000000ced8b9ea): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 804.228205][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 804.263201][T26082] kobject: 'hwsim755' (00000000ced8b9ea): kobject_uevent_env [ 804.277681][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 804.284989][T26082] kobject: 'hwsim755' (00000000ced8b9ea): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755' [ 804.299630][T26082] kobject: 'hwsim755' (00000000ced8b9ea): kobject_uevent_env [ 804.310331][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 804.315885][T26082] kobject: 'hwsim755' (00000000ced8b9ea): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755' [ 804.337285][T26082] kobject: 'ieee80211' (0000000078da3532): kobject_add_internal: parent: 'hwsim755', set: '(null)' [ 804.340376][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 804.351792][T26082] kobject: 'phy755' (0000000045ece916): kobject_add_internal: parent: 'ieee80211', set: 'devices' [ 804.364674][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 804.369056][T26082] kobject: 'phy755' (0000000045ece916): kobject_uevent_env [ 804.376591][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 804.385166][T26082] kobject: 'phy755' (0000000045ece916): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/ieee80211/phy755' [ 804.390322][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 804.413775][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env [ 804.420967][ T3875] kobject: 'loop1' (000000007d3c1562): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 804.428720][T26082] kobject: 'rfkill757' (0000000001bdf56d): kobject_add_internal: parent: 'phy755', set: 'devices' [ 804.432665][ T3875] kobject: 'loop4' (0000000019ffcff2): kobject_uevent_env [ 804.444076][T26082] kobject: 'rfkill757' (0000000001bdf56d): kobject_uevent_env [ 804.449199][ T3875] kobject: 'loop4' (0000000019ffcff2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 804.456416][T26082] kobject: 'rfkill757' (0000000001bdf56d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/ieee80211/phy755/rfkill757' [ 804.468669][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 804.486684][T26082] ieee80211 phy755: Selected rate control algorithm 'minstrel_ht' [ 804.487620][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 804.498418][T26082] kobject: 'net' (00000000bc1ba15b): kobject_add_internal: parent: 'hwsim755', set: '(null)' [ 804.532304][T26082] kobject: 'wlan743' (0000000087f76ee3): kobject_add_internal: parent: 'net', set: 'devices' [ 804.544811][T26082] kobject: 'wlan743' (0000000087f76ee3): kobject_uevent_env [ 804.554029][T26082] kobject: 'wlan743' (0000000087f76ee3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743' [ 804.567146][T26082] kobject: 'queues' (000000009ec7f932): kobject_add_internal: parent: 'wlan743', set: '' [ 804.577831][T26082] kobject: 'queues' (000000009ec7f932): kobject_uevent_env [ 804.585031][T26082] kobject: 'queues' (000000009ec7f932): kobject_uevent_env: filter function caused the event to drop! [ 804.596129][T26082] kobject: 'rx-0' (00000000ec37952e): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.606307][T26082] kobject: 'rx-0' (00000000ec37952e): kobject_uevent_env [ 804.613382][T26082] kobject: 'rx-0' (00000000ec37952e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743/queues/rx-0' [ 804.626688][T26082] kobject: 'tx-0' (000000001fd010c3): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.636887][T26082] kobject: 'tx-0' (000000001fd010c3): kobject_uevent_env [ 804.643956][T26082] kobject: 'tx-0' (000000001fd010c3): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743/queues/tx-0' [ 804.657252][T26082] kobject: 'tx-1' (00000000df5bdcd8): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.667470][T26082] kobject: 'tx-1' (00000000df5bdcd8): kobject_uevent_env [ 804.674508][T26082] kobject: 