31c9351f8ae43a580c64bd17d9d2a7493496906c1553746a90432306e2f3066c52c5e9f43d597e53053e4a8036660eea834a311efa5cc4ec55fbc282bad5e09dfdd4aeec8b437c5a86dd613d64e1b55314038c93a", 0x1000, 0x80000000}, {&(0x7f0000000200)="f46976de15ad2ce80c07f00dadec7a35bc3960215c03ad32aab50499cf3a0d50d110326894c4349c0f8b6ba1d686d3c3f5e6a3883bf548c4c0f963f57e1ff1f5d61e59225ffc0a7f9bb778ee31ad1786f23fe4961cf913a0329e411953f6adabcc0ce4119dccb1", 0x67, 0x3}], 0x51, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x9}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:12 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0xffff, 0x0, 0xffffffffffff8001, 0xfffffffffffffffd, 0x4, 0xffffffff}) 12:54:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x300}, 0x0) 12:54:12 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0xffff, 0x0, 0xffffffffffff8001, 0xfffffffffffffffd, 0x4, 0xffffffff}) [ 2337.100787][T23122] loop2: detected capacity change from 0 to 264192 [ 2337.102566][T23123] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2337.139633][T23123] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000014c0)=[{&(0x7f0000000100)="261857cf5f4e62d2382d3cc5ce5646a6f277da3981e53189739c23c44311f32cc6163406de16da56505f78947b2f90d0c604bf90a0a6050a718b5a98bb55c772b82839e1d9b4235bdee480873204a331f2600f7d42c9f3d670923bfc8e7a94aeb06d9c3fd906eeb5785d1142bb63090e441e020002ef0bd074f7be4dce4702bba35be529f64a22aadae309c2976e82df04083e86ec10663ac6708cf46e1299e044425c1dfb1cbeaad76170c0a1a6f3b8a48db471b837defec2f56c6cf4016599096473fcda516f461794f5f3d38be256e2c19eb8e41bb2e381918e64", 0xdc, 0xfff}, {&(0x7f00000004c0)="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", 0x1000, 0x80000000}], 0x51, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xa}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) [ 2337.234871][T23151] loop2: detected capacity change from 0 to 264192 [ 2337.320317][T23163] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2337.370346][T23167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:13 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000000)={0xffff, 0x0, 0xffffffffffff8001, 0xfffffffffffffffd, 0x4, 0xffffffff}) 12:54:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000014c0)=[{&(0x7f0000000100)="261857cf5f4e62d2382d3cc5ce5646a6f277da3981e53189739c23c44311f32cc6163406de16da56505f78947b2f90d0c604bf90a0a6050a718b5a98bb55c772b82839e1d9b4235bdee480873204a331f2600f7d42c9f3d670923bfc8e7a94aeb06d9c3fd906eeb5785d1142bb63090e441e020002ef0bd074f7be4dce4702bba35be529f64a22aadae309c2976e82df04083e86ec10663ac6708cf46e1299e044425c1dfb1cbeaad76170c0a1a6f3b8a48db471b837defec2f56c6cf4016599096473fcda516f461794f5f3d38be256e2c19eb8e41bb2e381918e64", 0xdc, 0xfff}], 0x51, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:54:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xb}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:54:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xc}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:13 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) [ 2338.070724][T23193] loop2: detected capacity change from 0 to 15 12:54:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x51, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x300}, 0x0) 12:54:13 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x300}, 0x0) 12:54:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xd}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:14 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x300}, 0x0) 12:54:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}, 0x300}, 0x0) 12:54:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) 12:54:14 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}, 0x300}, 0x0) 12:54:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:15 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}, 0x300}, 0x0) 12:54:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) 12:54:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x10}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300}, 0x0) 12:54:15 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300}, 0x0) 12:54:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0) 12:54:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x11}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:15 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300}, 0x0) 12:54:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}, {@sbsector={'sbsector', 0x3d, 0x3ff}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x12}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}, 0x300}, 0x0) 12:54:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) [ 2341.015362][T23378] __nla_validate_parse: 12 callbacks suppressed [ 2341.015373][T23378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}, 0x300}, 0x0) 12:54:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}, {@dont_appraise}]}) 12:54:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x25}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2341.215099][T23422] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2341.259487][T23422] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f0000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}, {@map_acorn}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, 0x0) 12:54:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}, 0x300}, 0x0) 12:54:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x48}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e9"], 0x1c}, 0x300}, 0x0) 12:54:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, 0x0) [ 2342.002944][T23449] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:17 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, 0x0) 12:54:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}, {@nocompress}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e9"], 0x1c}, 0x300}, 0x0) [ 2342.071882][T23449] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2342.183373][T23492] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2342.212198][T23492] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}, {@fsmagic}]}) 12:54:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e9"], 0x1c}, 0x300}, 0x0) 12:54:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffbffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x60}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)={[], [{@fsmagic={'fsmagic', 0x3d, 0xff}}]}) 12:54:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e50819194"], 0x1c}, 0x300}, 0x0) [ 2343.013417][T23528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2343.041645][T23528] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x68}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e50819194"], 0x1c}, 0x300}, 0x0) 12:54:18 executing program 0: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x18824e0, &(0x7f0000000100)) 12:54:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) [ 2343.167693][T23557] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffbff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e50819194"], 0x1c}, 0x300}, 0x0) 12:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) 12:54:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x74}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8be"], 0x1c}, 0x300}, 0x0) 12:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdf9, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7a}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:20 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) 12:54:20 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@session={'session', 0x3d, 0x1d}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe15"], 0x1c}, 0x300}, 0x0) 12:54:20 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x338}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:21 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) 12:54:21 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:21 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:54:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2346.166473][T23800] __nla_validate_parse: 11 callbacks suppressed [ 2346.166485][T23800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2346.192303][T23800] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) 12:54:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:54:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x600}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) 12:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:54:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:54:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@mode={'mode', 0x3d, 0x5}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2347.022590][T23850] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) [ 2347.069799][T23832] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:54:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) 12:54:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x700}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:54:23 executing program 5: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r0}}]}) [ 2347.952951][T23892] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe"], 0x1c}, 0x300}, 0x0) 12:54:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) 12:54:23 executing program 5: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r0}}]}) [ 2348.050991][T23892] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff97, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x900}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) 12:54:24 executing program 5: recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r0}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r0}}]}) 12:54:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) [ 2348.918934][T23957] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2348.932605][T23957] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c}}, 0x0) 12:54:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xa00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) 12:54:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}, {@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) [ 2349.056274][T23986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2349.088651][T23986] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}}, 0x0) 12:54:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227"], 0x1c}, 0x300}, 0x0) 12:54:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xb00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:25 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x29000000, &(0x7f0000000480)={[{@hide}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 12:54:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}}, 0x0) 12:54:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xc00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}}, 0x0) [ 2349.941518][T24030] ISOFS: Unable to identify CD-ROM format. 12:54:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffd, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 12:54:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000010"], 0x1c}}, 0x0) 12:54:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xd00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 12:54:26 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x24000000, &(0x7f0000000480)={[{@hide}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 12:54:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}, {@obj_type={'obj_type', 0x3d, '&!'}}]}) 12:54:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x1c}}, 0x0) 12:54:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}, {@euid_lt={'euid<', 0xee01}}]}) [ 2351.010993][T24118] ISOFS: Unable to identify CD-ROM format. 12:54:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffe, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:27 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x22000000, &(0x7f0000000480)={[{@hide}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 12:54:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1100}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x1c}}, 0x0) 12:54:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}, {@subj_user}]}) 12:54:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x1c}}, 0x0) [ 2351.842789][T24186] ISOFS: Unable to identify CD-ROM format. [ 2351.864009][T24196] __nla_validate_parse: 9 callbacks suppressed [ 2351.864025][T24196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:27 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x1c}}, 0x0) 12:54:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}]}) 12:54:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1200}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2352.005717][T24228] FAULT_INJECTION: forcing a failure. [ 2352.005717][T24228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2352.019163][T24228] CPU: 1 PID: 24228 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2352.028238][T24228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2352.038616][T24228] Call Trace: [ 2352.042159][T24228] dump_stack+0x137/0x19d [ 2352.046759][T24228] should_fail+0x23c/0x250 [ 2352.051183][T24228] should_fail_usercopy+0x16/0x20 [ 2352.056494][T24228] _copy_from_user+0x1c/0xd0 [ 2352.061381][T24228] __copy_msghdr_from_user+0x44/0x350 [ 2352.065767][T24234] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2352.066848][T24228] ? __fget_light+0x21b/0x260 [ 2352.081353][T24228] __sys_sendmsg+0x135/0x270 [ 2352.086120][T24228] ? kstrtouint_from_user+0x104/0x130 [ 2352.092145][T24228] ? do_anonymous_page+0x411/0x8b0 [ 2352.097469][T24228] ? fsnotify_perm+0x59/0x2e0 [ 2352.102343][T24228] ? __fsnotify_parent+0x32f/0x430 [ 2352.107559][T24228] ? get_pid_task+0x8b/0xc0 [ 2352.112145][T24228] ? vfs_write+0x50c/0x770 [ 2352.116740][T24228] ? __fget_light+0x21b/0x260 [ 2352.121534][T24228] ? __cond_resched+0x11/0x40 [ 2352.126382][T24228] ? fput+0x2d/0x130 [ 2352.130369][T24228] ? ksys_write+0x157/0x180 [ 2352.135311][T24228] __x64_sys_sendmsg+0x42/0x50 [ 2352.140173][T24228] do_syscall_64+0x4a/0x90 [ 2352.145557][T24228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2352.151858][T24228] RIP: 0033:0x4665f9 [ 2352.155945][T24228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2352.162353][T24234] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2352.177451][T24228] RSP: 002b:00007faed1988188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2352.177483][T24228] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:54:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x1c}}, 0x0) [ 2352.177494][T24228] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2352.177505][T24228] RBP: 00007faed19881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2352.221686][T24228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2352.230211][T24228] R13: 00007ffe7b6199bf R14: 00007faed1988300 R15: 0000000000022000 12:54:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}]}) 12:54:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x80000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:28 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1e72}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x1c}}, 0x0) 12:54:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2352.833526][T24280] FAULT_INJECTION: forcing a failure. [ 2352.833526][T24280] name failslab, interval 1, probability 0, space 0, times 0 [ 2352.846858][T24280] CPU: 1 PID: 24280 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2352.855958][T24280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2352.856942][T24283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2352.866040][T24280] Call Trace: 12:54:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@appraise_type}]}) [ 2352.866051][T24280] dump_stack+0x137/0x19d [ 2352.866075][T24280] should_fail+0x23c/0x250 [ 2352.888902][T24280] ? iovec_from_user+0x87/0x2d0 [ 2352.893959][T24280] __should_failslab+0x81/0x90 [ 2352.900028][T24280] should_failslab+0x5/0x20 [ 2352.904631][T24280] __kmalloc+0x66/0x340 [ 2352.909193][T24280] ? mntput+0x45/0x70 [ 2352.913265][T24280] iovec_from_user+0x87/0x2d0 [ 2352.918139][T24280] ? should_fail+0xd6/0x250 [ 2352.922741][T24280] __import_iovec+0x49/0x270 [ 2352.927598][T24280] ? __copy_msghdr_from_user+0x232/0x350 12:54:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x1c}}, 0x0) [ 2352.933754][T24280] import_iovec+0x69/0x80 [ 2352.938116][T24280] __sys_sendmsg+0x1ab/0x270 [ 2352.943051][T24280] ? do_anonymous_page+0x411/0x8b0 [ 2352.948272][T24280] ? fsnotify_perm+0x59/0x2e0 [ 2352.950126][T24283] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2352.953041][T24280] ? __fsnotify_parent+0x32f/0x430 [ 2352.953066][T24280] ? get_pid_task+0x8b/0xc0 [ 2352.972740][T24280] ? vfs_write+0x50c/0x770 [ 2352.977786][T24280] ? __fget_light+0x21b/0x260 [ 2352.982643][T24280] ? __cond_resched+0x11/0x40 [ 2352.987688][T24280] ? fput+0x2d/0x130 [ 2352.991753][T24280] ? ksys_write+0x157/0x180 [ 2352.996344][T24280] __x64_sys_sendmsg+0x42/0x50 [ 2353.001110][T24280] do_syscall_64+0x4a/0x90 [ 2353.005590][T24280] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2353.011953][T24280] RIP: 0033:0x4665f9 12:54:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x2000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2353.015871][T24280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2353.039565][T24280] RSP: 002b:00007faed1988188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2353.049156][T24280] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 2353.058122][T24280] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2353.066458][T24280] RBP: 00007faed19881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2353.074826][T24280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 12:54:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '@!'