Warning: Permanently added '10.128.0.73' (ECDSA) to the list of known hosts. 2021/04/28 05:18:10 fuzzer started 2021/04/28 05:18:10 dialing manager at 10.128.0.163:41621 2021/04/28 05:18:10 syscalls: 1982 2021/04/28 05:18:10 code coverage: enabled 2021/04/28 05:18:10 comparison tracing: enabled 2021/04/28 05:18:10 extra coverage: enabled 2021/04/28 05:18:10 setuid sandbox: enabled 2021/04/28 05:18:10 namespace sandbox: enabled 2021/04/28 05:18:10 Android sandbox: enabled 2021/04/28 05:18:10 fault injection: enabled 2021/04/28 05:18:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/28 05:18:10 net packet injection: /dev/net/tun does not exist 2021/04/28 05:18:10 net device setup: enabled 2021/04/28 05:18:10 concurrency sanitizer: enabled 2021/04/28 05:18:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/28 05:18:10 USB emulation: /dev/raw-gadget does not exist 2021/04/28 05:18:10 hci packet injection: /dev/vhci does not exist 2021/04/28 05:18:10 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/04/28 05:18:10 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/04/28 05:18:11 suppressing KCSAN reports in functions: '__ext4_new_inode' 'ext4_mark_iloc_dirty' 'tick_nohz_next_event' 'step_into' '__xa_clear_mark' 'alloc_pid' 'n_tty_receive_buf_common' 2021/04/28 05:18:11 fetching corpus: 0, signal 0/2000 (executing program) 2021/04/28 05:18:11 fetching corpus: 49, signal 18847/21794 (executing program) 2021/04/28 05:18:11 fetching corpus: 99, signal 25833/29698 (executing program) 2021/04/28 05:18:11 fetching corpus: 149, signal 32295/36777 (executing program) 2021/04/28 05:18:11 fetching corpus: 199, signal 40242/44767 (executing program) 2021/04/28 05:18:11 fetching corpus: 249, signal 44213/48983 (executing program) 2021/04/28 05:18:11 fetching corpus: 299, signal 49973/54423 (executing program) 2021/04/28 05:18:11 fetching corpus: 348, signal 53069/57474 (executing program) 2021/04/28 05:18:11 fetching corpus: 397, signal 56033/60232 (executing program) 2021/04/28 05:18:11 fetching corpus: 445, signal 59524/63260 (executing program) 2021/04/28 05:18:11 fetching corpus: 493, signal 64347/66992 (executing program) 2021/04/28 05:18:12 fetching corpus: 542, signal 67267/69204 (executing program) 2021/04/28 05:18:12 fetching corpus: 590, signal 69658/70918 (executing program) 2021/04/28 05:18:12 fetching corpus: 637, signal 70991/71830 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72365 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72419 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72467 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72511 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72559 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72596 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71693/72644 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71702/72684 (executing program) 2021/04/28 05:18:12 fetching corpus: 660, signal 71702/72721 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 71712/72776 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73156 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73191 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73231 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73264 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73294 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73342 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73384 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73428 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73467 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73493 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73528 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73577 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73602 (executing program) 2021/04/28 05:18:12 fetching corpus: 661, signal 72055/73602 (executing program) 2021/04/28 05:18:13 starting 6 fuzzer processes 05:18:13 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602000010cee80001dd0000040d000600d97f00001105000000", 0x29}], 0x1) 05:18:13 executing program 5: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x124, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}]}, 0x124}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xfff}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe4020000000100", 0x41d) 05:18:13 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x3ff, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/196) 05:18:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400028001ea0240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='errors=remount-ro,nonumtail=0']) 05:18:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0003c0130000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 21.805819][ T25] audit: type=1400 audit(1619587093.722:8): avc: denied { execmem } for pid=1785 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 21.964535][ T1791] cgroup: Unknown subsys name 'perf_event' [ 21.972882][ T1792] cgroup: Unknown subsys name 'perf_event' [ 21.987107][ T1792] cgroup: Unknown subsys name 'net_cls' [ 21.999896][ T1791] cgroup: Unknown subsys name 'net_cls' [ 22.039954][ T1797] cgroup: Unknown subsys name 'perf_event' [ 22.043219][ T1799] cgroup: Unknown subsys name 'perf_event' [ 22.045958][ T1797] cgroup: Unknown subsys name 'net_cls' [ 22.059115][ T1799] cgroup: Unknown subsys name 'net_cls' [ 22.069930][ T1801] cgroup: Unknown subsys name 'perf_event' [ 22.075951][ T1801] cgroup: Unknown subsys name 'net_cls' [ 22.097126][ T1812] cgroup: Unknown subsys name 'perf_event' [ 22.106239][ T1812] cgroup: Unknown subsys name 'net_cls' [ 26.612598][ T4495] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 26.629036][ T4496] loop4: detected capacity change from 0 to 512 [ 26.645881][ T4496] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended 05:18:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602000010cee80001dd0000040d000600d97f00001105000000", 0x29}], 0x1) 05:18:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602000010cee80001dd0000040d000600d97f00001105000000", 0x29}], 0x1) [ 26.658681][ T4496] EXT4-fs (loop4): failed to initialize system zone (-117) [ 26.681246][ T4516] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 26.694291][ T4496] EXT4-fs (loop4): mount failed 05:18:18 executing program 5: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x124, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}]}, 0x124}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xfff}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe4020000000100", 0x41d) [ 26.744192][ T4533] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 26.772942][ T4496] loop4: detected capacity change from 0 to 512 05:18:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602000010cee80001dd0000040d000600d97f00001105000000", 0x29}], 0x1) 05:18:18 executing program 5: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x124, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}]}, 0x124}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xfff}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe4020000000100", 0x41d) [ 26.789806][ T4544] loop3: detected capacity change from 0 to 270 [ 26.796092][ T4496] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 26.816266][ T4544] FAT-fs (loop3): Directory bread(block 59907) failed [ 26.830325][ T4544] FAT-fs (loop3): Directory bread(block 59908) failed 05:18:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400028001ea0240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='errors=remount-ro,nonumtail=0']) [ 26.830346][ T4544] FAT-fs (loop3): Directory bread(block 59909) failed [ 26.830365][ T4544] FAT-fs (loop3): Directory bread(block 59910) failed [ 26.847954][ T4496] EXT4-fs (loop4): failed to initialize system zone (-117) [ 26.847984][ T4496] EXT4-fs (loop4): mount failed [ 26.869137][ T4560] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 26.930065][ T4575] loop3: detected capacity change from 0 to 270 [ 26.962366][ T4575] FAT-fs (loop3): Directory bread(block 59907) failed [ 26.985801][ T4575] FAT-fs (loop3): Directory bread(block 59908) failed [ 26.998673][ T4575] FAT-fs (loop3): Directory bread(block 59909) failed [ 27.005679][ T4575] FAT-fs (loop3): Directory bread(block 59910) failed 05:18:19 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:19 executing program 5: sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x124, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6}}]}, 0x124}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xfff}, 0x10) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe4020000000100", 0x41d) 05:18:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0003c0130000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:18:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) 05:18:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x3ff, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/196) 05:18:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400028001ea0240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='errors=remount-ro,nonumtail=0']) 05:18:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x3ff, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/196) 05:18:19 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) [ 27.425740][ T4591] loop4: detected capacity change from 0 to 512 [ 27.447515][ T4596] loop3: detected capacity change from 0 to 270 [ 27.460613][ T4596] FAT-fs (loop3): Directory bread(block 59907) failed [ 27.468240][ T4596] FAT-fs (loop3): Directory bread(block 59908) failed [ 27.471341][ T4591] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 27.477480][ T4596] FAT-fs (loop3): Directory bread(block 59909) failed [ 27.491173][ T4596] FAT-fs (loop3): Directory bread(block 59910) failed 05:18:19 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x3ff, 0x7) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000180)=""/196) 05:18:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) 05:18:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000040)="eb3c906d6b66732e66617400028001ea0240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='errors=remount-ro,nonumtail=0']) [ 27.516906][ T4591] EXT4-fs (loop4): failed to initialize system zone (-117) [ 27.524216][ T4591] EXT4-fs (loop4): mount failed 05:18:19 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) [ 27.607407][ T4628] loop3: detected capacity change from 0 to 270 [ 27.628442][ T4628] FAT-fs (loop3): Directory bread(block 59907) failed [ 27.635493][ T4628] FAT-fs (loop3): Directory bread(block 59908) failed [ 27.643246][ T4628] FAT-fs (loop3): Directory bread(block 59909) failed [ 27.650342][ T4628] FAT-fs (loop3): Directory bread(block 59910) failed 05:18:20 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:20 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) 05:18:20 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) 05:18:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0003c0130000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 05:18:20 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:20 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) 05:18:20 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:20 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f0003c0130000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 28.292580][ T4650] loop4: detected capacity change from 0 to 512 [ 28.301969][ T4650] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 28.311379][ T4650] EXT4-fs (loop4): failed to initialize system zone (-117) [ 28.318790][ T4650] EXT4-fs (loop4): mount failed 05:18:20 