'tx-1' (00000000df5bdcd8): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743/queues/tx-1' [ 804.687792][T26082] kobject: 'tx-2' (000000005ef4d22e): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.698026][T26082] kobject: 'tx-2' (000000005ef4d22e): kobject_uevent_env [ 804.705066][T26082] kobject: 'tx-2' (000000005ef4d22e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743/queues/tx-2' [ 804.718590][T26082] kobject: 'tx-3' (000000007b6bbd3d): kobject_add_internal: parent: 'queues', set: 'queues' [ 804.728797][T26082] kobject: 'tx-3' (000000007b6bbd3d): kobject_uevent_env [ 804.735838][T26082] kobject: 'tx-3' (000000007b6bbd3d): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim755/net/wlan743/queues/tx-3' [ 804.749849][T26082] kobject: 'batman_adv' (000000008f832d3b): kobject_add_internal: parent: 'wlan743', set: '' 22:08:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x2000, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:57 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x3, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:57 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:57 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f0000000280)="a7fef4b749074115ebecef1f0dc252ef5e6a185ccf9cfe5a947301cc1c09df100c02a6df6f43fcc18b8aa388dc0660626a92366e84ed2f5bfeac0b073ca5c55af9d3995e02afeeb336d2238f89cb8f66aafacd159a69d21486ba0881862bd111508922aac6aeb955096bb5151061118969fcd1fbcdb582e25715f5a1d55b3f3335bcc65207b415349da07ad116cbc34e8e6d3f5cc1166d6868ea0209fe8b6e22af67503442d83aba46e280de6420f4127784be3f0d2c1855dd2abba90404a0083e055921422a48f96f") r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000040)={@local, @local, @empty}, &(0x7f00000000c0)=0xc) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x3, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000180)) 22:08:57 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z' [ 805.276962][T26124] kobject: 'queues' (0000000026b8ff11): kobject_uevent_env [ 805.284159][T26124] kobject: 'queues' (0000000026b8ff11): kobject_uevent_env: filter function caused the event to drop! [ 805.295136][T26124] kobject: 'rx-0' (000000002e223bdd): kobject_add_internal: parent: 'queues', set: 'queues' [ 805.305231][T26124] kobject: 'rx-0' (000000002e223bdd): kobject_uevent_env [ 805.312360][T26124] kobject: 'rx-0' (000000002e223bdd): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim756/net/wlan744/queues/rx-0' [ 805.325662][T26124] kobject: 'tx-0' (00000000f724ba81): kobject_add_internal: parent: 'queues', set: 'queues' [ 805.335854][T26124] kobject: 'tx-0' (00000000f724ba81): kobject_uevent_env [ 805.342931][T26124] kobject: 'tx-0' (00000000f724ba81): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim756/net/wlan744/queues/tx-0' [ 805.356208][T26124] kobject: 'tx-1' (00000000fc3534c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 805.366715][T26124] kobject: 'tx-1' (00000000fc3534c9): kobject_uevent_env [ 805.373756][T26124] kobject: 'tx-1' (00000000fc3534c9): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim756/net/wlan744/queues/tx-1' [ 805.388203][T26124] kobject: 'tx-2' (00000000ce629a58): kobject_add_internal: parent: 'queues', set: 'queues' [ 805.398419][T26124] kobject: 'tx-2' (00000000ce629a58): kobject_uevent_env [ 805.405661][T26124] kobject: 'tx-2' (00000000ce629a58): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim756/net/wlan744/queues/tx-2' [ 805.418973][T26124] kobject: 'tx-3' (00000000a2585dfe): kobject_add_internal: parent: 'queues', set: 'queues' [ 805.429148][T26124] kobject: 'tx-3' (00000000a2585dfe): kobject_uevent_env [ 805.436170][T26124] kobject: 'tx-3' (00000000a2585dfe): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim756/net/wlan744/queues/tx-3' [ 805.450216][T26124] kobject: 'batman_adv' (00000000e23ec989): kobject_add_internal: parent: 'wlan744', set: '' 22:08:58 