}}, {@subj_user}]}) 12:54:28 executing program 0 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2353.083317][T24280] R13: 00007ffe7b6199bf R14: 00007faed1988300 R15: 0000000000022000 [ 2353.112593][T24310] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2353.176523][T24310] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2353.191441][T24324] FAULT_INJECTION: forcing a failure. [ 2353.191441][T24324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2353.205092][T24324] CPU: 1 PID: 24324 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 2353.213965][T24324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:54:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x2500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2353.224715][T24324] Call Trace: [ 2353.228630][T24324] dump_stack+0x137/0x19d [ 2353.233184][T24324] should_fail+0x23c/0x250 [ 2353.238096][T24324] should_fail_usercopy+0x16/0x20 [ 2353.243437][T24324] _copy_from_user+0x1c/0xd0 [ 2353.248266][T24324] __copy_msghdr_from_user+0x44/0x350 [ 2353.253729][T24324] ? __fget_light+0x21b/0x260 [ 2353.258448][T24324] __sys_sendmsg+0x135/0x270 [ 2353.263434][T24324] ? kstrtouint_from_user+0x104/0x130 [ 2353.269130][T24324] ? do_anonymous_page+0x411/0x8b0 [ 2353.274328][T24324] ? fsnotify_perm+0x59/0x2e0 [ 2353.279117][T24324] ? __fsnotify_parent+0x32f/0x430 [ 2353.284321][T24324] ? get_pid_task+0x8b/0xc0 [ 2353.288926][T24324] ? vfs_write+0x50c/0x770 [ 2353.293684][T24324] ? __fget_light+0x21b/0x260 [ 2353.298563][T24324] ? __cond_resched+0x11/0x40 [ 2353.303589][T24324] ? fput+0x2d/0x130 [ 2353.308374][T24324] ? ksys_write+0x157/0x180 [ 2353.313157][T24324] __x64_sys_sendmsg+0x42/0x50 [ 2353.318120][T24324] do_syscall_64+0x4a/0x90 [ 2353.322811][T24324] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2353.329048][T24324] RIP: 0033:0x4665f9 [ 2353.333015][T24324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2353.353320][T24324] RSP: 002b:00007efc4b62a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2353.362544][T24324] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 12:54:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2353.370945][T24324] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2353.379544][T24324] RBP: 00007efc4b62a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2353.388050][T24324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2353.396279][T24324] R13: 00007fff08fdbd6f R14: 00007efc4b62a300 R15: 0000000000022000 [ 2353.455394][T24339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2353.519164][T24339] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:29 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:29 executing program 0 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x3803}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@subj_user}]}) 12:54:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2353.867952][T24386] FAULT_INJECTION: forcing a failure. [ 2353.867952][T24386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2353.870930][T24389] FAULT_INJECTION: forcing a failure. [ 2353.870930][T24389] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2353.881638][T24386] CPU: 0 PID: 24386 Comm: syz-executor.0 Not tainted 5.12.0-syzkaller #0 [ 2353.903924][T24386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2353.913984][T24386] Call Trace: [ 2353.917425][T24386] dump_stack+0x137/0x19d [ 2353.922202][T24386] should_fail+0x23c/0x250 [ 2353.926629][T24386] should_fail_usercopy+0x16/0x20 [ 2353.931820][T24386] _copy_from_user+0x1c/0xd0 [ 2353.936574][T24386] iovec_from_user+0xc4/0x2d0 [ 2353.941486][T24386] ? should_fail+0xd6/0x250 [ 2353.946021][T24386] __import_iovec+0x49/0x270 [ 2353.950828][T24386] ? __copy_msghdr_from_user+0x232/0x350 [ 2353.956582][T24386] import_iovec+0x69/0x80 [ 2353.960899][T24386] __sys_sendmsg+0x1ab/0x270 [ 2353.965564][T24386] ? do_anonymous_page+0x411/0x8b0 [ 2353.971107][T24386] ? fsnotify_perm+0x59/0x2e0 [ 2353.975864][T24386] ? __fsnotify_parent+0x32f/0x430 [ 2353.980996][T24386] ? get_pid_task+0x8b/0xc0 [ 2353.985489][T24386] ? vfs_write+0x50c/0x770 [ 2353.989991][T24386] ? __fget_light+0x21b/0x260 [ 2353.994932][T24386] ? __cond_resched+0x11/0x40 [ 2353.999781][T24386] ? fput+0x2d/0x130 [ 2354.003925][T24386] ? ksys_write+0x157/0x180 [ 2354.008825][T24386] __x64_sys_sendmsg+0x42/0x50 [ 2354.013591][T24386] do_syscall_64+0x4a/0x90 [ 2354.018092][T24386] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2354.024555][T24386] RIP: 0033:0x4665f9 [ 2354.028561][T24386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.048263][T24386] RSP: 002b:00007efc4b62a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2354.056910][T24386] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 2354.065143][T24386] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2354.073917][T24386] RBP: 00007efc4b62a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.082572][T24386] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2354.090983][T24386] R13: 00007fff08fdbd6f R14: 00007efc4b62a300 R15: 0000000000022000 [ 2354.099270][T24389] CPU: 1 PID: 24389 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2354.109017][T24389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2354.119526][T24389] Call Trace: [ 2354.123159][T24389] dump_stack+0x137/0x19d [ 2354.127953][T24389] should_fail+0x23c/0x250 [ 2354.132731][T24389] should_fail_usercopy+0x16/0x20 [ 2354.137752][T24389] _copy_from_user+0x1c/0xd0 [ 2354.142717][T24389] iovec_from_user+0xc4/0x2d0 [ 2354.147639][T24389] ? should_fail+0xd6/0x250 [ 2354.152931][T24389] __import_iovec+0x49/0x270 [ 2354.157591][T24389] ? __copy_msghdr_from_user+0x232/0x350 [ 2354.163319][T24389] import_iovec+0x69/0x80 [ 2354.167905][T24389] __sys_sendmsg+0x1ab/0x270 [ 2354.172584][T24389] ? do_anonymous_page+0x411/0x8b0 [ 2354.178218][T24389] ? fsnotify_perm+0x59/0x2e0 [ 2354.183063][T24389] ? __fsnotify_parent+0x32f/0x430 [ 2354.188453][T24389] ? get_pid_task+0x8b/0xc0 [ 2354.193245][T24389] ? vfs_write+0x50c/0x770 [ 2354.198033][T24389] ? __fget_light+0x21b/0x260 [ 2354.202803][T24389] ? __cond_resched+0x11/0x40 [ 2354.207998][T24389] ? fput+0x2d/0x130 [ 2354.212252][T24389] ? ksys_write+0x157/0x180 [ 2354.216887][T24389] __x64_sys_sendmsg+0x42/0x50 [ 2354.221842][T24389] do_syscall_64+0x4a/0x90 [ 2354.226534][T24389] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2354.232937][T24389] RIP: 0033:0x4665f9 [ 2354.236827][T24389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.257242][T24389] RSP: 002b:00007faed1988188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 12:54:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2354.266348][T24389] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 2354.274651][T24389] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2354.282880][T24389] RBP: 00007faed19881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.291360][T24389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2354.300678][T24389] R13: 00007ffe7b6199bf R14: 00007faed1988300 R15: 0000000000022000 12:54:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:29 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@subj_user}]}) [ 2354.417345][T24421] FAULT_INJECTION: forcing a failure. [ 2354.417345][T24421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2354.431034][T24421] CPU: 0 PID: 24421 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2354.439735][T24421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2354.450110][T24421] Call Trace: [ 2354.453586][T24421] dump_stack+0x137/0x19d [ 2354.458024][T24421] should_fail+0x23c/0x250 [ 2354.462518][T24421] should_fail_usercopy+0x16/0x20 [ 2354.467799][T24421] _copy_from_user+0x1c/0xd0 [ 2354.472645][T24421] iovec_from_user+0xc4/0x2d0 [ 2354.477341][T24421] ? should_fail+0xd6/0x250 [ 2354.481847][T24421] __import_iovec+0x49/0x270 [ 2354.486707][T24421] ? __copy_msghdr_from_user+0x232/0x350 [ 2354.492947][T24421] import_iovec+0x69/0x80 [ 2354.497372][T24421] __sys_sendmsg+0x1ab/0x270 [ 2354.502130][T24421] ? do_anonymous_page+0x411/0x8b0 [ 2354.507614][T24421] ? fsnotify_perm+0x59/0x2e0 [ 2354.512559][T24421] ? __fsnotify_parent+0x32f/0x430 [ 2354.517835][T24421] ? get_pid_task+0x8b/0xc0 [ 2354.522468][T24421] ? vfs_write+0x50c/0x770 [ 2354.526973][T24421] ? __fget_light+0x21b/0x260 [ 2354.531997][T24421] ? __cond_resched+0x11/0x40 [ 2354.537135][T24421] ? fput+0x2d/0x130 [ 2354.541028][T24421] ? ksys_write+0x157/0x180 [ 2354.546111][T24421] __x64_sys_sendmsg+0x42/0x50 [ 2354.551228][T24421] do_syscall_64+0x4a/0x90 [ 2354.555747][T24421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2354.562018][T24421] RIP: 0033:0x4665f9 [ 2354.566631][T24421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2354.591429][T24421] RSP: 002b:00007faed1988188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2354.600616][T24421] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 2354.608768][T24421] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 2354.616819][T24421] RBP: 00007faed19881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2354.625318][T24421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2354.634477][T24421] R13: 00007ffe7b6199bf R14: 00007faed1988300 R15: 0000000000022000 [ 2354.651993][T24436] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@subj_user}]}) 12:54:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:30 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:30 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2354.849046][T24478] FAULT_INJECTION: forcing a failure. [ 2354.849046][T24478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2354.851153][T24484] FAULT_INJECTION: forcing a failure. [ 2354.851153][T24484] name failslab, interval 1, probability 0, space 0, times 0 [ 2354.863459][T24478] CPU: 1 PID: 24478 Comm: syz-executor.3 Not tainted 5.12.0-syzkaller #0 [ 2354.863479][T24478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2354.863488][T24478] Call Trace: [ 2354.912720][T24478] dump_stack+0x137/0x19d [ 2354.918793][T24478] should_fail+0x23c/0x250 [ 2354.925102][T24478] should_fail_usercopy+0x16/0x20 [ 2354.931001][T24478] _copy_from_user+0x1c/0xd0 [ 2354.935790][T24478] kstrtouint_from_user+0x6f/0x130 [ 2354.941608][T24478] ? _copy_to_user+0x77/0x90 [ 2354.946283][T24478] ? fsnotify_perm+0x59/0x2e0 [ 2354.950963][T24478] proc_fail_nth_write+0x38/0x140 [ 2354.956157][T24478] ? proc_fail_nth_read+0x140/0x140 [ 2354.962095][T24478] vfs_write+0x1f3/0x770 [ 2354.966697][T24478] ? __fget_light+0x21b/0x260 [ 2354.971455][T24478] ? __cond_resched+0x11/0x40 [ 2354.976384][T24478] ksys_write+0xce/0x180 [ 2354.982620][T24478] __x64_sys_write+0x3e/0x50 [ 2354.987285][T24478] do_syscall_64+0x4a/0x90 [ 2354.992116][T24478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2354.998623][T24478] RIP: 0033:0x4192df [ 2355.002959][T24478] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2355.023298][T24478] RSP: 002b:00007faed1988170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2355.031917][T24478] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192df [ 2355.041188][T24478] RDX: 0000000000000001 RSI: 00007faed19881e0 RDI: 0000000000000004 [ 2355.049315][T24478] RBP: 00007faed19881d0 R08: 0000000000000000 R09: 0000000000000000 [ 2355.057702][T24478] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 2355.066959][T24478] R13: 00007ffe7b6199bf R14: 00007faed1988300 R15: 0000000000022000 [ 2355.075757][T24484] CPU: 0 PID: 24484 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2355.084225][T24484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2355.096690][T24484] Call Trace: [ 2355.100307][T24484] dump_stack+0x137/0x19d [ 2355.105273][T24484] should_fail+0x23c/0x250 [ 2355.110033][T24484] ? __se_sys_memfd_create+0xfb/0x390 [ 2355.115495][T24484] __should_failslab+0x81/0x90 [ 2355.120387][T24484] should_failslab+0x5/0x20 [ 2355.125032][T24484] __kmalloc+0x66/0x340 [ 2355.129236][T24484] ? strnlen_user+0x137/0x1c0 [ 2355.134096][T24484] __se_sys_memfd_create+0xfb/0x390 [ 2355.139408][T24484] __x64_sys_memfd_create+0x2d/0x40 [ 2355.144811][T24484] do_syscall_64+0x4a/0x90 [ 2355.149259][T24484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2355.155405][T24484] RIP: 0033:0x4665f9 [ 2355.159850][T24484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2355.180515][T24484] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2355.189107][T24484] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 12:54:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2355.197548][T24484] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2355.205517][T24484] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2355.213665][T24484] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 [ 2355.222321][T24484] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 12:54:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:30 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2355.391474][T24522] FAULT_INJECTION: forcing a failure. [ 2355.391474][T24522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2355.405424][T24522] CPU: 0 PID: 24522 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2355.414021][T24522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2355.424295][T24522] Call Trace: [ 2355.427680][T24522] dump_stack+0x137/0x19d [ 2355.432042][T24522] should_fail+0x23c/0x250 [ 2355.436486][T24522] should_fail_usercopy+0x16/0x20 [ 2355.442112][T24522] _copy_from_user+0x1c/0xd0 [ 2355.446824][T24522] __se_sys_memfd_create+0x137/0x390 [ 2355.452443][T24522] __x64_sys_memfd_create+0x2d/0x40 [ 2355.457885][T24522] do_syscall_64+0x4a/0x90 [ 2355.462395][T24522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2355.468476][T24522] RIP: 0033:0x4665f9 [ 2355.472501][T24522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2355.493514][T24522] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2355.502288][T24522] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2355.511747][T24522] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2355.520094][T24522] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2355.528161][T24522] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 12:54:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x3, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2355.536218][T24522] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 12:54:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7ffffffffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:31 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2355.834735][T24574] FAULT_INJECTION: forcing a failure. [ 2355.834735][T24574] name failslab, interval 1, probability 0, space 0, times 0 [ 2355.848396][T24574] CPU: 0 PID: 24574 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2355.857088][T24574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2355.867694][T24574] Call Trace: [ 2355.871476][T24574] dump_stack+0x137/0x19d [ 2355.876398][T24574] should_fail+0x23c/0x250 [ 2355.881340][T24574] ? shmem_alloc_inode+0x22/0x30 [ 2355.887209][T24574] __should_failslab+0x81/0x90 [ 2355.892343][T24574] ? shmem_match+0xa0/0xa0 [ 2355.896929][T24574] should_failslab+0x5/0x20 [ 2355.901716][T24574] kmem_cache_alloc+0x46/0x2f0 [ 2355.907189][T24574] ? do_anonymous_page+0x411/0x8b0 [ 2355.913005][T24574] ? fsnotify_perm+0x59/0x2e0 [ 2355.917849][T24574] ? shmem_match+0xa0/0xa0 [ 2355.922362][T24574] shmem_alloc_inode+0x22/0x30 [ 2355.928370][T24574] new_inode_pseudo+0x38/0x1c0 [ 2355.933481][T24574] new_inode+0x21/0x120 [ 2355.937973][T24574] shmem_get_inode+0xa1/0x480 [ 2355.943608][T24574] __shmem_file_setup+0xf1/0x1d0 [ 2355.949249][T24574] shmem_file_setup+0x37/0x40 [ 2355.954434][T24574] __se_sys_memfd_create+0x1eb/0x390 [ 2355.960609][T24574] __x64_sys_memfd_create+0x2d/0x40 [ 2355.966352][T24574] do_syscall_64+0x4a/0x90 [ 2355.970937][T24574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2355.977632][T24574] RIP: 0033:0x4665f9 [ 2355.981598][T24574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.002363][T24574] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2356.011371][T24574] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2356.019619][T24574] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2356.028316][T24574] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2356.036985][T24574] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 [ 2356.045867][T24574] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 12:54:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x2, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:31 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x5, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x721e}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2356.172274][T24606] FAULT_INJECTION: forcing a failure. [ 2356.172274][T24606] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.186305][T24606] CPU: 0 PID: 24606 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2356.195494][T24606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2356.206125][T24606] Call Trace: [ 2356.209672][T24606] dump_stack+0x137/0x19d [ 2356.214547][T24606] should_fail+0x23c/0x250 [ 2356.219490][T24606] ? security_inode_alloc+0x30/0x180 [ 2356.225293][T24606] __should_failslab+0x81/0x90 [ 2356.230350][T24606] should_failslab+0x5/0x20 [ 2356.235217][T24606] kmem_cache_alloc+0x46/0x2f0 [ 2356.240162][T24606] security_inode_alloc+0x30/0x180 [ 2356.245462][T24606] inode_init_always+0x20b/0x420 [ 2356.250792][T24606] ? shmem_match+0xa0/0xa0 [ 2356.256025][T24606] new_inode_pseudo+0x73/0x1c0 [ 2356.261780][T24606] new_inode+0x21/0x120 [ 2356.266300][T24606] shmem_get_inode+0xa1/0x480 [ 2356.271202][T24606] __shmem_file_setup+0xf1/0x1d0 [ 2356.276183][T24606] shmem_file_setup+0x37/0x40 [ 2356.280955][T24606] __se_sys_memfd_create+0x1eb/0x390 [ 2356.286513][T24606] __x64_sys_memfd_create+0x2d/0x40 [ 2356.291723][T24606] do_syscall_64+0x4a/0x90 [ 2356.296311][T24606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2356.302500][T24606] RIP: 0033:0x4665f9 [ 2356.307168][T24606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.328266][T24606] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2356.336945][T24606] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2356.345328][T24606] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2356.353831][T24606] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2356.362387][T24606] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 12:54:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:31 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x1000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2356.370869][T24606] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 12:54:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x2000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7400}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:32 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2356.804830][T24655] FAULT_INJECTION: forcing a failure. [ 2356.804830][T24655] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.821792][T24655] CPU: 1 PID: 24655 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2356.831726][T24655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2356.842869][T24655] Call Trace: [ 2356.846577][T24655] dump_stack+0x137/0x19d [ 2356.851150][T24655] should_fail+0x23c/0x250 [ 2356.855558][T24655] ? __d_alloc+0x36/0x370 [ 2356.860112][T24655] __should_failslab+0x81/0x90 [ 2356.865409][T24655] should_failslab+0x5/0x20 [ 2356.870248][T24655] kmem_cache_alloc+0x46/0x2f0 [ 2356.875040][T24655] ? __init_rwsem+0x59/0x70 [ 2356.879746][T24655] __d_alloc+0x36/0x370 [ 2356.884180][T24655] ? current_time+0xdb/0x190 [ 2356.888913][T24655] d_alloc_pseudo+0x1a/0x50 [ 2356.893545][T24655] alloc_file_pseudo+0x63/0x130 [ 2356.898409][T24655] __shmem_file_setup+0x14c/0x1d0 [ 2356.903495][T24655] shmem_file_setup+0x37/0x40 [ 2356.908260][T24655] __se_sys_memfd_create+0x1eb/0x390 [ 2356.913730][T24655] __x64_sys_memfd_create+0x2d/0x40 [ 2356.919210][T24655] do_syscall_64+0x4a/0x90 [ 2356.923625][T24655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2356.929924][T24655] RIP: 0033:0x4665f9 [ 2356.933813][T24655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.954436][T24655] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2356.956302][T24651] __nla_validate_parse: 10 callbacks suppressed [ 2356.956314][T24651] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2356.963018][T24655] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2356.963035][T24655] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2356.963046][T24655] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff 12:54:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x10000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2357.004344][T24655] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 [ 2357.013188][T24655] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 [ 2357.029481][T24651] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:32 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c02000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7a00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2357.140921][T24688] FAULT_INJECTION: forcing a failure. [ 2357.140921][T24688] name failslab, interval 1, probability 0, space 0, times 0 [ 2357.157150][T24688] CPU: 1 PID: 24688 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2357.165954][T24688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2357.176130][T24688] Call Trace: [ 2357.179495][T24688] dump_stack+0x137/0x19d [ 2357.183844][T24688] should_fail+0x23c/0x250 12:54:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c10000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2357.188338][T24688] ? __alloc_file+0x2e/0x1a0 [ 2357.193020][T24688] __should_failslab+0x81/0x90 [ 2357.197961][T24688] should_failslab+0x5/0x20 [ 2357.202783][T24688] kmem_cache_alloc+0x46/0x2f0 [ 2357.207922][T24688] ? inode_doinit_with_dentry+0x382/0x950 [ 2357.214053][T24688] __alloc_file+0x2e/0x1a0 [ 2357.218552][T24688] alloc_empty_file+0xcd/0x1c0 [ 2357.227702][T24688] alloc_file+0x3a/0x280 [ 2357.232075][T24688] alloc_file_pseudo+0xe2/0x130 [ 2357.237031][T24688] __shmem_file_setup+0x14c/0x1d0 [ 2357.242139][T24688] shmem_file_setup+0x37/0x40 [ 2357.247119][T24688] __se_sys_memfd_create+0x1eb/0x390 [ 2357.252588][T24688] __x64_sys_memfd_create+0x2d/0x40 [ 2357.258425][T24688] do_syscall_64+0x4a/0x90 [ 2357.262978][T24688] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2357.269800][T24688] RIP: 0033:0x4665f9 [ 2357.273832][T24688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2357.295488][T24688] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2357.304024][T24688] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2357.312092][T24688] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e [ 2357.320410][T24688] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2357.328712][T24688] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 [ 2357.337077][T24688] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 [ 