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x88001) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "8100010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b38360054a5b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8ef6b3327d3a09ffc2c654"}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0xffffffff00d) [ 28.376070][ T4668] loop4: detected capacity change from 0 to 512 [ 28.384219][ T4668] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 28.393665][ T4668] EXT4-fs (loop4): failed to initialize system zone (-117) [ 28.401166][ T4668] EXT4-fs (loop4): mount failed 05:18:20 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:20 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) [ 28.499156][ T4685] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 05:18:21 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:21 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:21 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:21 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:21 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:21 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:21 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:21 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:21 executing program 4: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:21 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) [ 29.160972][ T4703] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 [ 29.191757][ T4717] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 05:18:21 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:21 executing program 4: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) [ 29.262899][ T4733] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 05:18:21 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:21 executing program 4: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:21 executing program 0: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:21 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:21 executing program 0: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:22 executing program 4: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:22 executing program 0: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x1) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)={[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 05:18:22 executing program 1: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003bc0)=ANY=[@ANYBLOB="7000000000000000290000000900000016168eb10d81dd87160f"], 0x1480}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/133, 0x85}, {&(0x7f00000002c0)=""/130, 0x82}, {0x0}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/153, 0x99}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000006c0)=""/244, 0xf4}], 0x9}}], 0x2102, 0x0, 0x0) 05:18:22 executing program 2: mremap(&(0x7f0000a2f000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000a7f000/0x1000)=nil) mbind(&(0x7f000063b000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f0000bd4000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5ee4, &(0x7f0000000040), &(0x7f0000a54000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) 05:18:22 executing program 5: socketpair(0x1, 0x805, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$char_usb(r2, 0x0, 0x0) [ 30.040622][ T4767] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 [ 30.070605][ T4772] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 05:18:22 executing program 4: getresgid(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 05:18:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 5: socketpair(0x1, 0x805, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$char_usb(r2, 0x0, 0x0) [ 30.121501][ T4783] SELinux: security_context_str_to_sid(root) failed for (dev tmpfs, type tmpfs) errno=-22 05:18:22 executing program 4: getresgid(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 05:18:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 05:18:22 executing program 4: getresgid(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 05:18:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 5: socketpair(0x1, 0x805, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$char_usb(r2, 0x0, 0x0) 05:18:22 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 05:18:22 executing program 4: getresgid(&(0x7f0000000000), 0xffffffffffffffff, 0x0) 05:18:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 5: socketpair(0x1, 0x805, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$char_usb(r2, 0x0, 0x0) 05:18:22 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 05:18:22 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) bind$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f00000000c0)) 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)={0x18, r1, 0x109, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) 05:18:23 executing program 3: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 3: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 4: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)={0x18, r1, 0x109, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) 05:18:23 executing program 4: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 3: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)={0x18, r1, 0x109, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) 05:18:23 executing program 4: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x43000000, 0x0, 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$unix(0x1, 0x0, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() sendmmsg$unix(r2, &(0x7f0000003f40), 0x0, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) listen(r3, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 0: sync() clock_gettime(0x0, 0x0) msgget(0x0, 0x400) 05:18:23 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mount_setattr(r0, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000280)={0x2, 0x70}, 0x20) 