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x80800) sendto$packet(r0, &(0x7f00000003c0)="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", 0x1000, 0xccb7238b0a90d6fa, &(0x7f0000000140)={0x11, 0xc, r1, 0x1, 0x4}, 0x14) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x1, 0x10000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x2, 0x0) fanotify_mark(r0, 0x0, 0x800000a, r1, &(0x7f0000000680)='./file0\x00') r2 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000000540)=[{{&(0x7f0000000000)=@ethernet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/72, 0x48}, {&(0x7f0000000280)=""/178, 0xb2}, {0xfffffffffffffffd}], 0x3}, 0x1}, {{&(0x7f00000003c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)=""/10, 0xa}, {&(0x7f0000000340)}, {&(0x7f0000000440)=""/104, 0x68}, {&(0x7f00000004c0)=""/41, 0x29}], 0x4}, 0x7}], 0x2, 0x120, &(0x7f0000000600)={r3, r4+10000000}) [ 805.574654][ T3875] kobject: 'loop3' (0000000017c5000f): kobject_uevent_env [ 805.585392][ T3875] kobject: 'loop3' (0000000017c5000f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 805.602809][T26168] kobject: 'hwsim757' (000000004c07346f): kobject_add_internal: parent: 'mac80211_hwsim', set: 'devices' [ 805.626345][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env [ 805.634082][T26168] kobject: 'hwsim757' (000000004c07346f): kobject_uevent_env [ 805.642171][ T3875] kobject: 'loop5' (000000002beca52d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 805.652656][T26168] kobject: 'hwsim757' (000000004c07346f): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757' [ 805.668594][ T3875] kobject: 'loop1' (000000007d3c1562): kobject_uevent_env 22:08:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0xfd, 0x1f}]}, 0xc, 0x1) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:58 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000000180)) 22:08:58 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z' [ 806.019291][T26168] kobject: 'queues' (00000000509666fa): kobject_uevent_env [ 806.026665][T26168] kobject: 'queues' (00000000509666fa): kobject_uevent_env: filter function caused the event to drop! [ 806.037630][T26168] kobject: 'rx-0' (0000000090c6bf11): kobject_add_internal: parent: 'queues', set: 'queues' [ 806.047818][T26168] kobject: 'rx-0' (0000000090c6bf11): kobject_uevent_env [ 806.054857][T26168] kobject: 'rx-0' (0000000090c6bf11): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757/net/wlan745/queues/rx-0' [ 806.068158][T26168] kobject: 'tx-0' (000000003ea0618b): kobject_add_internal: parent: 'queues', set: 'queues' [ 806.078415][T26168] kobject: 'tx-0' (000000003ea0618b): kobject_uevent_env [ 806.085450][T26168] kobject: 'tx-0' (000000003ea0618b): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757/net/wlan745/queues/tx-0' [ 806.098725][T26168] kobject: 'tx-1' (000000009170743a): kobject_add_internal: parent: 'queues', set: 'queues' [ 806.108865][T26168] kobject: 'tx-1' (000000009170743a): kobject_uevent_env [ 806.115915][T26168] kobject: 'tx-1' (000000009170743a): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757/net/wlan745/queues/tx-1' [ 806.129207][T26168] kobject: 'tx-2' (00000000df2912b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 806.139344][T26168] kobject: 'tx-2' (00000000df2912b2): kobject_uevent_env [ 806.146410][T26168] kobject: 'tx-2' (00000000df2912b2): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757/net/wlan745/queues/tx-2' [ 806.159651][T26168] kobject: 'tx-3' (00000000ad5db3d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 806.169839][T26168] kobject: 'tx-3' (00000000ad5db3d0): kobject_uevent_env 22:08:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000200)=0x5) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000380)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r4 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x10, 