2357.362612][T24703] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2357.387706][T24703] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x8, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000004040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:33 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x34000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:33 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2357.782703][T24730] FAULT_INJECTION: forcing a failure. [ 2357.782703][T24730] name failslab, interval 1, probability 0, space 0, times 0 [ 2357.796944][T24730] CPU: 0 PID: 24730 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2357.806325][T24730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2357.820496][T24730] Call Trace: [ 2357.824865][T24730] dump_stack+0x137/0x19d [ 2357.829679][T24730] should_fail+0x23c/0x250 [ 2357.834936][T24730] ? security_file_alloc+0x30/0x190 [ 2357.841718][T24730] __should_failslab+0x81/0x90 [ 2357.847150][T24730] should_failslab+0x5/0x20 [ 2357.852138][T24730] kmem_cache_alloc+0x46/0x2f0 [ 2357.857787][T24730] security_file_alloc+0x30/0x190 [ 2357.863705][T24730] __alloc_file+0x83/0x1a0 [ 2357.870368][T24730] alloc_empty_file+0xcd/0x1c0 [ 2357.875936][T24730] alloc_file+0x3a/0x280 [ 2357.880682][T24730] alloc_file_pseudo+0xe2/0x130 [ 2357.885781][T24730] __shmem_file_setup+0x14c/0x1d0 [ 2357.892035][T24730] shmem_file_setup+0x37/0x40 [ 2357.897397][T24730] __se_sys_memfd_create+0x1eb/0x390 [ 2357.902817][T24730] __x64_sys_memfd_create+0x2d/0x40 [ 2357.908551][T24730] do_syscall_64+0x4a/0x90 [ 2357.913582][T24730] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2357.921156][T24730] RIP: 0033:0x4665f9 [ 2357.926086][T24730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2357.950626][T24730] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2357.959792][T24730] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004665f9 [ 2357.968068][T24730] RDX: 00007f8522370000 RSI: 0000000000000000 RDI: 00000000004bee8e 12:54:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000040040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2357.976774][T24730] RBP: 0000000000000000 R08: 00007f852236fff8 R09: ffffffffffffffff [ 2357.986231][T24730] R10: 00007f852236fffc R11: 0000000000000246 R12: 0000000020000000 [ 2357.994722][T24730] R13: 0000000020000040 R14: 0000000000000000 R15: 0000000020001580 12:54:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x9, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2358.032427][T24732] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:33 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00020001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2358.115935][T24732] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2358.131246][T24763] FAULT_INJECTION: forcing a failure. [ 2358.131246][T24763] name failslab, interval 1, probability 0, space 0, times 0 [ 2358.144641][T24763] CPU: 0 PID: 24763 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2358.153760][T24763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2358.165245][T24763] Call Trace: [ 2358.168883][T24763] dump_stack+0x137/0x19d [ 2358.173747][T24763] should_fail+0x23c/0x250 [ 2358.179129][T24763] ? getname_flags+0x84/0x3d0 [ 2358.184285][T24763] __should_failslab+0x81/0x90 [ 2358.189060][T24763] should_failslab+0x5/0x20 [ 2358.194074][T24763] kmem_cache_alloc+0x46/0x2f0 [ 2358.199448][T24763] ? notify_change+0xa59/0xa80 [ 2358.204423][T24763] getname_flags+0x84/0x3d0 [ 2358.209265][T24763] ? fput+0x2d/0x130 [ 2358.213379][T24763] getname+0x15/0x20 [ 2358.217473][T24763] do_sys_openat2+0x5b/0x250 [ 2358.222418][T24763] __x64_sys_openat+0xef/0x110 [ 2358.227760][T24763] do_syscall_64+0x4a/0x90 [ 2358.232324][T24763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2358.238657][T24763] RIP: 0033:0x4196e4 [ 2358.242831][T24763] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2358.263390][T24763] RSP: 002b:00007f852236fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2358.272280][T24763] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 2358.280690][T24763] RDX: 0000000000000002 RSI: 00007f8522370000 RDI: 00000000ffffff9c [ 2358.288669][T24763] RBP: 00007f8522370000 R08: 0000000000000000 R09: ffffffffffffffff [ 2358.296748][T24763] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2358.305277][T24763] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00100001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xa, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x204000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:34 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x400300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000300040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xb, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2358.745361][T24800] FAULT_INJECTION: forcing a failure. [ 2358.745361][T24800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2358.758921][T24800] CPU: 0 PID: 24800 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2358.772639][T24800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2358.782971][T24800] Call Trace: [ 2358.786397][T24800] dump_stack+0x137/0x19d [ 2358.790738][T24800] should_fail+0x23c/0x250 [ 2358.795241][T24800] should_fail_usercopy+0x16/0x20 [ 2358.800614][T24800] strncpy_from_user+0x21/0x250 [ 2358.805611][T24800] getname_flags+0xb8/0x3d0 [ 2358.810113][T24800] getname+0x15/0x20 [ 2358.814184][T24800] do_sys_openat2+0x5b/0x250 [ 2358.820158][T24800] __x64_sys_openat+0xef/0x110 [ 2358.825329][T24800] do_syscall_64+0x4a/0x90 [ 2358.830019][T24800] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2358.836177][T24800] RIP: 0033:0x4196e4 [ 2358.840325][T24800] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2358.860291][T24800] RSP: 002b:00007f852236fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2358.869185][T24800] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 2358.877421][T24800] RDX: 0000000000000002 RSI: 00007f8522370000 RDI: 00000000ffffff9c [ 2358.885661][T24800] RBP: 00007f8522370000 R08: 0000000000000000 R09: ffffffffffffffff 12:54:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000201040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2358.895023][T24800] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2358.903785][T24800] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:34 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00001001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xd, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2358.948175][T24820] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe0ffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2359.036174][T24850] FAULT_INJECTION: forcing a failure. [ 2359.036174][T24850] name failslab, interval 1, probability 0, space 0, times 0 [ 2359.048883][T24850] CPU: 1 PID: 24850 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2359.057622][T24850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2359.068059][T24850] Call Trace: [ 2359.071540][T24850] dump_stack+0x137/0x19d [ 2359.075933][T24850] should_fail+0x23c/0x250 [ 2359.080709][T24850] ? __alloc_file+0x2e/0x1a0 [ 2359.085421][T24850] __should_failslab+0x81/0x90 [ 2359.090438][T24850] should_failslab+0x5/0x20 [ 2359.095569][T24850] kmem_cache_alloc+0x46/0x2f0 [ 2359.100480][T24850] __alloc_file+0x2e/0x1a0 [ 2359.104994][T24850] alloc_empty_file+0xcd/0x1c0 [ 2359.109446][T24863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2359.109753][T24850] path_openat+0x6a/0x20b0 [ 2359.109771][T24850] ? avc_has_perm_noaudit+0x19a/0x240 [ 2359.129010][T24850] ? kcsan_setup_watchpoint+0x26e/0x470 [ 2359.134728][T24850] ? fsnotify+0x1167/0x1190 [ 2359.140018][T24850] do_filp_open+0xd9/0x1f0 [ 2359.144435][T24850] ? __virt_addr_valid+0x15a/0x1a0 [ 2359.149638][T24850] ? __check_object_size+0x253/0x310 [ 2359.155184][T24850] ? alloc_fd+0x36d/0x3c0 [ 2359.159515][T24850] do_sys_openat2+0xa3/0x250 [ 2359.164113][T24850] __x64_sys_openat+0xef/0x110 [ 2359.169086][T24850] do_syscall_64+0x4a/0x90 [ 2359.173520][T24850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2359.179528][T24850] RIP: 0033:0x4196e4 [ 2359.183628][T24850] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2359.183666][T24863] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2359.203329][T24850] RSP: 002b:00007f852236fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2359.203376][T24850] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 2359.203387][T24850] RDX: 0000000000000002 RSI: 00007f8522370000 RDI: 00000000ffffff9c [ 2359.238258][T24850] RBP: 00007f8522370000 R08: 0000000000000000 R09: ffffffffffffffff [ 2359.246568][T24850] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2359.254659][T24850] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000040040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xe, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:34 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2359.754249][T24882] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2359.770031][T24895] FAULT_INJECTION: forcing a failure. [ 2359.770031][T24895] name failslab, interval 1, probability 0, space 0, times 0 [ 2359.782714][T24895] CPU: 0 PID: 24895 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2359.792095][T24895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2359.802708][T24895] Call Trace: [ 2359.806075][T24895] dump_stack+0x137/0x19d [ 2359.810670][T24895] should_fail+0x23c/0x250 [ 2359.815123][T24895] ? security_file_alloc+0x30/0x190 [ 2359.820403][T24895] __should_failslab+0x81/0x90 [ 2359.825467][T24895] should_failslab+0x5/0x20 [ 2359.830699][T24895] kmem_cache_alloc+0x46/0x2f0 [ 2359.835532][T24895] security_file_alloc+0x30/0x190 [ 2359.841279][T24895] __alloc_file+0x83/0x1a0 [ 2359.846492][T24895] alloc_empty_file+0xcd/0x1c0 [ 2359.851531][T24895] path_openat+0x6a/0x20b0 [ 2359.856370][T24895] ? avc_has_perm_noaudit+0x19a/0x240 [ 2359.861826][T24895] ? avc_has_perm+0x59/0x150 [ 2359.867002][T24895] ? avc_has_perm+0xc8/0x150 [ 2359.871897][T24895] ? kcsan_setup_watchpoint+0x26e/0x470 [ 2359.878197][T24895] do_filp_open+0xd9/0x1f0 [ 2359.883133][T24895] ? __virt_addr_valid+0x15a/0x1a0 [ 2359.889549][T24895] ? __check_object_size+0x253/0x310 [ 2359.895896][T24895] ? alloc_fd+0x36d/0x3c0 [ 2359.900381][T24895] do_sys_openat2+0xa3/0x250 [ 2359.905522][T24895] __x64_sys_openat+0xef/0x110 [ 2359.911186][T24895] do_syscall_64+0x4a/0x90 [ 2359.915798][T24895] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2359.924382][T24895] RIP: 0033:0x4196e4 [ 2359.928466][T24895] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2359.950480][T24895] RSP: 002b:00007f852236fed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2359.959765][T24895] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004196e4 [ 2359.968117][T24895] RDX: 0000000000000002 RSI: 00007f8522370000 RDI: 00000000ffffff9c [ 2359.978472][T24895] RBP: 00007f8522370000 R08: 0000000000000000 R09: ffffffffffffffff [ 2359.988058][T24895] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 12:54:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000004040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2359.997276][T24895] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:35 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x2000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040400000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x11, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040302000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x12, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:35 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x3000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040310000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:35 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2360.766200][T24978] FAULT_INJECTION: forcing a failure. [ 2360.766200][T24978] name failslab, interval 1, probability 0, space 0, times 0 [ 2360.779063][T24978] CPU: 1 PID: 24978 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2360.787894][T24978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2360.798116][T24978] Call Trace: [ 2360.801401][T24978] dump_stack+0x137/0x19d [ 2360.805837][T24978] should_fail+0x23c/0x250 [ 2360.810708][T24978] ? loop_set_status_from_info+0x3a0/0x3a0 [ 2360.816804][T24978] __should_failslab+0x81/0x90 [ 2360.821780][T24978] ? __kthread_create_on_node+0x7a/0x290 [ 2360.828809][T24978] should_failslab+0x5/0x20 [ 2360.833677][T24978] kmem_cache_alloc_trace+0x49/0x310 [ 2360.839271][T24978] ? loop_set_status_from_info+0x3a0/0x3a0 [ 2360.845525][T24978] __kthread_create_on_node+0x7a/0x290 [ 2360.851466][T24978] ? __cond_resched+0x11/0x40 [ 2360.856754][T24978] ? __blkdev_get+0x8c/0x6c0 [ 2360.862000][T24978] ? loop_set_status_from_info+0x3a0/0x3a0 [ 2360.868264][T24978] kthread_create_on_node+0x72/0xa0 [ 2360.874270][T24978] loop_configure+0x597/0xcb0 [ 2360.879125][T24978] ? mntput+0x45/0x70 [ 2360.883388][T24978] lo_ioctl+0x555/0x11f0 [ 2360.888148][T24978] ? path_openat+0x19ab/0x20b0 [ 2360.893987][T24978] ? putname+0xa5/0xc0 [ 2360.898330][T24978] ? ___cache_free+0x3c/0x300 [ 2360.904713][T24978] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2360.911953][T24978] ? selinux_file_ioctl+0x8e0/0x970 [ 2360.918131][T24978] ? lo_release+0x120/0x120 [ 2360.923487][T24978] blkdev_ioctl+0x1d0/0x3c0 [ 2360.928264][T24978] block_ioctl+0x6d/0x80 [ 2360.933246][T24978] ? blkdev_iopoll+0x70/0x70 [ 2360.938395][T24978] __se_sys_ioctl+0xcb/0x140 [ 2360.943638][T24978] __x64_sys_ioctl+0x3f/0x50 [ 2360.949041][T24978] do_syscall_64+0x4a/0x90 [ 2360.954048][T24978] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2360.961878][T24978] RIP: 0033:0x4663b7 [ 2360.966524][T24978] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2360.989446][T24978] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2360.998149][T24978] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2361.007713][T24978] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:54:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x48, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000001000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:36 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x3380000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2361.016220][T24978] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2361.024640][T24978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2361.033066][T24978] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:36 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2361.139138][T25010] FAULT_INJECTION: forcing a failure. [ 2361.139138][T25010] name failslab, interval 1, probability 0, space 0, times 0 [ 2361.153138][T25010] CPU: 1 PID: 25010 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2361.163120][T25010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2361.174155][T25010] Call Trace: [ 2361.177637][T25010] dump_stack+0x137/0x19d [ 2361.182387][T25010] should_fail+0x23c/0x250 [ 2361.187424][T25010] ? __kernfs_new_node+0x6a/0x330 [ 2361.193030][T25010] __should_failslab+0x81/0x90 [ 2361.198046][T25010] should_failslab+0x5/0x20 [ 2361.202727][T25010] kmem_cache_alloc+0x46/0x2f0 [ 2361.207615][T25010] ? select_idle_sibling+0x48a/0x620 [ 2361.213292][T25010] __kernfs_new_node+0x6a/0x330 [ 2361.218540][T25010] ? rb_insert_color+0x2cb/0x310 [ 2361.223617][T25010] kernfs_create_dir_ns+0x5e/0x140 [ 2361.228914][T25010] internal_create_group+0x138/0x850 [ 2361.234763][T25010] ? enqueue_task_fair+0xcd/0x510 [ 2361.239956][T25010] sysfs_create_group+0x1b/0x20 [ 2361.245289][T25010] loop_configure+0xa21/0xcb0 [ 2361.249974][T25010] lo_ioctl+0x555/0x11f0 [ 2361.254206][T25010] ? path_openat+0x19ab/0x20b0 [ 2361.259586][T25010] ? putname+0xa5/0xc0 [ 2361.263642][T25010] ? ___cache_free+0x3c/0x300 [ 2361.268723][T25010] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2361.274278][T25010] ? selinux_file_ioctl+0x8e0/0x970 [ 2361.279783][T25010] ? lo_release+0x120/0x120 12:54:36 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2361.285350][T25010] blkdev_ioctl+0x1d0/0x3c0 [ 2361.290111][T25010] block_ioctl+0x6d/0x80 [ 2361.297001][T25010] ? blkdev_iopoll+0x70/0x70 [ 2361.302646][T25010] __se_sys_ioctl+0xcb/0x140 [ 2361.308192][T25010] __x64_sys_ioctl+0x3f/0x50 [ 2361.315862][T25010] do_syscall_64+0x4a/0x90 [ 2361.322615][T25010] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2361.329510][T25010] RIP: 0033:0x4663b7 [ 2361.333766][T25010] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2361.354062][T25010] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2361.362696][T25010] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2361.370960][T25010] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2361.379321][T25010] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2361.387807][T25010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2361.396424][T25010] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x68, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000002000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:36 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x5000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:36 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2361.754782][T25057] FAULT_INJECTION: forcing a failure. [ 2361.754782][T25057] name failslab, interval 1, probability 0, space 0, times 0 [ 2361.768841][T25057] CPU: 0 PID: 25057 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2361.778244][T25057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2361.788398][T25057] Call Trace: [ 2361.792057][T25057] dump_stack+0x137/0x19d [ 2361.796566][T25057] should_fail+0x23c/0x250 [ 2361.801031][T25057] ? radix_tree_node_alloc+0x154/0x1f0 [ 2361.806954][T25057] __should_failslab+0x81/0x90 [ 2361.811991][T25057] should_failslab+0x5/0x20 [ 2361.816546][T25057] kmem_cache_alloc+0x46/0x2f0 [ 2361.821576][T25057] radix_tree_node_alloc+0x154/0x1f0 [ 2361.826951][T25057] idr_get_free+0x22a/0x5d0 [ 2361.831922][T25057] idr_alloc_cyclic+0xe3/0x2d0 [ 2361.837134][T25057] ? __radix_tree_preload+0x16f/0x190 [ 2361.843169][T25057] __kernfs_new_node+0xb4/0x330 [ 2361.848570][T25057] ? __cgroup_account_cputime+0x9b/0x1e0 [ 2361.854277][T25057] ? rb_insert_color+0x2fa/0x310 [ 2361.859203][T25057] kernfs_create_dir_ns+0x5e/0x140 [ 2361.864711][T25057] internal_create_group+0x138/0x850 [ 2361.870006][T25057] ? enqueue_task_fair+0xcd/0x510 [ 2361.875062][T25057] sysfs_create_group+0x1b/0x20 [ 2361.880017][T25057] loop_configure+0xa21/0xcb0 [ 2361.884781][T25057] lo_ioctl+0x555/0x11f0 [ 2361.889098][T25057] ? path_openat+0x19ab/0x20b0 [ 2361.894571][T25057] ? putname+0xa5/0xc0 [ 2361.898756][T25057] ? ___cache_free+0x3c/0x300 [ 2361.903832][T25057] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2361.909452][T25057] ? selinux_file_ioctl+0x8e0/0x970 [ 2361.914910][T25057] ? lo_release+0x120/0x120 [ 2361.919801][T25057] blkdev_ioctl+0x1d0/0x3c0 [ 2361.924400][T25057] block_ioctl+0x6d/0x80 [ 2361.928648][T25057] ? blkdev_iopoll+0x70/0x70 [ 2361.933319][T25057] __se_sys_ioctl+0xcb/0x140 [ 2361.938254][T25057] __x64_sys_ioctl+0x3f/0x50 [ 2361.942968][T25057] do_syscall_64+0x4a/0x90 [ 2361.947480][T25057] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2361.953740][T25057] RIP: 0033:0x4663b7 [ 2361.957728][T25057] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2361.978054][T25057] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2361.986980][T25057] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2361.995429][T25057] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:54:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6c, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000010000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300020000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300100000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2362.003907][T25057] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2362.012310][T25057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2362.020662][T25057] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x74, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000010000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2362.056270][T25080] __nla_validate_parse: 9 callbacks suppressed [ 