05:18:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0xb, 0x80}}) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)={0x18, r1, 0x109, 0x0, 0x0, {0x1c}, [@ETHTOOL_A_EEE_HEADER={0x4}]}, 0x18}}, 0x0) 05:18:23 executing program 3: unlink(&(0x7f0000000000)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 05:18:23 executing program 1: setreuid(0x0, 0xee01) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 05:18:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0x0, 0xee00) ioctl$TCGETS2(r0, 0x4b3a, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) 05:18:23 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mount_setattr(r0, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000280)={0x2, 0x70}, 0x20) [ 31.521579][ T5090] rtc_cmos 00:00: Alarms can be up to one day in the future 05:18:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0xb, 0x80}}) 05:18:23 executing program 1: setreuid(0x0, 0xee01) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 05:18:23 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mount_setattr(r0, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000280)={0x2, 0x70}, 0x20) [ 31.622086][ T5112] rtc_cmos 00:00: Alarms can be up to one day in the future 05:18:23 executing program 0: sync() clock_gettime(0x0, 0x0) msgget(0x0, 0x400) 05:18:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0x0, 0xee00) ioctl$TCGETS2(r0, 0x4b3a, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) 05:18:23 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) mount_setattr(r0, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000280)={0x2, 0x70}, 0x20) 05:18:23 executing program 1: setreuid(0x0, 0xee01) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 05:18:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0xb, 0x80}}) 05:18:23 executing program 0: sync() clock_gettime(0x0, 0x0) msgget(0x0, 0x400) 05:18:23 executing program 1: setreuid(0x0, 0xee01) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) [ 31.733776][ T5130] rtc_cmos 00:00: Alarms can be up to one day in the future 05:18:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0x0, 0xee00) ioctl$TCGETS2(r0, 0x4b3a, 0x0) 05:18:23 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000700)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0xb, 0x80}}) 05:18:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{&(0x7f0000000180)={0x2, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@flowinfo={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x93}}], 0x30}}], 0x2, 0x0) 05:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) 05:18:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setreuid(0x0, 0xee00) ioctl$TCGETS2(r0, 0x4b3a, 0x0) 05:18:23 executing program 0: sync() clock_gettime(0x0, 0x0) msgget(0x0, 0x400) 05:18:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{&(0x7f0000000180)={0x2, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@flowinfo={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x93}}], 0x30}}], 0x2, 0x0) 05:18:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb6092d696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552843516ab78c83f85cfe873f70957000dac653b3b313e587cdb091f26228ce524ec2db27bb8e3575774af29dac5aa78225147bbfefdda048d3c86d1e3583", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 31.832392][ T5146] rtc_cmos 00:00: Alarms can be up to one day in the future 05:18:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x34, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x34}}, 0x0) 05:18:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b010000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd412cc5b9eaa4e234147330c329a0f", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 05:18:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{&(0x7f0000000180)={0x2, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@flowinfo={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x93}}], 0x30}}], 0x2, 0x0) 05:18:23 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:18:23 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 05:18:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x34, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x34}}, 0x0) 05:18:23 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{&(0x7f0000000180)={0x2, 0x4e21, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, &(0x7f0000000540)=[@flowinfo={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0x93}}], 0x30}}], 0x2, 0x0) 05:18:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:23 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b010000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd412cc5b9eaa4e234147330c329a0f", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x34, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x34}}, 0x0) 05:18:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:18:24 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x34, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_MASTER={0x4}]}, 0x34}}, 0x0) 05:18:24 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 05:18:24 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb6092d696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552843516ab78c83f85cfe873f70957000dac653b3b313e587cdb091f26228ce524ec2db27bb8e3575774af29dac5aa78225147bbfefdda048d3c86d1e3583", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 05:18:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b010000ff0700008e548fe282fcaec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c3fcf2ae21ffc97ec481e7ca2c3ca4c7b3bf94448f62e111e5a79929b9182cc977ba6ae76ece37bdaac6da997fbc15f0c79f42155b99a280667b51fb8750fc3be5ef41f953fedb32aceeada13250626957e2013d5b12cc916541ccbeb0d4060a4dd89664eaba2f6b4ede0c9e3dc1c9446d9284ebe0e46eee7bc145ff0a2779c025553298812978ea53a8c60f254f23344a80a0aac7b141787bad6b0ba891e6cc85f2f3158f0d200000000000070000000000000000701000040000000afbb30c2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74a23cd8d915e2dcc74a4932642b90f90a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc75f333e1f367ab38b7e7719805a454e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x0) 