0x80000) socket$inet6_sctp(0xa, 0x1, 0x84) accept$nfc_llcp(r2, &(0x7f0000000c40), &(0x7f0000000cc0)=0x60) ioctl(r3, 0x0, &(0x7f0000000300)="4e03bd53435ef2652c8668a300284bba40b63b22accce00f524ac760bcbe535e0ab1723fad209fa9ee737faf8155c49ed827f0431ed543a8e8c52002dc0c8ecc92c7df7add7848a37b197f650df8035cee68e5707275d9df0f8d46d9f4daa76befe5c2") ioctl$int_in(r4, 0x4000005421, &(0x7f0000000d00)=0x80000001) bind$tipc(r2, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x22, 0x1, 0x3000, 0x0, {0x4}, [@nested={0x5, 0xb, [@typed={0x2f, 0x0, @fd}]}]}, 0x20}}, 0x0) 22:08:58 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) r3 = getgid() mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='fuse\x00', 0x4000, &(0x7f00000006c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c67726ffff6bcb5c650", @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000000000,blksize=0x0000000000000200,default_permissions,default_permissions,measure,\x00']) sendto$unix(r0, &(0x7f0000000340)="db1d79e7dab238741baacc64b16da0b67696673a92be971f27124b242feb4919a127cb74faa71542a0e5ac79196642301c08c2f80d6c327862d71434313cea9ce5cd1f6e47906f6cdb7122f8174cccf118d987ebf27fd1ecaea37fedb817273d1d1fac0e7fabb73220f34ef1daadb21a0af391b7242c3c9ded65acc90e74180fbed525ba2ad7fe7fa54173f6", 0x8c, 0x0, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000480)="c5d717ccd8ba5b936f23bdd1e6216fcb24f7d82ee5174afd67ef32c2f128af71f7ae10adac7b04f2e3ecd5c4cc0ded86d431136e95c4e1be172868e02aae3f256ebbe3e45e64b86d48068010dafc8728d28664fdf9b2", 0x56) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000300)={@remote, r1}, 0x14) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:58 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r1, 0xa30, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x5, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x40840) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)}, 0x10) [ 806.176896][T26168] kobject: 'tx-3' (00000000ad5db3d0): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim757/net/wlan745/queues/tx-3' [ 806.191208][T26168] kobject: 'batman_adv' (000000003e85785f): kobject_add_internal: parent: 'wlan745', set: '' [ 806.202428][ T7437] kobject: 'regulatory.0' (000000005b2ac962): kobject_uevent_env [ 806.210425][ T7437] kobject: 'regulatory.0' (000000005b2ac962): fill_kobj_path: path = '/devices/platform/regulatory.0' 22:08:58 executing program 5: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001380)={@in={{0x2, 0x4e20, @multicast1}}, 0x0, 0x0, 0x0, "974bc45c3ae0c2c97471f402f787d5e2f2f7382ccbd0c660218cce1591b03dda608c8d88cb173667473cff03c2f7c03417791155c0fe6e8e8176b3d9add39edfef56d80b015d33e5fc18683fc5eb897e"}, 0xd8) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x54}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x10001, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\x10\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xf3\xc8\xdd~w\xa7\xbdZ\xe5\xa7\xda\xeb\x03\x98\xfe\xd9,\xa6\'\xb6q\x19K\xdc\"b\xf5\x8aY\\P\xf2\xdb\xdc~\xf1}K\x9d%\x1e\xe7\xe1\x12\xc3x\xa2\x19\xf3}\xfe\x8fW\xf9\x13\x1f$\xea\f3b\x1c\xcf\xcf\xb9\x9a\x8d\xa0CS\n\xfc\t\x8b\xe3EP\xc8\xa9o\xde\xf7\x17\xa95\xb125\xdb\x16\xf953\xd6\x8f\xc2\x03a\x01\xfd\x8b\xad\xea\xb2+\xb3Z0x0) ptrace$getregset(0x4204, r2, 0x205, &(0x7f0000000040)={&(0x7f0000000240)=""/232, 0xe8}) [ 806.299862][ T3875] kobject: 'loop5' (000000002beca52d): kobject_uevent_env 22:08:58 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x6, 0x6, 0x2, 0xc55b, 0x9, 0x1, 0xffffffffffffd8ce, {0x0, @in={{0x2, 0x4e22, @empty}}, 0x8, 0x3, 0x2, 0x0, 0x1000}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e23, @local}}}, &(0x7f00000000c0)=0x84) times(&(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, 0x0) 22:08:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_dev$radio(&(0x7f0000000380)='/dev/radio#\x00', 0xffffffffffffffff, 0x2)