2362.056282][T25080] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2362.118747][T25058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000020000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7a, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:37 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:37 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2362.713226][T25123] FAULT_INJECTION: forcing a failure. [ 2362.713226][T25123] name failslab, interval 1, probability 0, space 0, times 0 [ 2362.727495][T25123] CPU: 0 PID: 25123 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2362.736091][T25123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2362.746599][T25123] Call Trace: [ 2362.750056][T25123] dump_stack+0x137/0x19d [ 2362.754495][T25123] should_fail+0x23c/0x250 12:54:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2362.758698][T25128] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2362.759277][T25123] ? radix_tree_node_alloc+0x154/0x1f0 [ 2362.774992][T25123] __should_failslab+0x81/0x90 [ 2362.779928][T25123] should_failslab+0x5/0x20 [ 2362.784523][T25123] kmem_cache_alloc+0x46/0x2f0 [ 2362.789583][T25123] ? radix_tree_node_alloc+0x154/0x1f0 [ 2362.795418][T25123] radix_tree_node_alloc+0x154/0x1f0 [ 2362.800794][T25123] idr_get_free+0x22a/0x5d0 [ 2362.805300][T25123] idr_alloc_cyclic+0xe3/0x2d0 [ 2362.810148][T25123] ? __radix_tree_preload+0x16f/0x190 [ 2362.815629][T25123] __kernfs_new_node+0xb4/0x330 [ 2362.820882][T25123] ? __cgroup_account_cputime+0x9b/0x1e0 [ 2362.827183][T25123] ? rb_insert_color+0x7e/0x310 [ 2362.832239][T25123] kernfs_create_dir_ns+0x5e/0x140 [ 2362.837886][T25123] internal_create_group+0x138/0x850 [ 2362.843467][T25123] ? check_preempt_wakeup+0x1bb/0x360 [ 2362.849054][T25123] sysfs_create_group+0x1b/0x20 [ 2362.854171][T25123] loop_configure+0xa21/0xcb0 [ 2362.858893][T25123] lo_ioctl+0x555/0x11f0 12:54:38 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2362.863752][T25123] ? path_openat+0x19ab/0x20b0 [ 2362.868694][T25123] ? putname+0xa5/0xc0 [ 2362.872997][T25123] ? ___cache_free+0x3c/0x300 [ 2362.877834][T25123] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2362.883481][T25123] ? selinux_file_ioctl+0x8e0/0x970 [ 2362.888712][T25123] ? lo_release+0x120/0x120 [ 2362.893300][T25123] blkdev_ioctl+0x1d0/0x3c0 [ 2362.897849][T25123] block_ioctl+0x6d/0x80 [ 2362.902195][T25123] ? blkdev_iopoll+0x70/0x70 [ 2362.906804][T25123] __se_sys_ioctl+0xcb/0x140 [ 2362.911757][T25123] __x64_sys_ioctl+0x3f/0x50 [ 2362.916355][T25123] do_syscall_64+0x4a/0x90 [ 2362.920973][T25123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2362.926863][T25123] RIP: 0033:0x4663b7 [ 2362.930747][T25123] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2362.945006][T25140] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x300, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000100000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2362.951123][T25123] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2362.951144][T25123] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2362.977371][T25123] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2362.985716][T25123] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2362.993947][T25123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2363.002177][T25123] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 [ 2363.029838][T25140] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x30d, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000200000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:38 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x8000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2363.228055][T25176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2363.250371][T25176] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x604000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:38 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x500, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300001000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:38 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x9000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2363.678777][T25196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2363.708225][T25196] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2363.720250][T25206] FAULT_INJECTION: forcing a failure. 12:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x600, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2363.720250][T25206] name failslab, interval 1, probability 0, space 0, times 0 [ 2363.733467][T25206] CPU: 0 PID: 25206 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2363.742326][T25206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2363.753285][T25206] Call Trace: [ 2363.756613][T25206] dump_stack+0x137/0x19d [ 2363.761058][T25206] should_fail+0x23c/0x250 [ 2363.765654][T25206] ? __kernfs_new_node+0x6a/0x330 [ 2363.771086][T25206] __should_failslab+0x81/0x90 12:54:39 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xa000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000100050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2363.776917][T25206] should_failslab+0x5/0x20 [ 2363.781469][T25206] kmem_cache_alloc+0x46/0x2f0 [ 2363.786329][T25206] ? __cond_resched+0x11/0x40 [ 2363.791123][T25206] __kernfs_new_node+0x6a/0x330 [ 2363.796095][T25206] ? idr_alloc_cyclic+0x249/0x2d0 [ 2363.801324][T25206] ? rb_insert_color+0x7e/0x310 [ 2363.806361][T25206] kernfs_new_node+0x5b/0xd0 [ 2363.811371][T25206] __kernfs_create_file+0x45/0x1a0 [ 2363.816618][T25206] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2363.822504][T25206] internal_create_group+0x2e4/0x850 12:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2363.829137][T25206] sysfs_create_group+0x1b/0x20 [ 2363.834374][T25206] loop_configure+0xa21/0xcb0 [ 2363.839704][T25206] lo_ioctl+0x555/0x11f0 [ 2363.844871][T25206] ? path_openat+0x19ab/0x20b0 [ 2363.850027][T25206] ? putname+0xa5/0xc0 [ 2363.854237][T25206] ? ___cache_free+0x3c/0x300 [ 2363.859088][T25206] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2363.864485][T25206] ? selinux_file_ioctl+0x8e0/0x970 [ 2363.869886][T25206] ? lo_release+0x120/0x120 [ 2363.874554][T25206] blkdev_ioctl+0x1d0/0x3c0 12:54:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000200050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2363.879332][T25206] block_ioctl+0x6d/0x80 [ 2363.883695][T25206] ? blkdev_iopoll+0x70/0x70 [ 2363.888348][T25206] __se_sys_ioctl+0xcb/0x140 [ 2363.892953][T25206] __x64_sys_ioctl+0x3f/0x50 [ 2363.897679][T25206] do_syscall_64+0x4a/0x90 [ 2363.902288][T25206] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2363.908626][T25206] RIP: 0033:0x4663b7 [ 2363.912521][T25206] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2363.933108][T25206] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2363.942517][T25206] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2363.950750][T25206] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2363.959002][T25206] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2363.967294][T25206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2363.975637][T25206] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x900, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2364.004554][T25228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000001000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:39 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xb000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xa00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:39 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2364.671812][T25269] FAULT_INJECTION: forcing a failure. [ 2364.671812][T25269] name failslab, interval 1, probability 0, space 0, times 0 [ 2364.684631][T25269] CPU: 0 PID: 25269 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2364.693250][T25269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2364.703643][T25269] Call Trace: [ 2364.707153][T25269] dump_stack+0x137/0x19d [ 2364.711540][T25269] should_fail+0x23c/0x250 [ 2364.716648][T25269] ? __kernfs_new_node+0x6a/0x330 12:54:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000002000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2364.721998][T25269] __should_failslab+0x81/0x90 [ 2364.726976][T25269] should_failslab+0x5/0x20 [ 2364.731797][T25269] kmem_cache_alloc+0x46/0x2f0 [ 2364.736915][T25269] __kernfs_new_node+0x6a/0x330 [ 2364.742312][T25269] ? __cond_resched+0x11/0x40 [ 2364.747182][T25269] ? mutex_lock+0x9/0x30 [ 2364.751454][T25269] kernfs_new_node+0x5b/0xd0 [ 2364.756083][T25269] __kernfs_create_file+0x45/0x1a0 [ 2364.761204][T25269] sysfs_add_file_mode_ns+0x1c1/0x250 12:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xb00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2364.766894][T25269] internal_create_group+0x2e4/0x850 [ 2364.772784][T25269] sysfs_create_group+0x1b/0x20 [ 2364.777652][T25269] loop_configure+0xa21/0xcb0 [ 2364.782450][T25269] lo_ioctl+0x555/0x11f0 [ 2364.786792][T25269] ? path_openat+0x19ab/0x20b0 [ 2364.791561][T25269] ? putname+0xa5/0xc0 [ 2364.795632][T25269] ? ___cache_free+0x3c/0x300 [ 2364.800587][T25269] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2364.806741][T25269] ? selinux_file_ioctl+0x8e0/0x970 [ 2364.812421][T25269] ? lo_release+0x120/0x120 [ 2364.816955][T25269] blkdev_ioctl+0x1d0/0x3c0 12:54:40 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xc000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2364.821767][T25269] block_ioctl+0x6d/0x80 [ 2364.826137][T25269] ? blkdev_iopoll+0x70/0x70 [ 2364.830996][T25269] __se_sys_ioctl+0xcb/0x140 [ 2364.836469][T25269] __x64_sys_ioctl+0x3f/0x50 [ 2364.841174][T25269] do_syscall_64+0x4a/0x90 [ 2364.845925][T25269] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2364.852605][T25269] RIP: 0033:0x4663b7 12:54:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000010000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xc00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2364.856681][T25269] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2364.876771][T25269] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2364.885545][T25269] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2364.894111][T25269] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2364.902551][T25269] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2364.910638][T25269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2364.918700][T25269] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000001050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xd00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000002050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:40 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:40 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xd000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2365.662396][T25336] FAULT_INJECTION: forcing a failure. [ 2365.662396][T25336] name failslab, interval 1, probability 0, space 0, times 0 [ 2365.675869][T25336] CPU: 0 PID: 25336 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2365.684661][T25336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2365.695448][T25336] Call Trace: [ 2365.699202][T25336] dump_stack+0x137/0x19d [ 2365.703656][T25336] should_fail+0x23c/0x250 12:54:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000010050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xd03, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2365.708200][T25336] ? __kernfs_new_node+0x6a/0x330 [ 2365.714618][T25336] __should_failslab+0x81/0x90 [ 2365.720146][T25336] should_failslab+0x5/0x20 [ 2365.724727][T25336] kmem_cache_alloc+0x46/0x2f0 [ 2365.729708][T25336] __kernfs_new_node+0x6a/0x330 [ 2365.735174][T25336] ? __cond_resched+0x11/0x40 [ 2365.739917][T25336] ? mutex_lock+0x9/0x30 [ 2365.744158][T25336] kernfs_new_node+0x5b/0xd0 [ 2365.748838][T25336] __kernfs_create_file+0x45/0x1a0 [ 2365.754176][T25336] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2365.759798][T25336] internal_create_group+0x2e4/0x850 [ 2365.765447][T25336] sysfs_create_group+0x1b/0x20 [ 2365.770667][T25336] loop_configure+0xa21/0xcb0 [ 2365.775463][T25336] lo_ioctl+0x555/0x11f0 [ 2365.779906][T25336] ? path_openat+0x19ab/0x20b0 [ 2365.784827][T25336] ? putname+0xa5/0xc0 [ 2365.789176][T25336] ? ___cache_free+0x3c/0x300 [ 2365.793961][T25336] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2365.799401][T25336] ? selinux_file_ioctl+0x8e0/0x970 [ 2365.804603][T25336] ? lo_release+0x120/0x120 12:54:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000020000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2365.809312][T25336] blkdev_ioctl+0x1d0/0x3c0 [ 2365.814167][T25336] block_ioctl+0x6d/0x80 [ 2365.818539][T25336] ? blkdev_iopoll+0x70/0x70 [ 2365.823234][T25336] __se_sys_ioctl+0xcb/0x140 [ 2365.828051][T25336] __x64_sys_ioctl+0x3f/0x50 [ 2365.833005][T25336] do_syscall_64+0x4a/0x90 [ 2365.838001][T25336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2365.844083][T25336] RIP: 0033:0x4663b7 12:54:41 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xe00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2365.847977][T25336] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2365.868133][T25336] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2365.876855][T25336] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2365.885475][T25336] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2365.893945][T25336] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2365.902187][T25336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2365.910163][T25336] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000100000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x1100, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:41 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000200050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:41 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x10000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x0, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2366.637235][T25402] FAULT_INJECTION: forcing a failure. [ 2366.637235][T25402] name failslab, interval 1, probability 0, space 0, times 0 [ 2366.650464][T25402] CPU: 1 PID: 25402 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2366.659149][T25402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2366.669310][T25402] Call Trace: [ 2366.672683][T25402] dump_stack+0x137/0x19d [ 2366.677190][T25402] should_fail+0x23c/0x250 [ 2366.682307][T25402] ? __kernfs_new_node+0x6a/0x330 [ 2366.687572][T25402] __should_failslab+0x81/0x90 [ 2366.692979][T25402] should_failslab+0x5/0x20 [ 2366.698158][T25402] kmem_cache_alloc+0x46/0x2f0 [ 2366.703012][T25402] __kernfs_new_node+0x6a/0x330 [ 2366.708471][T25402] ? __cond_resched+0x11/0x40 [ 2366.714845][T25402] ? mutex_lock+0x9/0x30 [ 2366.719528][T25402] kernfs_new_node+0x5b/0xd0 [ 2366.724804][T25402] __kernfs_create_file+0x45/0x1a0 [ 2366.730379][T25402] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2366.735916][T25402] internal_create_group+0x2e4/0x850 [ 2366.741618][T25402] sysfs_create_group+0x1b/0x20 [ 2366.747448][T25402] loop_configure+0xa21/0xcb0 [ 2366.752327][T25402] lo_ioctl+0x555/0x11f0 [ 2366.756928][T25402] ? path_openat+0x19ab/0x20b0 [ 2366.761921][T25402] ? putname+0xa5/0xc0 [ 2366.766160][T25402] ? ___cache_free+0x3c/0x300 [ 2366.770945][T25402] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2366.777437][T25402] ? selinux_file_ioctl+0x8e0/0x970 [ 2366.783754][T25402] ? lo_release+0x120/0x120 [ 2366.788546][T25402] blkdev_ioctl+0x1d0/0x3c0 [ 2366.793222][T25402] block_ioctl+0x6d/0x80 [ 2366.797475][T25402] ? blkdev_iopoll+0x70/0x70 [ 2366.802077][T25402] __se_sys_ioctl+0xcb/0x140 [ 2366.807112][T25402] __x64_sys_ioctl+0x3f/0x50 [ 2366.811874][T25402] do_syscall_64+0x4a/0x90 [ 2366.816389][T25402] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2366.822510][T25402] RIP: 0033:0x4663b7 [ 2366.826929][T25402] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2366.848821][T25402] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2366.858026][T25402] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2366.866165][T25402] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2366.874589][T25402] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff 12:54:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x1200, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2366.883075][T25402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2366.891896][T25402] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:42 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x11000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000001000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4800, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:42 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2367.073743][T25456] FAULT_INJECTION: forcing a failure. [ 2367.073743][T25456] name failslab, interval 1, probability 0, space 0, times 0 [ 2367.087859][T25456] CPU: 0 PID: 25456 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2367.097545][T25456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2367.108131][T25456] Call Trace: [ 2367.111530][T25456] dump_stack+0x137/0x19d [ 2367.115888][T25456] should_fail+0x23c/0x250 [ 2367.120317][T25456] ? __kernfs_new_node+0x6a/0x330 [ 2367.125882][T25456] __should_failslab+0x81/0x90 [ 2367.130840][T25456] should_failslab+0x5/0x20 [ 2367.135565][T25456] kmem_cache_alloc+0x46/0x2f0 [ 2367.140419][T25456] __kernfs_new_node+0x6a/0x330 [ 2367.145641][T25456] ? __cond_resched+0x11/0x40 [ 2367.150374][T25456] ? mutex_lock+0x9/0x30 [ 2367.154987][T25456] kernfs_new_node+0x5b/0xd0 [ 2367.159970][T25456] __kernfs_create_file+0x45/0x1a0 [ 2367.166222][T25456] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2367.171818][T25456] internal_create_group+0x2e4/0x850 [ 2367.177142][T25456] sysfs_create_group+0x1b/0x20 [ 2367.182042][T25456] loop_configure+0xa21/0xcb0 [ 2367.186898][T25456] lo_ioctl+0x555/0x11f0 [ 2367.191217][T25456] ? path_openat+0x19ab/0x20b0 [ 2367.195987][T25456] ? putname+0xa5/0xc0 [ 2367.200600][T25456] ? ___cache_free+0x3c/0x300 [ 2367.205293][T25456] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2367.211325][T25456] ? selinux_file_ioctl+0x8e0/0x970 [ 2367.216625][T25456] ? lo_release+0x120/0x120 [ 2367.221423][T25456] blkdev_ioctl+0x1d0/0x3c0 [ 2367.226372][T25456] block_ioctl+0x6d/0x80 [ 2367.230981][T25456] ? blkdev_iopoll+0x70/0x70 [ 2367.235654][T25456] __se_sys_ioctl+0xcb/0x140 [ 2367.240322][T25456] __x64_sys_ioctl+0x3f/0x50 [ 2367.245276][T25456] do_syscall_64+0x4a/0x90 [ 2367.249968][T25456] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2367.256083][T25456] RIP: 0033:0x4663b7 [ 2367.260493][T25456] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2367.281082][T25456] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2367.290170][T25456] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2367.298421][T25456] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2367.306983][T25456] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2367.315666][T25456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2367.323923][T25456] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000002050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4c00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:42 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x12000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:42 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2367.614365][T25481] FAULT_INJECTION: forcing a failure. [ 2367.614365][T25481] name failslab, interval 1, probability 0, space 0, times 0 [ 2367.627356][T25481] CPU: 0 PID: 25481 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2367.636678][T25481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2367.647397][T25481] Call Trace: [ 2367.650948][T25481] dump_stack+0x137/0x19d [ 2367.655389][T25481] should_fail+0x23c/0x250 [ 2367.660036][T25481] ? __kernfs_new_node+0x6a/0x330 [ 2367.662771][T25487] __nla_validate_parse: 10 callbacks suppressed [ 2367.662782][T25487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2367.665214][T25481] __should_failslab+0x81/0x90 [ 2367.665239][T25481] should_failslab+0x5/0x20 [ 2367.665267][T25481] kmem_cache_alloc+0x46/0x2f0 [ 2367.665286][T25481] __kernfs_new_node+0x6a/0x330 [ 2367.665304][T25481] ? __cond_resched+0x11/0x40 [ 2367.665317][T25481] ? mutex_lock+0x9/0x30 