05:18:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:24 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x39]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 05:18:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x30d3, &(0x7f0000000180)={0x0, 0x0, 0x16}, &(0x7f00001da000/0x3000)=nil, &(0x7f00002d5000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) 05:18:24 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b010000ff0700008e548fe282fcaec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c3fcf2ae21ffc97ec481e7ca2c3ca4c7b3bf94448f62e111e5a79929b9182cc977ba6ae76ece37bdaac6da997fbc15f0c79f42155b99a280667b51fb8750fc3be5ef41f953fedb32aceeada13250626957e2013d5b12cc916541ccbeb0d4060a4dd89664eaba2f6b4ede0c9e3dc1c9446d9284ebe0e46eee7bc145ff0a2779c025553298812978ea53a8c60f254f23344a80a0aac7b141787bad6b0ba891e6cc85f2f3158f0d200000000000070000000000000000701000040000000afbb30c2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74a23cd8d915e2dcc74a4932642b90f90a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc75f333e1f367ab38b7e7719805a454e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x0) 05:18:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b010000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd412cc5b9eaa4e234147330c329a0f", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:26 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x101040, 0x0) 05:18:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x30d3, &(0x7f0000000180)={0x0, 0x0, 0x16}, &(0x7f00001da000/0x3000)=nil, &(0x7f00002d5000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) 05:18:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:26 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) set_mempolicy(0x1, &(0x7f0000000180)=0xc5f, 0xa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}, 0x10) 05:18:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x30d3, &(0x7f0000000180)={0x0, 0x0, 0x16}, &(0x7f00001da000/0x3000)=nil, &(0x7f00002d5000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) 05:18:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) set_mempolicy(0x1, &(0x7f0000000180)=0xc5f, 0xa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}, 0x10) 05:18:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) set_mempolicy(0x1, &(0x7f0000000180)=0xc5f, 0xa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}, 0x10) 05:18:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000002a40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=""/103, 0x67}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002940)=""/233, 0xe9}}], 0x2, 0x122, 0x0) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 05:18:27 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:30 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b010000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f292b8e3f78f4bf076484885fd412cc5b9eaa4e234147330c329a0f", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 05:18:30 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x30d3, &(0x7f0000000180)={0x0, 0x0, 0x16}, &(0x7f00001da000/0x3000)=nil, &(0x7f00002d5000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000140)) 05:18:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) set_mempolicy(0x1, &(0x7f0000000180)=0xc5f, 0xa) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x35}, {0x6}]}, 0x10) 05:18:30 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:30 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:30 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x480000000000003a, 0x1, 0x0, 0x0) 05:18:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000880)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000080)="024344303031", 0x6, 0x8800}, {&(0x7f0000000280)="7247f71db5020000049390be2ac801009bce", 0x12, 0x8}], 0x0, &(0x7f0000000040)) 05:18:30 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) [ 38.172664][ T5344] loop4: detected capacity change from 0 to 264192 05:18:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000880)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000080)="024344303031", 0x6, 0x8800}, {&(0x7f0000000280)="7247f71db5020000049390be2ac801009bce", 0x12, 0x8}], 0x0, &(0x7f0000000040)) 05:18:33 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r0, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {}, @ext={0x20, &(0x7f0000000300)="31eabacf198dae2a46c53b53e46d7d9ad1460c2e5ffd809a7191356e82991251"}}], 0x38) 05:18:33 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x480000000000003a, 0x1, 0x0, 0x0) 05:18:33 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:33 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000001e005f0014f9f407faac470202000000000000000000080008000c00000000ff", 0x24) 05:18:33 executing program 2: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:33 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:33 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:33 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x480000000000003a, 0x1, 0x0, 0x0) 05:18:33 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000520001000000002d3d1e15000a"], 0x18}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 05:18:33 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r1, 0x480000000000003a, 0x1, 0x0, 0x0) [ 41.141729][ T5370] loop4: detected capacity change from 0 to 264192 [ 41.164010][ T5378] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 05:18:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000880)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000080)="024344303031", 0x6, 0x8800}, {&(0x7f0000000280)="7247f71db5020000049390be2ac801009bce", 0x12, 