12:54:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000010050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2367.665332][T25481] kernfs_new_node+0x5b/0xd0 [ 2367.665347][T25481] __kernfs_create_file+0x45/0x1a0 [ 2367.721477][T25481] sysfs_add_file_mode_ns+0x1c1/0x250 [ 2367.727929][T25481] internal_create_group+0x2e4/0x850 [ 2367.733489][T25481] sysfs_create_group+0x1b/0x20 [ 2367.735972][T25487] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2367.738787][T25481] loop_configure+0xa21/0xcb0 [ 2367.738817][T25481] lo_ioctl+0x555/0x11f0 [ 2367.738831][T25481] ? path_openat+0x19ab/0x20b0 12:54:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6800, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2367.738847][T25481] ? putname+0xa5/0xc0 [ 2367.738859][T25481] ? ___cache_free+0x3c/0x300 [ 2367.771382][T25481] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2367.776995][T25481] ? selinux_file_ioctl+0x8e0/0x970 [ 2367.782623][T25481] ? lo_release+0x120/0x120 [ 2367.787525][T25481] blkdev_ioctl+0x1d0/0x3c0 [ 2367.792427][T25481] block_ioctl+0x6d/0x80 [ 2367.796765][T25481] ? blkdev_iopoll+0x70/0x70 [ 2367.801440][T25481] __se_sys_ioctl+0xcb/0x140 [ 2367.806351][T25481] __x64_sys_ioctl+0x3f/0x50 12:54:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050200050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2367.811269][T25481] do_syscall_64+0x4a/0x90 [ 2367.815694][T25481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2367.821940][T25481] RIP: 0033:0x4663b7 [ 2367.825916][T25481] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2367.847938][T25481] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2367.857081][T25481] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 12:54:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:43 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x20000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6c00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2367.865458][T25481] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2367.874311][T25481] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2367.882368][T25481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2367.891819][T25481] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000051000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2367.970768][T25512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2367.988409][T25512] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xb00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:43 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x25000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7400, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050002050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:43 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2368.597753][T25550] FAULT_INJECTION: forcing a failure. [ 2368.597753][T25550] name failslab, interval 1, probability 0, space 0, times 0 [ 2368.608155][T25551] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2368.611532][T25550] CPU: 1 PID: 25550 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2368.629630][T25550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2368.639949][T25550] Call Trace: [ 2368.643369][T25550] dump_stack+0x137/0x19d [ 2368.647840][T25550] should_fail+0x23c/0x250 [ 2368.652297][T25550] __should_failslab+0x81/0x90 [ 2368.657072][T25550] ? kobject_uevent_env+0x1a7/0xc40 [ 2368.662539][T25550] should_failslab+0x5/0x20 [ 2368.667221][T25550] kmem_cache_alloc_trace+0x49/0x310 [ 2368.672697][T25550] ? sysfs_add_file_mode_ns+0x1c1/0x250 [ 2368.679082][T25550] ? dev_uevent_filter+0x70/0x70 [ 2368.684206][T25550] kobject_uevent_env+0x1a7/0xc40 [ 2368.689353][T25550] ? internal_create_group+0x7c9/0x850 [ 2368.694900][T25550] kobject_uevent+0x18/0x20 [ 2368.699465][T25550] loop_configure+0xb3c/0xcb0 [ 2368.704235][T25550] lo_ioctl+0x555/0x11f0 [ 2368.708618][T25550] ? path_openat+0x19ab/0x20b0 [ 2368.714621][T25550] ? putname+0xa5/0xc0 [ 2368.718803][T25550] ? ___cache_free+0x3c/0x300 [ 2368.723674][T25550] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2368.729064][T25550] ? selinux_file_ioctl+0x8e0/0x970 [ 2368.734272][T25550] ? lo_release+0x120/0x120 [ 2368.738982][T25550] blkdev_ioctl+0x1d0/0x3c0 [ 2368.743579][T25550] block_ioctl+0x6d/0x80 [ 2368.747947][T25550] ? blkdev_iopoll+0x70/0x70 [ 2368.752539][T25550] __se_sys_ioctl+0xcb/0x140 [ 2368.757158][T25550] __x64_sys_ioctl+0x3f/0x50 [ 2368.761758][T25550] do_syscall_64+0x4a/0x90 [ 2368.766276][T25550] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2368.772264][T25550] RIP: 0033:0x4663b7 [ 2368.776262][T25550] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:54:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050010050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7a00, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050003034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x20000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050808004000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:44 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x48000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2368.796320][T25550] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2368.805791][T25550] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2368.814145][T25550] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2368.822461][T25550] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2368.830849][T25550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2368.839457][T25550] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 [ 2368.905402][T25589] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2368.949101][T25589] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xc00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050802034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x34000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:44 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:44 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2369.577843][T25616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2369.580804][T25619] FAULT_INJECTION: forcing a failure. [ 2369.580804][T25619] name failslab, interval 1, probability 0, space 0, times 0 [ 2369.600875][T25619] CPU: 0 PID: 25619 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2369.609558][T25619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2369.619886][T25619] Call Trace: [ 2369.623239][T25619] dump_stack+0x137/0x19d 12:54:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050810034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2369.628009][T25619] should_fail+0x23c/0x250 [ 2369.632427][T25619] ? kzalloc+0x1d/0x30 [ 2369.636784][T25619] __should_failslab+0x81/0x90 [ 2369.641822][T25619] should_failslab+0x5/0x20 [ 2369.646689][T25619] __kmalloc+0x66/0x340 [ 2369.651244][T25619] kzalloc+0x1d/0x30 [ 2369.655973][T25619] kobject_get_path+0x7c/0x110 [ 2369.660801][T25619] kobject_uevent_env+0x1be/0xc40 [ 2369.666078][T25619] ? internal_create_group+0x7c9/0x850 [ 2369.671904][T25619] kobject_uevent+0x18/0x20 12:54:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x400300, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2369.676623][T25619] loop_configure+0xb3c/0xcb0 [ 2369.681392][T25619] lo_ioctl+0x555/0x11f0 [ 2369.685758][T25619] ? path_openat+0x19ab/0x20b0 [ 2369.690795][T25619] ? putname+0xa5/0xc0 [ 2369.695039][T25619] ? ___cache_free+0x3c/0x300 [ 2369.699901][T25619] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2369.705372][T25619] ? selinux_file_ioctl+0x8e0/0x970 [ 2369.711112][T25619] ? lo_release+0x120/0x120 [ 2369.717381][T25619] blkdev_ioctl+0x1d0/0x3c0 [ 2369.722554][T25619] block_ioctl+0x6d/0x80 12:54:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2369.727077][T25619] ? blkdev_iopoll+0x70/0x70 [ 2369.732051][T25619] __se_sys_ioctl+0xcb/0x140 [ 2369.736868][T25619] __x64_sys_ioctl+0x3f/0x50 [ 2369.741832][T25619] do_syscall_64+0x4a/0x90 [ 2369.746800][T25619] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2369.752796][T25619] RIP: 0033:0x4663b7 [ 2369.757002][T25619] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:54:45 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x60000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800404000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x1000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2369.778352][T25619] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2369.787054][T25619] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2369.795257][T25619] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2369.803237][T25619] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2369.811542][T25619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2369.819794][T25619] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800044000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2369.884706][T25650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2369.925237][T25650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xd00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x2000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:45 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x68000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034002000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:45 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x3000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2370.552333][T25687] FAULT_INJECTION: forcing a failure. [ 2370.552333][T25687] name failslab, interval 1, probability 0, space 0, times 0 [ 2370.565120][T25687] CPU: 0 PID: 25687 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2370.574061][T25687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2370.584425][T25687] Call Trace: [ 2370.587756][T25687] dump_stack+0x137/0x19d [ 2370.592236][T25687] should_fail+0x23c/0x250 [ 2370.597604][T25687] __should_failslab+0x81/0x90 12:54:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034010000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2370.602476][T25687] should_failslab+0x5/0x20 [ 2370.607052][T25687] kmem_cache_alloc_node+0x58/0x2b0 [ 2370.612536][T25687] ? __alloc_skb+0xed/0x420 [ 2370.617314][T25687] __alloc_skb+0xed/0x420 [ 2370.621799][T25687] alloc_uevent_skb+0x5b/0x120 [ 2370.626574][T25687] kobject_uevent_env+0x863/0xc40 [ 2370.632094][T25687] ? internal_create_group+0x7c9/0x850 [ 2370.637754][T25687] kobject_uevent+0x18/0x20 [ 2370.642293][T25687] loop_configure+0xb3c/0xcb0 [ 2370.647068][T25687] lo_ioctl+0x555/0x11f0 12:54:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2370.651315][T25687] ? path_openat+0x19ab/0x20b0 [ 2370.656083][T25687] ? putname+0xa5/0xc0 [ 2370.660433][T25687] ? ___cache_free+0x3c/0x300 [ 2370.665248][T25687] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2370.670861][T25687] ? selinux_file_ioctl+0x8e0/0x970 [ 2370.676067][T25687] ? lo_release+0x120/0x120 [ 2370.680658][T25687] blkdev_ioctl+0x1d0/0x3c0 [ 2370.685367][T25687] block_ioctl+0x6d/0x80 [ 2370.689758][T25687] ? blkdev_iopoll+0x70/0x70 [ 2370.694610][T25687] __se_sys_ioctl+0xcb/0x140 12:54:45 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2370.699210][T25687] __x64_sys_ioctl+0x3f/0x50 [ 2370.703902][T25687] do_syscall_64+0x4a/0x90 [ 2370.708326][T25687] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2370.715513][T25687] RIP: 0033:0x4663b7 [ 2370.719768][T25687] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2370.740346][T25687] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:54:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000020400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2370.748934][T25687] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2370.757044][T25687] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2370.765545][T25687] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2370.773982][T25687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2370.781977][T25687] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x5000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xe00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000100400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:46 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:46 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x721e0000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2371.521186][T25747] FAULT_INJECTION: forcing a failure. [ 2371.521186][T25747] name failslab, interval 1, probability 0, space 0, times 0 [ 2371.534139][T25747] CPU: 0 PID: 25747 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2371.542737][T25747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2371.552790][T25747] Call Trace: [ 2371.556786][T25747] dump_stack+0x137/0x19d [ 2371.561272][T25747] should_fail+0x23c/0x250 [ 2371.565729][T25747] __should_failslab+0x81/0x90 12:54:46 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x74000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2371.570587][T25747] should_failslab+0x5/0x20 [ 2371.575189][T25747] kmem_cache_alloc_node+0x58/0x2b0 [ 2371.580401][T25747] ? __alloc_skb+0xed/0x420 [ 2371.585119][T25747] __alloc_skb+0xed/0x420 [ 2371.589731][T25747] alloc_uevent_skb+0x5b/0x120 [ 2371.595451][T25747] kobject_uevent_env+0x863/0xc40 [ 2371.600489][T25747] ? internal_create_group+0x7c9/0x850 [ 2371.606133][T25747] kobject_uevent+0x18/0x20 [ 2371.610987][T25747] loop_configure+0xb3c/0xcb0 [ 2371.615780][T25747] lo_ioctl+0x555/0x11f0 12:54:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000402000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2371.620039][T25747] ? path_openat+0x19ab/0x20b0 [ 2371.625108][T25747] ? putname+0xa5/0xc0 [ 2371.629264][T25747] ? ___cache_free+0x3c/0x300 [ 2371.633947][T25747] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2371.639464][T25747] ? selinux_file_ioctl+0x8e0/0x970 [ 2371.644879][T25747] ? lo_release+0x120/0x120 [ 2371.649659][T25747] blkdev_ioctl+0x1d0/0x3c0 [ 2371.654733][T25747] block_ioctl+0x6d/0x80 [ 2371.659169][T25747] ? blkdev_iopoll+0x70/0x70 [ 2371.663952][T25747] __se_sys_ioctl+0xcb/0x140 12:54:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x8000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2371.668684][T25747] __x64_sys_ioctl+0x3f/0x50 [ 2371.673459][T25747] do_syscall_64+0x4a/0x90 [ 2371.677973][T25747] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2371.683908][T25747] RIP: 0033:0x4663b7 [ 2371.688153][T25747] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2371.708169][T25747] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:54:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000410000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2371.718020][T25747] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2371.726717][T25747] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2371.734778][T25747] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2371.742819][T25747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2371.750879][T25747] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x9000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:47 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7a000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:47 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400020081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xa000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400100081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2372.520332][T25819] FAULT_INJECTION: forcing a failure. [ 2372.520332][T25819] name failslab, interval 1, probability 0, space 0, times 0 [ 2372.533164][T25819] CPU: 0 PID: 25819 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2372.542015][T25819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2372.552360][T25819] Call Trace: [ 2372.555735][T25819] dump_stack+0x137/0x19d [ 2372.560158][T25819] should_fail+0x23c/0x250 [ 2372.564652][T25819] ? skb_clone+0x12c/0x1f0 [ 2372.569448][T25819] __should_failslab+0x81/0x90 [ 2372.574219][T25819] should_failslab+0x5/0x20 [ 2372.578880][T25819] kmem_cache_alloc+0x46/0x2f0 [ 2372.584067][T25819] skb_clone+0x12c/0x1f0 [ 2372.588462][T25819] netlink_broadcast_filtered+0x50d/0xb90 [ 2372.594170][T25819] ? skb_put+0xb9/0xf0 [ 2372.598487][T25819] netlink_broadcast+0x35/0x50 [ 2372.603364][T25819] kobject_uevent_env+0x8c9/0xc40 [ 2372.608480][T25819] ? internal_create_group+0x7c9/0x850 [ 2372.614086][T25819] kobject_uevent+0x18/0x20 [ 2372.618671][T25819] loop_configure+0xb3c/0xcb0 [ 2372.623356][T25819] lo_ioctl+0x555/0x11f0 [ 2372.627740][T25819] ? path_openat+0x19ab/0x20b0 [ 2372.632699][T25819] ? putname+0xa5/0xc0 [ 2372.636771][T25819] ? ___cache_free+0x3c/0x300 [ 2372.641739][T25819] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2372.647322][T25819] ? selinux_file_ioctl+0x8e0/0x970 [ 2372.652593][T25819] ? lo_release+0x120/0x120 [ 2372.657519][T25819] blkdev_ioctl+0x1d0/0x3c0 [ 2372.662110][T25819] block_ioctl+0x6d/0x80 [ 2372.666548][T25819] ? blkdev_iopoll+0x70/0x70 [ 2372.671395][T25819] __se_sys_ioctl+0xcb/0x140 [ 2372.676138][T25819] __x64_sys_ioctl+0x3f/0x50 [ 2372.681035][T25819] do_syscall_64+0x4a/0x90 [ 2372.685546][T25819] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2372.691510][T25819] RIP: 0033:0x4663b7 [ 2372.695486][T25819] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2372.716626][T25819] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2372.725322][T25819] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2372.733291][T25819] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2372.741268][T25819] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2372.749363][T25819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2372.757426][T25819] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xb000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2372.767738][T25822] __nla_validate_parse: 8 callbacks suppressed [ 2372.767748][T25822] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000281baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:48 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x9effffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xc000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400001081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2372.922042][T25860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2372.967835][T25860] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xd000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:48 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xefffffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070438ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:54:48 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2373.499480][T25900] FAULT_INJECTION: forcing a failure. [ 2373.499480][T25900] name failslab, interval 1, probability 0, space 0, times 0 [ 2373.503095][T25903] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2373.513471][T25900] CPU: 0 PID: 25900 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2373.531985][T25900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2373.542937][T25900] Call Trace: [ 2373.546650][T25900] dump_stack+0x137/0x19d [ 2373.551755][T25900] should_fail+0x23c/0x250 [ 2373.556357][T25900] __should_failslab+0x81/0x90 [ 2373.561308][T25900] ? call_usermodehelper_setup+0x81/0x160 [ 2373.567266][T25900] should_failslab+0x5/0x20 [ 2373.571961][T25900] kmem_cache_alloc_trace+0x49/0x310 [ 2373.578100][T25900] ? add_uevent_var+0x16e/0x1c0 [ 2373.583219][T25900] ? __kfree_skb+0xfe/0x150 [ 2373.587952][T25900] call_usermodehelper_setup+0x81/0x160 [ 2373.593989][T25900] ? add_uevent_var+0x1c0/0x1c0 [ 2373.599436][T25900] kobject_uevent_env+0xb29/0xc40 [ 2373.604595][T25900] ? internal_create_group+0x7c9/0x850 [ 2373.610422][T25900] kobject_uevent+0x18/0x20 [ 2373.615112][T25900] loop_configure+0xb3c/0xcb0 [ 2373.619907][T25900] lo_ioctl+0x555/0x11f0 [ 2373.624297][T25900] ? path_openat+0x19ab/0x20b0 [ 2373.629301][T25900] ? putname+0xa5/0xc0 [ 2373.633562][T25900] ? ___cache_free+0x3c/0x300 [ 2373.638630][T25900] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2373.644272][T25900] ? selinux_file_ioctl+0x8e0/0x970 [ 2373.649585][T25900] ? lo_release+0x120/0x120 [ 2373.654605][T25900] blkdev_ioctl+0x1d0/0x3c0 [ 2373.659763][T25900] block_ioctl+0x6d/0x80 [ 2373.664330][T25900] ? blkdev_iopoll+0x70/0x70 [ 2373.669521][T25900] __se_sys_ioctl+0xcb/0x140 [ 2373.674367][T25900] __x64_sys_ioctl+0x3f/0x50 [ 2373.679284][T25900] do_syscall_64+0x4a/0x90 [ 2373.684080][T25900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2373.690806][T25900] RIP: 0033:0x4663b7 [ 2373.694806][T25900] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2373.717539][T25900] RSP: 002b:00007f852236ff48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2373.726557][T25900] RAX: ffffffffffffffda RBX: 00000000004afce8 RCX: 00000000004663b7 [ 2373.734615][T25900] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:54:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xf0ffffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xd030000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x8}, 0x0) [ 2373.742963][T25900] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 2373.751114][T25900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2373.759894][T25900] R13: 0000000000000004 R14: 00000000200014c0 R15: 0000000000000000 12:54:49 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xe000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2373.823813][T25915] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2373.858649][T25921] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2373.880973][T25929] FAULT_INJECTION: forcing a failure. [ 2373.880973][T25929] name failslab, interval 1, probability 0, space 0, times 0 [ 2373.894417][T25929] CPU: 0 PID: 25929 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2373.903088][T25929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2373.913317][T25929] Call Trace: [ 2373.916696][T25929] dump_stack+0x137/0x19d [ 2373.921028][T25929] should_fail+0x23c/0x250 [ 2373.925913][T25929] ? getname_flags+0x84/0x3d0 [ 2373.931063][T25929] __should_failslab+0x81/0x90 [ 2373.935937][T25929] should_failslab+0x5/0x20 [ 2373.940980][T25929] kmem_cache_alloc+0x46/0x2f0 [ 2373.946204][T25929] ? set_next_entity+0x1b2/0x350 [ 2373.951409][T25929] ? __list_del_entry_valid+0x54/0xc0 [ 2373.957560][T25929] getname_flags+0x84/0x3d0 [ 2373.962215][T25929] do_mkdirat+0x3b/0x200 [ 2373.966591][T25929] __x64_sys_mkdir+0x32/0x40 [ 2373.971445][T25929] do_syscall_64+0x4a/0x90 [ 2373.976047][T25929] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2373.982382][T25929] RIP: 0033:0x465707 [ 2373.986499][T25929] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.007445][T25929] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2374.016137][T25929] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 12:54:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffe000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2374.024693][T25929] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2374.033067][T25929] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2374.041493][T25929] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2374.050196][T25929] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2374.102377][T25946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2374.128554][T25946] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1100000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x302}, 0x0) 12:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x10000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:49 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffff7f}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2374.468426][T25975] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2374.478714][T25969] FAULT_INJECTION: forcing a failure. [ 2374.478714][T25969] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2374.493201][T25969] CPU: 1 PID: 25969 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2374.502609][T25969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2374.514286][T25969] Call Trace: [ 2374.517652][T25969] dump_stack+0x137/0x19d [ 2374.522503][T25969] should_fail+0x23c/0x250 [ 2374.527569][T25969] should_fail_usercopy+0x16/0x20 [ 2374.532935][T25969] strncpy_from_user+0x21/0x250 [ 2374.538584][T25969] getname_flags+0xb8/0x3d0 [ 2374.543982][T25969] do_mkdirat+0x3b/0x200 [ 2374.548518][T25969] __x64_sys_mkdir+0x32/0x40 [ 2374.553201][T25969] do_syscall_64+0x4a/0x90 [ 2374.557929][T25969] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2374.564876][T25969] RIP: 0033:0x465707 [ 2374.569159][T25969] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.590114][T25969] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2374.601744][T25969] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2374.610269][T25969] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 12:54:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x310}, 0x0) 12:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x11000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2374.618812][T25969] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2374.627336][T25969] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2374.635654][T25969] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffff9e}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x12000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x4000}, 0x0) 12:54:50 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2374.796688][T26007] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2374.836207][T26020] FAULT_INJECTION: forcing a failure. [ 2374.836207][T26020] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.849873][T26020] CPU: 1 PID: 26020 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2374.858976][T26020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2374.869932][T26020] Call Trace: [ 2374.873487][T26020] dump_stack+0x137/0x19d [ 2374.878426][T26020] should_fail+0x23c/0x250 [ 2374.883292][T26020] ? __d_alloc+0x36/0x370 [ 2374.888059][T26020] __should_failslab+0x81/0x90 [ 2374.893338][T26020] should_failslab+0x5/0x20 [ 2374.897974][T26020] kmem_cache_alloc+0x46/0x2f0 [ 2374.903206][T26020] __d_alloc+0x36/0x370 [ 2374.907555][T26020] ? putname+0xa5/0xc0 [ 2374.911614][T26020] d_alloc+0x2a/0x130 [ 2374.915677][T26020] __lookup_hash+0x8f/0x180 [ 2374.920477][T26020] filename_create+0xdb/0x3c0 [ 2374.925259][T26020] do_mkdirat+0x59/0x200 [ 2374.929588][T26020] __x64_sys_mkdir+0x32/0x40 [ 2374.934358][T26020] do_syscall_64+0x4a/0x90 [ 2374.939082][T26020] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2374.945170][T26020] RIP: 0033:0x465707 [ 2374.949152][T26020] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.969274][T26020] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2374.978340][T26020] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2374.986826][T26020] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2374.995420][T26020] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2375.003672][T26020] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2375.012439][T26020] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1200000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x2}, 0x0) 12:54:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x48000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:50 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffffef}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:50 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2375.466249][T26053] FAULT_INJECTION: forcing a failure. [ 2375.466249][T26053] name failslab, interval 1, probability 0, space 0, times 0 [ 2375.479139][T26053] CPU: 0 PID: 26053 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2375.487896][T26053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2375.498802][T26053] Call Trace: [ 2375.502259][T26053] dump_stack+0x137/0x19d [ 2375.506598][T26053] should_fail+0x23c/0x250 [ 2375.511059][T26053] ? ext4_alloc_inode+0x27/0x300 [ 2375.516840][T26053] __should_failslab+0x81/0x90 [ 2375.522337][T26053] ? set_qf_name+0x230/0x230 [ 2375.527069][T26053] should_failslab+0x5/0x20 [ 2375.531769][T26053] kmem_cache_alloc+0x46/0x2f0 [ 2375.536860][T26053] ? ebitmap_destroy+0x91/0xa0 [ 2375.542099][T26053] ? set_qf_name+0x230/0x230 [ 2375.546909][T26053] ext4_alloc_inode+0x27/0x300 [ 2375.552099][T26053] ? set_qf_name+0x230/0x230 [ 2375.557050][T26053] new_inode_pseudo+0x38/0x1c0 [ 2375.562252][T26053] new_inode+0x21/0x120 [ 2375.567019][T26053] __ext4_new_inode+0x126/0x2f70 [ 2375.572150][T26053] ? __dquot_initialize+0x131/0x7e0 [ 2375.578134][T26053] ext4_mkdir+0x28a/0x760 [ 2375.583545][T26053] vfs_mkdir+0x2a4/0x370 [ 2375.588819][T26053] do_mkdirat+0x11d/0x200 [ 2375.593346][T26053] __x64_sys_mkdir+0x32/0x40 [ 2375.598186][T26053] do_syscall_64+0x4a/0x90 [ 2375.603320][T26053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2375.609496][T26053] RIP: 0033:0x465707 [ 2375.613391][T26053] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2375.634766][T26053] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2375.643441][T26053] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2375.652551][T26053] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 12:54:50 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xfffffff0}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x10}, 0x0) 12:54:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x4c000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2375.662628][T26053] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2375.671468][T26053] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2375.680034][T26053] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:50 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x1000000}, 0x0) 12:54:51 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x68000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) [ 2375.798827][T26092] FAULT_INJECTION: forcing a failure. [ 2375.798827][T26092] name failslab, interval 1, probability 0, space 0, times 0 [ 2375.812512][T26092] CPU: 1 PID: 26092 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2375.821644][T26092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2375.832047][T26092] Call Trace: [ 2375.835418][T26092] dump_stack+0x137/0x19d [ 2375.839791][T26092] should_fail+0x23c/0x250 [ 2375.844389][T26092] ? security_inode_alloc+0x30/0x180 [ 2375.850135][T26092] __should_failslab+0x81/0x90 [ 2375.855173][T26092] should_failslab+0x5/0x20 [ 2375.859861][T26092] kmem_cache_alloc+0x46/0x2f0 [ 2375.864654][T26092] security_inode_alloc+0x30/0x180 [ 2375.870464][T26092] inode_init_always+0x20b/0x420 [ 2375.875483][T26092] ? set_qf_name+0x230/0x230 [ 2375.880335][T26092] new_inode_pseudo+0x73/0x1c0 [ 2375.885894][T26092] new_inode+0x21/0x120 [ 2375.890589][T26092] __ext4_new_inode+0x126/0x2f70 [ 2375.895788][T26092] ? __dquot_initialize+0x131/0x7e0 [ 2375.901639][T26092] ext4_mkdir+0x28a/0x760 [ 2375.906807][T26092] vfs_mkdir+0x2a4/0x370 [ 2375.911551][T26092] do_mkdirat+0x11d/0x200 [ 2375.916321][T26092] __x64_sys_mkdir+0x32/0x40 [ 2375.921478][T26092] do_syscall_64+0x4a/0x90 [ 2375.926109][T26092] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2375.932278][T26092] RIP: 0033:0x465707 [ 2375.936426][T26092] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2375.957098][T26092] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2375.966117][T26092] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2375.974586][T26092] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2375.982986][T26092] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2375.991379][T26092] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2375.999972][T26092] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1300000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x2000000}, 0x0) 12:54:51 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x40030000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x6c000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:51 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x10000000}, 0x0) [ 2376.429391][T26118] FAULT_INJECTION: forcing a failure. [ 2376.429391][T26118] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.442913][T26118] CPU: 1 PID: 26118 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2376.451744][T26118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2376.463232][T26118] Call Trace: [ 2376.466547][T26118] dump_stack+0x137/0x19d [ 2376.470972][T26118] should_fail+0x23c/0x250 [ 2376.475512][T26118] ? sidtab_sid2str_get+0x9c/0x130 [ 2376.480918][T26118] __should_failslab+0x81/0x90 [ 2376.486308][T26118] should_failslab+0x5/0x20 [ 2376.490913][T26118] __kmalloc_track_caller+0x64/0x340 [ 2376.496413][T26118] kmemdup+0x21/0x50 [ 2376.501018][T26118] sidtab_sid2str_get+0x9c/0x130 [ 2376.506285][T26118] security_sid_to_context_core+0x1cb/0x2d0 [ 2376.512463][T26118] security_sid_to_context_force+0x2f/0x40 [ 2376.518924][T26118] selinux_inode_init_security+0x49e/0x550 [ 2376.524975][T26118] security_inode_init_security+0xd7/0x260 [ 2376.531149][T26118] ? ext4_init_security+0x40/0x40 [ 2376.536742][T26118] ext4_init_security+0x30/0x40 [ 2376.541923][T26118] __ext4_new_inode+0x29a1/0x2f70 [ 2376.547960][T26118] ext4_mkdir+0x28a/0x760 [ 2376.553098][T26118] vfs_mkdir+0x2a4/0x370 [ 2376.557969][T26118] do_mkdirat+0x11d/0x200 [ 2376.563029][T26118] __x64_sys_mkdir+0x32/0x40 [ 2376.568070][T26118] do_syscall_64+0x4a/0x90 [ 2376.572860][T26118] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2376.579316][T26118] RIP: 0033:0x465707 [ 2376.583635][T26118] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.604838][T26118] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2376.613641][T26118] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2376.622050][T26118] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2376.630101][T26118] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2376.638556][T26118] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2376.646785][T26118] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x74000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:51 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe0ffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x100000000000000}, 0x0) 12:54:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7a000000, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:52 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2376.818794][T26182] FAULT_INJECTION: forcing a failure. [ 2376.818794][T26182] name failslab, interval 1, probability 0, space 0, times 0 [ 2376.832197][T26182] CPU: 1 PID: 26182 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2376.841301][T26182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2376.851993][T26182] Call Trace: [ 2376.855286][T26182] dump_stack+0x137/0x19d [ 2376.860055][T26182] should_fail+0x23c/0x250 [ 2376.864601][T26182] ? sidtab_sid2str_get+0x9c/0x130 [ 2376.870202][T26182] __should_failslab+0x81/0x90 [ 2376.874986][T26182] should_failslab+0x5/0x20 [ 2376.880036][T26182] __kmalloc_track_caller+0x64/0x340 [ 2376.885578][T26182] kmemdup+0x21/0x50 [ 2376.889738][T26182] sidtab_sid2str_get+0x9c/0x130 [ 2376.894901][T26182] security_sid_to_context_core+0x1cb/0x2d0 [ 2376.901520][T26182] security_sid_to_context_force+0x2f/0x40 [ 2376.907680][T26182] selinux_inode_init_security+0x49e/0x550 [ 2376.913771][T26182] security_inode_init_security+0xd7/0x260 [ 2376.919841][T26182] ? ext4_init_security+0x40/0x40 [ 2376.925135][T26182] ext4_init_security+0x30/0x40 [ 2376.930253][T26182] __ext4_new_inode+0x29a1/0x2f70 [ 2376.935536][T26182] ext4_mkdir+0x28a/0x760 [ 2376.939943][T26182] vfs_mkdir+0x2a4/0x370 [ 2376.945052][T26182] do_mkdirat+0x11d/0x200 [ 2376.949808][T26182] __x64_sys_mkdir+0x32/0x40 [ 2376.954414][T26182] do_syscall_64+0x4a/0x90 [ 2376.959030][T26182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2376.965335][T26182] RIP: 0033:0x465707 [ 2376.969334][T26182] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2376.990246][T26182] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2376.999032][T26182] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2377.007191][T26182] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2377.015198][T26182] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2377.023800][T26182] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2377.032309][T26182] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1400000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x200000000000000}, 0x0) 12:54:52 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x100000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x9effffff, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:52 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2377.415704][T26212] FAULT_INJECTION: forcing a failure. [ 2377.415704][T26212] name failslab, interval 1, probability 0, space 0, times 0 [ 2377.428723][T26212] CPU: 1 PID: 26212 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2377.437263][T26212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2377.447743][T26212] Call Trace: [ 2377.451141][T26212] dump_stack+0x137/0x19d [ 2377.455561][T26212] should_fail+0x23c/0x250 [ 2377.460502][T26212] ? __es_insert_extent+0x51f/0xe80 12:54:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x1000000000000000}, 0x0) [ 2377.465836][T26212] __should_failslab+0x81/0x90 [ 2377.470733][T26212] should_failslab+0x5/0x20 [ 2377.475440][T26212] kmem_cache_alloc+0x46/0x2f0 [ 2377.480213][T26212] ? iput+0x1c2/0x590 [ 2377.484315][T26212] __es_insert_extent+0x51f/0xe80 [ 2377.489519][T26212] ? __kmalloc+0x23d/0x340 [ 2377.494060][T26212] ? kcalloc+0x32/0x50 [ 2377.498214][T26212] ext4_es_insert_extent+0x1bb/0x19d0 [ 2377.504037][T26212] ? ext4_ext_convert_to_initialized+0xf50/0xf50 [ 2377.510651][T26212] ext4_ext_map_blocks+0xf79/0x1f00 [ 2377.515963][T26212] ? __down_read_common+0x16b/0x5a0 [ 2377.521157][T26212] ? percpu_counter_add_batch+0x69/0xd0 [ 2377.526913][T26212] ? ext4_es_lookup_extent+0x206/0x490 [ 2377.532549][T26212] ext4_map_blocks+0x1be/0xef0 [ 2377.537514][T26212] ? kcsan_setup_watchpoint+0x26e/0x470 [ 2377.543492][T26212] ext4_getblk+0xb1/0x3d0 [ 2377.548054][T26212] ? __ext4_new_inode+0x2aed/0x2f70 [ 2377.553372][T26212] ext4_bread+0x28/0x130 [ 2377.557995][T26212] ext4_append+0xd1/0x1c0 [ 2377.562706][T26212] ext4_init_new_dir+0x177/0x500 [ 2377.567734][T26212] ext4_mkdir+0x329/0x760 [ 2377.572264][T26212] vfs_mkdir+0x2a4/0x370 [ 2377.576515][T26212] do_mkdirat+0x11d/0x200 [ 2377.581004][T26212] __x64_sys_mkdir+0x32/0x40 [ 2377.586009][T26212] do_syscall_64+0x4a/0x90 [ 2377.590604][T26212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2377.596942][T26212] RIP: 0033:0x465707 [ 2377.601200][T26212] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2377.621727][T26212] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2377.631565][T26212] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2377.640112][T26212] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2377.648295][T26212] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2377.656741][T26212] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:54:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xefffffff, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x8000000000000000}, 0x0) [ 2377.665716][T26212] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:52 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x200000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xf0ffffff, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0xffffffff00000000}, 0x0) [ 2377.807932][T26252] __nla_validate_parse: 11 callbacks suppressed [ 2377.807947][T26252] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1500000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:53 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xffffff7f, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x2}, 0x0) 12:54:53 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x300000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2378.407220][T26290] FAULT_INJECTION: forcing a failure. [ 2378.407220][T26290] name failslab, interval 1, probability 0, space 0, times 0 [ 2378.408671][T26288] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2378.421478][T26290] CPU: 0 PID: 26290 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2378.440676][T26290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2378.453904][T26290] Call Trace: [ 2378.457387][T26290] dump_stack+0x137/0x19d [ 2378.461861][T26290] should_fail+0x23c/0x250 [ 2378.466579][T26290] ? kcalloc+0x32/0x50 [ 2378.470646][T26290] __should_failslab+0x81/0x90 [ 2378.475574][T26290] should_failslab+0x5/0x20 [ 2378.480080][T26290] __kmalloc+0x66/0x340 [ 2378.484364][T26290] ? kcalloc+0x32/0x50 [ 