0x8}], 0x0, &(0x7f0000000040)) 05:18:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000001e005f0014f9f407faac470202000000000000000000080008000c00000000ff", 0x24) 05:18:33 executing program 0: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x2000, 0x80019c) fallocate(r0, 0x20, 0x80000, 0x8800000) 05:18:33 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:33 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:33 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000001e005f0014f9f407faac470202000000000000000000080008000c00000000ff", 0x24) [ 41.304992][ T5409] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 41.317901][ T5408] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 05:18:33 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:33 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) [ 41.358879][ T5410] loop4: detected capacity change from 0 to 264192 [ 41.361395][ T5424] netlink: 'syz-executor.3': attribute type 12 has an invalid length. 05:18:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000520001000000002d3d1e15000a"], 0x18}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 05:18:34 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="240000001e005f0014f9f407faac470202000000000000000000080008000c00000000ff", 0x24) 05:18:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:34 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:34 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x3, &(0x7f0000000180)=[{&(0x7f0000000880)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000002900000000000029000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000080)="024344303031", 0x6, 0x8800}, {&(0x7f0000000280)="7247f71db5020000049390be2ac801009bce", 0x12, 0x8}], 0x0, &(0x7f0000000040)) 05:18:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:34 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) [ 42.093020][ T5451] netlink: 'syz-executor.3': attribute type 12 has an invalid length. [ 42.112890][ T5456] loop4: detected capacity change from 0 to 264192 05:18:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) [ 42.179781][ T5468] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 05:18:34 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000520001000000002d3d1e15000a"], 0x18}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 05:18:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 05:18:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e22, 0xfffff801, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) 05:18:34 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39dcce) r1 = creat(&(0x7f00000015c0)='./file0\x00', 0x0) fstat(r1, &(0x7f000000f780)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='.\x00', 0x400017e) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) 05:18:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) 05:18:34 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr\x00') mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 05:18:34 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) 05:18:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) [ 43.028919][ T5515] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 05:18:35 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="7c000000520001000000002d3d1e15000a"], 0x18}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 05:18:35 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x54a0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x5422) 05:18:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) 05:18:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 05:18:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 05:18:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr\x00') mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 05:18:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr\x00') mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 05:18:35 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000000c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) 05:18:35 executing program 1: unshare(0x24000400) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000080)) 05:18:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr\x00') mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 05:18:35 executing program 2: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) [ 43.898050][ T5564] ================================================================== [ 43.906156][ T5564] BUG: KCSAN: data-race in ext4_free_inode / find_next_zero_bit [ 43.912699][ T5565] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 43.913791][ T5564] [ 43.913798][ T5564] write to 0xffff8881051b22d8 of 8 bytes by task 1792 on cpu 0: [ 43.913816][ T5564] ext4_free_inode+0x5ce/0xa00 [ 43.937843][ T5564] ext4_evict_inode+0xb7e/0xdb0 [ 43.942702][ T5564] evict+0x1c8/0x3c0 05:18:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) [ 43.946603][ T5564] iput+0x433/0x590 [ 43.950421][ T5564] do_unlinkat+0x293/0x4f0 [ 43.954861][ T5564] __x64_sys_unlink+0x2c/0x30 [ 43.959537][ T5564] do_syscall_64+0x4a/0x90 [ 43.963953][ T5564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 43.969855][ T5564] [ 43.972176][ T5564] read to 0xffff8881051b22d8 of 8 bytes by task 5564 on cpu 1: [ 43.979712][ T5564] find_next_zero_bit+0x3a/0xf0 [ 43.984560][ T5564] find_inode_bit+0x30c/0x3a0 [ 43.989237][ T5564] __ext4_new_inode+0xc6a/0x2f10 [ 43.994209][ T5564] ext4_symlink+0x2c3/0x700 [ 43.998715][ T5564] vfs_symlink+0x23a/0x300 [ 44.003137][ T5564] do_symlinkat+0xeb/0x280 [ 44.007556][ T5564] __x64_sys_symlink+0x32/0x40 [ 44.012319][ T5564] do_syscall_64+0x4a/0x90 [ 44.016734][ T5564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 44.022659][ T5564] [ 44.024962][ T5564] Reported by Kernel Concurrency Sanitizer on: [ 44.031087][ T5564] CPU: 1 PID: 5564 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 44.039424][ T5564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.049458][ T5564] ================================================================== 05:18:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 05:18:36 executing program 2: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:36 executing program 1: unshare(0x24000400) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000080)) 05:18:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) ppoll(&(0x7f0000000280)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x30c0, &(0x7f0000000140), &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000001c0)) 05:18:36 executing program 5: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:36 executing program 5: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:36 executing program 1: unshare(0x24000400) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000080)) [ 44.706830][ T25] audit: type=1326 audit(1619587116.646:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.731186][ T25] audit: type=1326 audit(1619587116.656:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 05:18:36 executing program 2: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:36 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:36 executing program 4: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) [ 44.763204][ T25] audit: type=1326 audit(1619587116.656:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 05:18:36 executing program 1: unshare(0x24000400) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000080)) [ 44.852266][ T25] audit: type=1326 audit(1619587116.656:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.904768][ T25] audit: type=1326 audit(1619587116.656:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.928919][ T25] audit: type=1326 audit(1619587116.656:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.952651][ T25] audit: type=1326 audit(1619587116.656:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.976329][ T25] audit: type=1326 audit(1619587116.656:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 44.999988][ T25] audit: type=1326 audit(1619587116.656:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 45.023654][ T25] audit: type=1326 audit(1619587116.656:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5591 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x50000 [ 45.105287][ C1] hrtimer: interrupt took 31358 ns 05:18:37 executing program 2: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:37 executing program 5: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:37 executing program 4: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:37 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:37 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:37 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:37 executing program 4: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000600)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000500)=[{}], 0x1, 0x0, 0x0, 0x0) 05:18:37 executing program 1: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 4: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 05:18:37 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 05:18:37 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) [ 45.881319][ T5687] tmpfs: Bad value for 'nr_inodes' [ 45.900796][ T5691] tmpfs: Bad value for 'nr_inodes' [ 45.992764][ T25] ================================================================== [ 46.000873][ T25] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 46.008078][ T25] [ 46.010403][ T25] write to 0xffffffff84548cd0 of 4 bytes by task 5651 on cpu 0: [ 46.018031][ T25] skb_queue_tail+0x80/0xa0 [ 46.022548][ T25] audit_log_end+0x171/0x1e0 [ 46.027224][ T25] audit_seccomp+0xd9/0xf0 [ 46.031656][ T25] __seccomp_filter+0xc97/0xe90 [ 46.036519][ T25] __secure_computing+0xfb/0x140 [ 46.041467][ T25] syscall_trace_enter+0x120/0x290 [ 46.047754][ T25] syscall_enter_from_user_mode+0x1c/0x20 [ 46.053491][ T25] do_syscall_64+0x27/0x90 [ 46.057924][ T25] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 46.063859][ T25] [ 46.066180][ T25] read to 0xffffffff84548cd0 of 4 bytes by task 25 on cpu 1: [ 46.075913][ T25] kauditd_thread+0x4dd/0x6c0 [ 46.080613][ T25] kthread+0x1d0/0x1f0 [ 46.084710][ T25] ret_from_fork+0x1f/0x30 [ 46.089130][ T25] [ 46.091448][ T25] Reported by Kernel Concurrency Sanitizer on: [ 46.097581][ T25] CPU: 1 PID: 25 Comm: kauditd Not tainted 5.12.0-syzkaller #0 [ 46.105125][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.115189][ T25] ================================================================== 05:18:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:38 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 05:18:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 05:18:38 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) [ 46.602769][ T5712] tmpfs: Bad value for 'nr_inodes' 05:18:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 05:18:38 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:38 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) [ 46.673019][ T5724] tmpfs: Bad value for 'nr_inodes' [ 46.740091][ T5733] tmpfs: Bad value for 'nr_inodes' [ 47.024011][ T5716] ================================================================== [ 47.032145][ T5716] BUG: KCSAN: data-race in audit_log_start / skb_queue_tail [ 47.039439][ T5716] [ 47.041796][ T5716] write to 0xffffffff84548cd0 of 4 bytes by task 5703 on cpu 0: [ 47.049427][ T5716] skb_queue_tail+0x80/0xa0 [ 47.053940][ T5716] audit_log_end+0x171/0x1e0 [ 47.058538][ T5716] audit_seccomp+0xd9/0xf0 [ 47.062964][ T5716] __seccomp_filter+0xc97/0xe90 [ 47.067846][ T5716] __secure_computing+0xfb/0x140 [ 47.072799][ T5716] syscall_trace_enter+0x120/0x290 [ 47.077912][ T5716] syscall_enter_from_user_mode+0x1c/0x20 [ 47.083986][ T5716] do_syscall_64+0x27/0x90 [ 47.088409][ T5716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 47.094304][ T5716] [ 47.096626][ T5716] read to 0xffffffff84548cd0 of 4 bytes by task 5716 on cpu 1: [ 47.104166][ T5716] audit_log_start+0x18c/0x6d0 [ 47.108940][ T5716] audit_seccomp+0x45/0xf0 [ 47.113383][ T5716] __seccomp_filter+0xc97/0xe90 [ 47.118244][ T5716] __secure_computing+0xfb/0x140 [ 47.123192][ T5716] syscall_trace_enter+0x120/0x290 [ 47.128418][ T5716] syscall_enter_from_user_mode+0x1c/0x20 [ 47.134139][ T5716] do_syscall_64+0x27/0x90 [ 47.138564][ T5716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 47.144469][ T5716] [ 47.146811][ T5716] Reported by Kernel Concurrency Sanitizer on: [ 47.152966][ T5716] CPU: 1 PID: 5716 Comm: syz-executor.5 Not tainted 5.12.0-syzkaller #0 [ 47.161319][ T5716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 47.171564][ T5716] ================================================================== 05:18:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:39 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) [ 47.417974][ T5744] tmpfs: Bad value for 'nr_inodes' [ 47.424300][ T5746] tmpfs: Bad value for 'nr_inodes' 05:18:39 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) 05:18:39 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) 05:18:39 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) 05:18:39 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000), 0x0, &(0x7f0000000240)={[{@nr_inodes={'nr_inodes', 0x3d, [0x59, 0x0]}}]}) [ 47.560489][ T5763] tmpfs: Bad value for 'nr_inodes' [ 47.570786][ T5765] tmpfs: Bad value for 'nr_inodes' 05:18:39 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x3ff, 0x4) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000140)=0x4, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffbbfbe, &(0x7f0000000040)={0xa, 0x4e20, 0x2, @empty}, 0x1c) [ 47.636274][ T5775] tmpfs: Bad value for 'nr_inodes' [ 47.643120][ T5776] tmpfs: Bad value for 'nr_inodes' [ 48.286295][ T25] ================================================================== [ 48.294404][ T25] BUG: KCSAN: data-race in kauditd_thread / skb_queue_tail [ 48.301604][ T25] [ 48.303922][ T25] write to 0xffffffff84548cd0 of 4 bytes by task 5766 on cpu 0: [ 48.311543][ T25] skb_queue_tail+0x80/0xa0 [ 48.316169][ T25] audit_log_end+0x171/0x1e0 [ 48.320760][ T25] audit_seccomp+0xd9/0xf0 [ 48.325173][ T25] __seccomp_filter+0xc97/0xe90 [ 48.330037][ T25] __secure_computing+0xfb/0x140 [ 48.335003][ T25] syscall_trace_enter+0x120/0x290 [ 48.340114][ T25] syscall_enter_from_user_mode+0x1c/0x20 [ 48.345838][ T25] do_syscall_64+0x27/0x90 [ 48.350261][ T25] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 48.356163][ T25] [ 48.358479][ T25] read to 0xffffffff84548cd0 of 4 bytes by task 25 on cpu 1: [ 48.365842][ T25] kauditd_thread+0x5b2/0x6c0 [ 48.370529][ T25] kthread+0x1d0/0x1f0 [ 48.374599][ T25] ret_from_fork+0x1f/0x30 [ 48.379015][ T25] 05:18:40 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:18:40 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 1: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef236393", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:40 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) [ 48.381341][ T25] Reported by Kernel Concurrency Sanitizer on: [ 48.387490][ T25] CPU: 1 PID: 25 Comm: kauditd Not tainted 5.12.0-syzkaller #0 [ 48.395036][ T25] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 48.405091][ T25] ================================================================== 05:18:40 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xffff) 05:18:40 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:40 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xffff) 05:18:40 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:40 executing program 1: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef236393", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:40 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:18:40 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xffff) 05:18:40 executing program 0: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:40 executing program 1: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000140)="0f", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee00, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x200) keyctl$read(0xb, r0, 0x0, 0x0) 05:18:40 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:18:40 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:40 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0xffff) 05:18:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001040)=""/250) 05:18:40 executing program 2: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 05:18:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001040)=""/250) 05:18:43 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef236393", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:18:43 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:18:43 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001040)=""/250) 05:18:43 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) readv(r0, &(0x7f00000010c0)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 05:18:43 executing program 2: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 05:18:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001040)=""/250) 05:18:43 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 05:18:43 executing program 2: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 05:18:43 executing program 2: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 05:18:43 executing program 1: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 05:18:43 executing program 0: io_uring_setup(0x7f29, &(0x7f00000024c0)={0x0, 0x0, 0x20, 0x2, 0x4}) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x101880, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)