2378.488523][T26290] kcalloc+0x32/0x50 [ 2378.492849][T26290] ext4_find_extent+0x21c/0x7f0 [ 2378.497906][T26290] ? kfree+0xf0/0x1d0 [ 2378.501983][T26290] ext4_ext_map_blocks+0xd9/0x1f00 [ 2378.507189][T26290] ? __down_write_common+0x45/0x890 [ 2378.512926][T26290] ? __down_read_common+0x16b/0x5a0 [ 2378.518324][T26290] ? percpu_counter_add_batch+0x69/0xd0 [ 2378.523984][T26290] ? ext4_es_lookup_extent+0x206/0x490 [ 2378.529747][T26290] ext4_map_blocks+0x70d/0xef0 [ 2378.534941][T26290] ext4_getblk+0xb1/0x3d0 [ 2378.539343][T26290] ext4_bread+0x28/0x130 [ 2378.544137][T26290] ext4_append+0xd1/0x1c0 [ 2378.548576][T26290] ext4_init_new_dir+0x177/0x500 [ 2378.553882][T26290] ext4_mkdir+0x329/0x760 [ 2378.558842][T26290] vfs_mkdir+0x2a4/0x370 [ 2378.563178][T26290] do_mkdirat+0x11d/0x200 [ 2378.567792][T26290] __x64_sys_mkdir+0x32/0x40 [ 2378.572392][T26290] do_syscall_64+0x4a/0x90 [ 2378.577348][T26290] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2378.583612][T26290] RIP: 0033:0x465707 [ 2378.587621][T26290] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2378.608485][T26290] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2378.618081][T26290] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2378.626192][T26290] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2378.634735][T26290] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2378.643159][T26290] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:54:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x10}, 0x0) 12:54:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xffffffef, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x1000000}, 0x0) [ 2378.651423][T26290] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0xfffffff0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}}, 0x0) 12:54:53 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x338000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2378.773842][T26337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2378.801405][T26337] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1600000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:54 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x2000000}, 0x0) 12:54:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0200000010"], 0x1c}}, 0x0) 12:54:54 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x400000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x10000000}, 0x0) [ 2379.399060][T26359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2379.412987][T26361] FAULT_INJECTION: forcing a failure. [ 2379.412987][T26361] name failslab, interval 1, probability 0, space 0, times 0 [ 2379.426348][T26361] CPU: 0 PID: 26361 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2379.435000][T26361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2379.445952][T26361] Call Trace: [ 2379.449338][T26361] dump_stack+0x137/0x19d [ 2379.454170][T26361] should_fail+0x23c/0x250 [ 2379.458812][T26361] ? ext4_mb_new_blocks+0x2e7/0x1fa0 [ 2379.464103][T26361] __should_failslab+0x81/0x90 [ 2379.468991][T26361] should_failslab+0x5/0x20 [ 2379.473564][T26361] kmem_cache_alloc+0x46/0x2f0 [ 2379.478432][T26361] ext4_mb_new_blocks+0x2e7/0x1fa0 [ 2379.483848][T26361] ? ext4_find_extent+0x6cf/0x7f0 [ 2379.489299][T26361] ? ext4_ext_search_right+0x300/0x540 [ 2379.494972][T26361] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 2379.501082][T26361] ext4_ext_map_blocks+0x1569/0x1f00 [ 2379.506636][T26361] ? __down_read_common+0x16b/0x5a0 [ 2379.512067][T26361] ? percpu_counter_add_batch+0x69/0xd0 [ 2379.517946][T26361] ? ext4_es_lookup_extent+0x206/0x490 [ 2379.523660][T26361] ext4_map_blocks+0x70d/0xef0 [ 2379.528432][T26361] ext4_getblk+0xb1/0x3d0 [ 2379.532867][T26361] ext4_bread+0x28/0x130 [ 2379.537186][T26361] ext4_append+0xd1/0x1c0 [ 2379.541867][T26361] ext4_init_new_dir+0x177/0x500 [ 2379.547086][T26361] ext4_mkdir+0x329/0x760 [ 2379.551501][T26361] vfs_mkdir+0x2a4/0x370 [ 2379.556088][T26361] do_mkdirat+0x11d/0x200 [ 2379.560910][T26361] __x64_sys_mkdir+0x32/0x40 [ 2379.565583][T26361] do_syscall_64+0x4a/0x90 [ 2379.570357][T26361] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2379.576940][T26361] RIP: 0033:0x465707 [ 2379.581150][T26361] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2379.601450][T26361] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2379.609948][T26361] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2379.618002][T26361] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2379.626376][T26361] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2379.634722][T26361] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 12:54:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0300000010"], 0x1c}}, 0x0) 12:54:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0400000010"], 0x1c}}, 0x0) [ 2379.642911][T26361] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x100000000000000}, 0x0) 12:54:55 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x500000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2379.678997][T26377] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:55 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2379.790000][T26398] FAULT_INJECTION: forcing a failure. [ 2379.790000][T26398] name failslab, interval 1, probability 0, space 0, times 0 [ 2379.802750][T26398] CPU: 0 PID: 26398 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2379.811655][T26398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2379.822035][T26398] Call Trace: [ 2379.825407][T26398] dump_stack+0x137/0x19d [ 2379.829916][T26398] should_fail+0x23c/0x250 [ 2379.834811][T26398] ? ext4_mb_new_blocks+0x6f9/0x1fa0 [ 2379.840125][T26398] __should_failslab+0x81/0x90 [ 2379.845761][T26398] should_failslab+0x5/0x20 [ 2379.850798][T26398] kmem_cache_alloc+0x46/0x2f0 [ 2379.855747][T26398] ext4_mb_new_blocks+0x6f9/0x1fa0 [ 2379.860974][T26405] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2379.861146][T26398] ? ext4_find_extent+0x6cf/0x7f0 [ 2379.875978][T26398] ? ext4_ext_search_right+0x300/0x540 [ 2379.881449][T26398] ? ext4_inode_to_goal_block+0x1bd/0x1d0 [ 2379.887494][T26398] ext4_ext_map_blocks+0x1569/0x1f00 [ 2379.892995][T26398] ? __down_read_common+0x16b/0x5a0 [ 2379.898242][T26398] ? percpu_counter_add_batch+0x69/0xd0 [ 2379.903868][T26398] ? ext4_es_lookup_extent+0x206/0x490 [ 2379.909443][T26398] ext4_map_blocks+0x70d/0xef0 [ 2379.914478][T26398] ext4_getblk+0xb1/0x3d0 [ 2379.919014][T26398] ext4_bread+0x28/0x130 [ 2379.923378][T26398] ext4_append+0xd1/0x1c0 [ 2379.927772][T26398] ext4_init_new_dir+0x177/0x500 [ 2379.932798][T26398] ext4_mkdir+0x329/0x760 [ 2379.937670][T26398] vfs_mkdir+0x2a4/0x370 [ 2379.941915][T26398] do_mkdirat+0x11d/0x200 [ 2379.946432][T26398] __x64_sys_mkdir+0x32/0x40 [ 2379.951265][T26398] do_syscall_64+0x4a/0x90 [ 2379.955728][T26398] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2379.961817][T26398] RIP: 0033:0x465707 [ 2379.965706][T26398] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2379.985410][T26398] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2379.994004][T26398] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2380.002221][T26398] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2380.010803][T26398] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff [ 2380.019258][T26398] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2380.027465][T26398] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1700000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0500000010"], 0x1c}}, 0x0) 12:54:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x200000000000000}, 0x0) 12:54:55 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x600000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:55 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2380.353274][T26430] FAULT_INJECTION: forcing a failure. [ 2380.353274][T26430] name failslab, interval 1, probability 0, space 0, times 0 [ 2380.366554][T26430] CPU: 0 PID: 26430 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2380.375656][T26430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2380.386002][T26430] Call Trace: [ 2380.389377][T26430] dump_stack+0x137/0x19d [ 2380.394080][T26430] should_fail+0x23c/0x250 [ 2380.398756][T26430] ? __es_insert_extent+0x51f/0xe80 [ 2380.403989][T26430] __should_failslab+0x81/0x90 [ 2380.409023][T26430] should_failslab+0x5/0x20 [ 2380.413552][T26430] kmem_cache_alloc+0x46/0x2f0 [ 2380.418315][T26430] __es_insert_extent+0x51f/0xe80 [ 2380.423600][T26430] ext4_es_insert_extent+0x1bb/0x19d0 [ 2380.428990][T26430] ? percpu_counter_add_batch+0xc0/0xd0 [ 2380.434542][T26430] ? ext4_es_lookup_extent+0x206/0x490 [ 2380.440616][T26430] ext4_map_blocks+0xa4c/0xef0 [ 2380.445510][T26430] ext4_getblk+0xb1/0x3d0 [ 2380.449878][T26430] ext4_bread+0x28/0x130 [ 2380.454361][T26430] ext4_append+0xd1/0x1c0 [ 2380.458870][T26430] ext4_init_new_dir+0x177/0x500 [ 2380.464491][T26430] ext4_mkdir+0x329/0x760 [ 2380.469000][T26430] vfs_mkdir+0x2a4/0x370 [ 2380.473267][T26430] do_mkdirat+0x11d/0x200 [ 2380.477715][T26430] __x64_sys_mkdir+0x32/0x40 [ 2380.482481][T26430] do_syscall_64+0x4a/0x90 [ 2380.487077][T26430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2380.493501][T26430] RIP: 0033:0x465707 [ 2380.497702][T26430] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2380.517906][T26430] RSP: 002b:00007f852236ffa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2380.526698][T26430] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000465707 [ 2380.534700][T26430] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000040 [ 2380.542732][T26430] RBP: 00007f8522370040 R08: 0000000000000000 R09: ffffffffffffffff 12:54:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x1000000000000000}, 0x0) 12:54:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0600000010"], 0x1c}}, 0x0) [ 2380.551239][T26430] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2380.559856][T26430] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2380.583953][T26434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0700000010"], 0x1c}}, 0x0) 12:54:55 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x8000000000000000}, 0x0) 12:54:55 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x700000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2380.682739][T26463] FAULT_INJECTION: forcing a failure. [ 2380.682739][T26463] name failslab, interval 1, probability 0, space 0, times 0 [ 2380.695605][T26463] CPU: 1 PID: 26463 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2380.705297][T26463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2380.717626][T26463] Call Trace: [ 2380.720991][T26463] dump_stack+0x137/0x19d [ 2380.725436][T26463] should_fail+0x23c/0x250 [ 2380.729958][T26463] ? __se_sys_mount+0x4e/0x2e0 [ 2380.734931][T26463] __should_failslab+0x81/0x90 [ 2380.739954][T26463] should_failslab+0x5/0x20 [ 2380.744693][T26463] __kmalloc_track_caller+0x64/0x340 [ 2380.750150][T26463] ? strnlen_user+0x137/0x1c0 [ 2380.755697][T26463] strndup_user+0x73/0x120 [ 2380.760688][T26463] __se_sys_mount+0x4e/0x2e0 [ 2380.765445][T26463] ? mntput+0x45/0x70 [ 2380.769918][T26463] ? __fpregs_load_activate+0x103/0x1b0 [ 2380.776178][T26463] __x64_sys_mount+0x63/0x70 [ 2380.781226][T26463] do_syscall_64+0x4a/0x90 [ 2380.785987][T26463] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2380.791934][T26463] RIP: 0033:0x467b1a [ 2380.795922][T26463] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2380.816524][T26463] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2380.825111][T26463] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2380.833802][T26463] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2380.842294][T26463] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2380.851164][T26463] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2380.859866][T26463] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2380.898082][T26475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2380.938103][T26475] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1800000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0xffffffff00000000}, 0x0) 12:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0800000010"], 0x1c}}, 0x0) 12:54:56 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:56 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2381.337842][T26498] FAULT_INJECTION: forcing a failure. [ 2381.337842][T26498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2381.351686][T26498] CPU: 0 PID: 26498 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2381.360560][T26498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2381.371788][T26498] Call Trace: [ 2381.375315][T26498] dump_stack+0x137/0x19d [ 2381.380101][T26498] should_fail+0x23c/0x250 [ 2381.384677][T26498] should_fail_usercopy+0x16/0x20 [ 2381.390091][T26498] _copy_from_user+0x1c/0xd0 [ 2381.395170][T26498] strndup_user+0xb0/0x120 [ 2381.399877][T26498] __se_sys_mount+0x4e/0x2e0 [ 2381.404608][T26498] ? mntput+0x45/0x70 [ 2381.408875][T26498] ? __fpregs_load_activate+0x103/0x1b0 [ 2381.414601][T26498] __x64_sys_mount+0x63/0x70 [ 2381.419215][T26498] do_syscall_64+0x4a/0x90 [ 2381.423746][T26498] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2381.430227][T26498] RIP: 0033:0x467b1a [ 2381.434482][T26498] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2381.455286][T26498] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2381.465633][T26498] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2381.474157][T26498] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 12:54:56 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x900000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0900000010"], 0x1c}}, 0x0) 12:54:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2381.482310][T26498] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2381.491097][T26498] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2381.499237][T26498] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0a00000010"], 0x1c}}, 0x0) 12:54:56 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x2}, 0x0) [ 2381.650298][T26540] FAULT_INJECTION: forcing a failure. [ 2381.650298][T26540] name failslab, interval 1, probability 0, space 0, times 0 [ 2381.663670][T26540] CPU: 0 PID: 26540 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2381.672536][T26540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2381.682745][T26540] Call Trace: [ 2381.686123][T26540] dump_stack+0x137/0x19d [ 2381.690708][T26540] should_fail+0x23c/0x250 [ 2381.695172][T26540] ? __se_sys_mount+0x91/0x2e0 [ 2381.700182][T26540] __should_failslab+0x81/0x90 [ 2381.705167][T26540] should_failslab+0x5/0x20 [ 2381.709732][T26540] __kmalloc_track_caller+0x64/0x340 [ 2381.717786][T26540] ? strnlen_user+0x137/0x1c0 [ 2381.722837][T26540] strndup_user+0x73/0x120 [ 2381.727358][T26540] __se_sys_mount+0x91/0x2e0 [ 2381.732376][T26540] ? mntput+0x45/0x70 [ 2381.736763][T26540] ? do_mkdirat+0x1c7/0x200 [ 2381.741546][T26540] __x64_sys_mount+0x63/0x70 [ 2381.746153][T26540] do_syscall_64+0x4a/0x90 [ 2381.750877][T26540] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2381.756991][T26540] RIP: 0033:0x467b1a [ 2381.761662][T26540] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2381.782045][T26540] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2381.790811][T26540] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2381.799626][T26540] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2381.808464][T26540] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2381.816618][T26540] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2381.825040][T26540] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1900000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0b00000010"], 0x1c}}, 0x0) 12:54:57 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xa00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x10}, 0x0) 12:54:57 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2382.357618][T26575] FAULT_INJECTION: forcing a failure. [ 2382.357618][T26575] name failslab, interval 1, probability 0, space 0, times 0 [ 2382.371784][T26575] CPU: 0 PID: 26575 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2382.382517][T26575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2382.393261][T26575] Call Trace: [ 2382.397365][T26575] dump_stack+0x137/0x19d [ 2382.407019][T26575] should_fail+0x23c/0x250 [ 2382.411909][T26575] ? __se_sys_mount+0x91/0x2e0 [ 2382.417605][T26575] __should_failslab+0x81/0x90 [ 2382.423438][T26575] should_failslab+0x5/0x20 [ 2382.428268][T26575] __kmalloc_track_caller+0x64/0x340 [ 2382.434946][T26575] ? strnlen_user+0x137/0x1c0 [ 2382.439646][T26575] strndup_user+0x73/0x120 [ 2382.444434][T26575] __se_sys_mount+0x91/0x2e0 [ 2382.449053][T26575] ? mntput+0x45/0x70 [ 2382.453378][T26575] ? do_mkdirat+0x1c7/0x200 [ 2382.459019][T26575] __x64_sys_mount+0x63/0x70 [ 2382.464277][T26575] do_syscall_64+0x4a/0x90 [ 2382.469231][T26575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2382.475462][T26575] RIP: 0033:0x467b1a [ 2382.479622][T26575] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0c00000010"], 0x1c}}, 0x0) 12:54:57 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xb00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x1000000}, 0x0) [ 2382.500498][T26575] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2382.509369][T26575] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2382.517424][T26575] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2382.526084][T26575] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2382.534757][T26575] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2382.543231][T26575] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:57 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0d00000010"], 0x1c}}, 0x0) 12:54:57 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xc00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2382.653946][T26599] FAULT_INJECTION: forcing a failure. [ 2382.653946][T26599] name failslab, interval 1, probability 0, space 0, times 0 [ 2382.667379][T26599] CPU: 0 PID: 26599 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2382.675978][T26599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2382.687309][T26599] Call Trace: [ 2382.691289][T26599] dump_stack+0x137/0x19d [ 2382.695936][T26599] should_fail+0x23c/0x250 [ 2382.700376][T26599] __should_failslab+0x81/0x90 [ 2382.705209][T26599] ? __se_sys_mount+0xf2/0x2e0 [ 2382.710686][T26599] should_failslab+0x5/0x20 [ 2382.715808][T26599] kmem_cache_alloc_trace+0x49/0x310 [ 2382.721696][T26599] ? _copy_from_user+0x94/0xd0 [ 2382.726557][T26599] __se_sys_mount+0xf2/0x2e0 [ 2382.731247][T26599] ? mntput+0x45/0x70 [ 2382.735232][T26599] ? do_mkdirat+0x1c7/0x200 [ 2382.740134][T26599] __x64_sys_mount+0x63/0x70 [ 2382.744940][T26599] do_syscall_64+0x4a/0x90 [ 2382.749994][T26599] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2382.757064][T26599] RIP: 0033:0x467b1a [ 2382.761187][T26599] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2382.783018][T26599] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2382.791802][T26599] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2382.800564][T26599] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2382.808968][T26599] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2382.818186][T26599] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2382.827192][T26599] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1a00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0e00000010"], 0x1c}}, 0x0) 12:54:58 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xd00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x2000000}, 0x0) 12:54:58 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:54:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x10000000}, 0x0) 12:54:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1100000010"], 0x1c}}, 0x0) [ 2383.331753][T26635] FAULT_INJECTION: forcing a failure. [ 2383.331753][T26635] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2383.346010][T26635] CPU: 1 PID: 26635 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2383.354786][T26635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2383.365576][T26635] Call Trace: [ 2383.368876][T26635] dump_stack+0x137/0x19d [ 2383.373504][T26635] should_fail+0x23c/0x250 [ 2383.378178][T26635] should_fail_usercopy+0x16/0x20 [ 2383.384343][T26635] _copy_from_user+0x1c/0xd0 [ 2383.388937][T26635] __se_sys_mount+0x115/0x2e0 [ 2383.393705][T26635] ? mntput+0x45/0x70 [ 2383.397777][T26635] __x64_sys_mount+0x63/0x70 [ 2383.402377][T26635] do_syscall_64+0x4a/0x90 [ 2383.407400][T26635] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2383.413572][T26635] RIP: 0033:0x467b1a [ 2383.418071][T26635] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.439349][T26635] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2383.449485][T26635] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2383.459940][T26635] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2383.468980][T26635] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 12:54:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x2) 12:54:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x10) 12:54:58 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2383.477923][T26635] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2383.486427][T26635] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2383.499709][T26639] __nla_validate_parse: 10 callbacks suppressed [ 2383.499794][T26639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1200000010"], 0x1c}}, 0x0) [ 2383.567548][T26639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2383.606951][T26674] FAULT_INJECTION: forcing a failure. [ 2383.606951][T26674] name failslab, interval 1, probability 0, space 0, times 0 [ 2383.620176][T26674] CPU: 1 PID: 26674 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2383.629912][T26674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2383.640374][T26674] Call Trace: [ 2383.643799][T26674] dump_stack+0x137/0x19d [ 2383.648393][T26674] should_fail+0x23c/0x250 [ 2383.653355][T26674] ? getname_flags+0x84/0x3d0 [ 2383.658467][T26674] __should_failslab+0x81/0x90 [ 2383.663572][T26674] should_failslab+0x5/0x20 [ 2383.668278][T26674] kmem_cache_alloc+0x46/0x2f0 [ 2383.673331][T26674] getname_flags+0x84/0x3d0 [ 2383.678294][T26674] ? should_fail+0xd6/0x250 [ 2383.682917][T26674] user_path_at_empty+0x28/0x50 [ 2383.687862][T26674] __se_sys_mount+0x209/0x2e0 [ 2383.693004][T26674] ? mntput+0x45/0x70 [ 2383.697142][T26674] ? __fpregs_load_activate+0x103/0x1b0 [ 2383.703545][T26674] __x64_sys_mount+0x63/0x70 [ 2383.708511][T26674] do_syscall_64+0x4a/0x90 [ 2383.714980][T26674] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2383.721211][T26674] RIP: 0033:0x467b1a [ 2383.725230][T26674] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2383.745272][T26674] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2383.754181][T26674] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2383.762628][T26674] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2383.770995][T26674] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2383.779635][T26674] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2383.788033][T26674] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:54:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1b00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:54:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x1000000) 12:54:59 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xe00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000010"], 0x1c}}, 0x0) 12:54:59 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:54:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000480)) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) [ 2384.282516][T26706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2384.297060][T26703] FAULT_INJECTION: forcing a failure. [ 2384.297060][T26703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2384.312031][T26703] CPU: 0 PID: 26703 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2384.321269][T26703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2384.333139][T26703] Call Trace: [ 2384.336748][T26703] dump_stack+0x137/0x19d [ 2384.341994][T26703] should_fail+0x23c/0x250 [ 2384.346964][T26703] should_fail_usercopy+0x16/0x20 [ 2384.352183][T26703] strncpy_from_user+0x21/0x250 [ 2384.358052][T26703] getname_flags+0xb8/0x3d0 [ 2384.363259][T26703] ? should_fail+0xd6/0x250 [ 2384.368140][T26703] user_path_at_empty+0x28/0x50 [ 2384.373330][T26703] __se_sys_mount+0x209/0x2e0 [ 2384.378589][T26703] ? mntput+0x45/0x70 [ 2384.382974][T26703] __x64_sys_mount+0x63/0x70 [ 2384.387966][T26703] do_syscall_64+0x4a/0x90 [ 2384.393513][T26703] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2384.401769][T26703] RIP: 0033:0x467b1a [ 2384.407159][T26703] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2384.431587][T26703] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2384.440547][T26703] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2384.453571][T26703] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2384.462803][T26703] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2384.471939][T26703] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 12:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="2900000010"], 0x1c}}, 0x0) 12:54:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x2000000) [ 2384.480545][T26703] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2384.496395][T26719] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2384.516502][T26708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:54:59 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:54:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0a2b000010"], 0x1c}}, 0x0) 12:54:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x10000000) 12:54:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x100000000000000) [ 2384.653471][T26733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2384.699966][T26733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:55:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1c00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="9001002010"], 0x1c}}, 0x0) 12:55:00 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x200000000000000) 12:55:00 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1100000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000480)) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) [ 2385.257885][T26776] FAULT_INJECTION: forcing a failure. [ 2385.257885][T26776] name failslab, interval 1, probability 0, space 0, times 0 [ 2385.266968][T26772] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2385.272983][T26776] CPU: 1 PID: 26776 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2385.291909][T26776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2385.302675][T26776] Call Trace: 12:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000001"], 0x1c}}, 0x0) [ 2385.306147][T26776] dump_stack+0x137/0x19d [ 2385.310784][T26776] should_fail+0x23c/0x250 [ 2385.315554][T26776] __should_failslab+0x81/0x90 [ 2385.320428][T26776] ? alloc_fs_context+0x46/0x500 [ 2385.325575][T26776] should_failslab+0x5/0x20 [ 2385.330524][T26776] kmem_cache_alloc_trace+0x49/0x310 [ 2385.336599][T26776] alloc_fs_context+0x46/0x500 [ 2385.341435][T26776] ? strncmp+0x34/0x70 [ 2385.345520][T26776] fs_context_for_mount+0x1d/0x20 [ 2385.350663][T26776] path_mount+0xdf5/0x1ce0 12:55:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x1000000000000000) [ 2385.355114][T26776] __se_sys_mount+0x23d/0x2e0 [ 2385.360129][T26776] ? mntput+0x45/0x70 [ 2385.364508][T26776] __x64_sys_mount+0x63/0x70 [ 2385.369468][T26776] do_syscall_64+0x4a/0x90 [ 2385.374088][T26776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2385.380836][T26776] RIP: 0033:0x467b1a [ 2385.385181][T26776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 12:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000002"], 0x1c}}, 0x0) 12:55:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x8000000000000000) [ 2385.405360][T26776] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2385.414171][T26776] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2385.422236][T26776] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2385.430450][T26776] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2385.438425][T26776] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2385.447266][T26776] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000003"], 0x1c}}, 0x0) 12:55:00 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x1200000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2385.597109][T26810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2385.635229][T26810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:55:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1d00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0xffffffff00000000) 12:55:01 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000004"], 0x1c}}, 0x0) 12:55:01 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x2000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000480)) r1 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r1}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt}]}) [ 2386.210906][T26834] FAULT_INJECTION: forcing a failure. [ 2386.210906][T26834] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.225245][T26834] CPU: 1 PID: 26834 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2386.234009][T26834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2386.244374][T26834] Call Trace: [ 2386.247649][T26834] dump_stack+0x137/0x19d [ 2386.252393][T26834] should_fail+0x23c/0x250 [ 2386.256999][T26834] __should_failslab+0x81/0x90 [ 2386.262082][T26834] ? legacy_init_fs_context+0x2d/0x70 [ 2386.267860][T26834] should_failslab+0x5/0x20 [ 2386.272444][T26834] kmem_cache_alloc_trace+0x49/0x310 [ 2386.278267][T26834] ? kmem_cache_alloc_trace+0x215/0x310 [ 2386.287433][T26834] ? alloc_fs_context+0x46/0x500 [ 2386.293030][T26834] legacy_init_fs_context+0x2d/0x70 [ 2386.298628][T26834] alloc_fs_context+0x419/0x500 [ 2386.304093][T26834] fs_context_for_mount+0x1d/0x20 [ 2386.309435][T26834] path_mount+0xdf5/0x1ce0 [ 2386.314472][T26834] __se_sys_mount+0x23d/0x2e0 [ 2386.319897][T26834] ? mntput+0x45/0x70 [ 2386.324671][T26834] __x64_sys_mount+0x63/0x70 [ 2386.329540][T26834] do_syscall_64+0x4a/0x90 [ 2386.334518][T26834] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2386.340802][T26834] RIP: 0033:0x467b1a [ 2386.344795][T26834] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.365854][T26834] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2386.374797][T26834] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2386.382862][T26834] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2386.391434][T26834] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2386.400381][T26834] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 12:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000005"], 0x1c}}, 0x0) 12:55:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_io_uring_complete(0x0) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r2}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_LINK={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44050}, 0x4040081) 12:55:01 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x2500000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000006"], 0x1c}}, 0x0) [ 2386.408965][T26834] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0xff, 0xc0600) sendmsg$NFT_MSG_GETCHAIN(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x4, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x4000014) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000000104030000000000000005000005080000000400000081baaa07b343070338ac0e561d0f907bd044d61a29e98c0c9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd00000000"], 0x1c}, 0x300}, 0x0) 12:55:01 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2386.553623][T26877] FAULT_INJECTION: forcing a failure. [ 2386.553623][T26877] name failslab, interval 1, probability 0, space 0, times 0 [ 2386.568523][T26877] CPU: 0 PID: 26877 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2386.578336][T26877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2386.588949][T26877] Call Trace: [ 2386.592660][T26877] dump_stack+0x137/0x19d [ 2386.597125][T26877] should_fail+0x23c/0x250 [ 2386.601952][T26877] __should_failslab+0x81/0x90 [ 2386.607312][T26877] ? selinux_add_opt+0xc4/0x1c0 [ 2386.612300][T26877] should_failslab+0x5/0x20 [ 2386.617369][T26877] kmem_cache_alloc_trace+0x49/0x310 [ 2386.623554][T26877] ? selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 2386.629930][T26877] selinux_add_opt+0xc4/0x1c0 [ 2386.636050][T26877] selinux_sb_eat_lsm_opts+0x6d5/0x7e0 [ 2386.642141][T26877] security_sb_eat_lsm_opts+0x42/0x90 [ 2386.647850][T26877] legacy_parse_monolithic+0x9b/0xe0 [ 2386.653857][T26877] parse_monolithic_mount_data+0x3e/0x50 [ 2386.661013][T26877] path_mount+0x11a1/0x1ce0 [ 2386.665955][T26877] __se_sys_mount+0x23d/0x2e0 [ 2386.671192][T26877] ? mntput+0x45/0x70 [ 2386.675542][T26877] __x64_sys_mount+0x63/0x70 [ 2386.680221][T26877] do_syscall_64+0x4a/0x90 [ 2386.684925][T26877] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2386.691137][T26877] RIP: 0033:0x467b1a [ 2386.695024][T26877] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2386.716520][T26877] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2386.725465][T26877] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2386.733834][T26877] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2386.742113][T26877] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2386.750424][T26877] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2386.760158][T26877] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1e00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000007"], 0x1c}}, 0x0) 12:55:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c0000000104030000007d4100000000000008000340000c0400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x8000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040800}, 0x8000) 12:55:02 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, 0x0) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2387.189110][T26897] FAULT_INJECTION: forcing a failure. [ 2387.189110][T26897] name failslab, interval 1, probability 0, space 0, times 0 [ 2387.202441][T26897] CPU: 0 PID: 26897 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2387.211284][T26897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2387.221359][T26897] Call Trace: [ 2387.224920][T26897] dump_stack+0x137/0x19d [ 2387.229444][T26897] should_fail+0x23c/0x250 [ 2387.234275][T26897] ? selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 2387.240387][T26897] __should_failslab+0x81/0x90 [ 2387.245382][T26897] should_failslab+0x5/0x20 [ 2387.250126][T26897] __kmalloc_track_caller+0x64/0x340 [ 2387.255613][T26897] ? __fs_parse+0x2e4/0x460 [ 2387.260310][T26897] kmemdup_nul+0x27/0x70 [ 2387.264929][T26897] selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 2387.270789][T26897] security_sb_eat_lsm_opts+0x42/0x90 [ 2387.276803][T26897] legacy_parse_monolithic+0x9b/0xe0 [ 2387.282299][T26897] parse_monolithic_mount_data+0x3e/0x50 [ 2387.288378][T26897] path_mount+0x11a1/0x1ce0 [ 2387.293113][T26897] __se_sys_mount+0x23d/0x2e0 [ 2387.298110][T26897] ? mntput+0x45/0x70 [ 2387.302371][T26897] ? __fpregs_load_activate+0x103/0x1b0 [ 2387.308110][T26897] __x64_sys_mount+0x63/0x70 [ 2387.313229][T26897] do_syscall_64+0x4a/0x90 [ 2387.318073][T26897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2387.324413][T26897] RIP: 0033:0x467b1a [ 2387.328731][T26897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2387.350614][T26897] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2387.359858][T26897] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2387.368162][T26897] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2387.376318][T26897] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 12:55:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x4c00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e56444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd00"/80], 0x1c}, 0x300}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042bbd7007000000000029b27800010100000015d72b35eec6330000000c0003000900"/46], 0x34}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000880), r1) sendmsg$NLBL_CALIPSO_C_ADD(r2, &(0x7f0000000940)={&(0x7f0000000840), 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x34, r3, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}}, 0x889) 12:55:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000008"], 0x1c}}, 0x0) [ 2387.385174][T26897] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2387.393503][T26897] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:02 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300}, 0x2000c000) accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000140)={'wg2\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r2, 0x10, 0x8, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x44010}, 0xc0) r3 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r3, 0x3309) getpeername$inet(r3, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0xc8, 0x4, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_COUNTERS={0x40, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xac6b}, @NFTA_COUNTER_BYTES={0xc}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HOOK={0x3c, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x39e8456e}, @NFTA_HOOK_DEV={0x14, 0x3, 'wlan0\x00'}, @NFTA_HOOK_DEV={0x14, 0x3, 'wg0\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40014}, 0x4800) ioctl$TIOCL_GETSHIFTSTATE(r3, 0x541c, &(0x7f00000000c0)={0x6, 0xc}) 12:55:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000009"], 0x1c}}, 0x0) [ 2387.518760][T26937] FAULT_INJECTION: forcing a failure. [ 2387.518760][T26937] name failslab, interval 1, probability 0, space 0, times 0 [ 2387.531733][T26937] CPU: 1 PID: 26937 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2387.540505][T26937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2387.550833][T26937] Call Trace: [ 2387.554192][T26937] dump_stack+0x137/0x19d [ 2387.558625][T26937] should_fail+0x23c/0x250 [ 2387.563138][T26937] ? selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 2387.568936][T26937] __should_failslab+0x81/0x90 [ 2387.574705][T26937] should_failslab+0x5/0x20 [ 2387.579348][T26937] __kmalloc_track_caller+0x64/0x340 [ 2387.584747][T26937] ? __fs_parse+0x2e4/0x460 [ 2387.589729][T26937] kmemdup_nul+0x27/0x70 [ 2387.594493][T26937] selinux_sb_eat_lsm_opts+0x6b5/0x7e0 [ 2387.600468][T26937] security_sb_eat_lsm_opts+0x42/0x90 [ 2387.606319][T26937] legacy_parse_monolithic+0x9b/0xe0 [ 2387.612001][T26937] parse_monolithic_mount_data+0x3e/0x50 [ 2387.617922][T26937] path_mount+0x11a1/0x1ce0 [ 2387.622573][T26937] __se_sys_mount+0x23d/0x2e0 [ 2387.627454][T26937] ? mntput+0x45/0x70 [ 2387.631531][T26937] ? __fpregs_load_activate+0x103/0x1b0 [ 2387.637437][T26937] __x64_sys_mount+0x63/0x70 [ 2387.642353][T26937] do_syscall_64+0x4a/0x90 [ 2387.646780][T26937] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2387.653085][T26937] RIP: 0033:0x467b1a [ 2387.657092][T26937] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2387.676984][T26937] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2387.685918][T26937] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2387.694184][T26937] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2387.702257][T26937] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2387.712333][T26937] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2387.721175][T26937] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:03 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000a"], 0x1c}}, 0x0) 12:55:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b34307033834af444d9cecd5d76d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:03 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, 0x0) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:03 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x54, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:ld_so_cache_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x40001}, 0x884) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000580), r0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x44844}, 0x40080) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x1, 0x4, 0x5, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xaaf}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x4}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40004}, 0x20004000) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000010403000000000000000500000508000340f4000400000081baaa07b343050338ac0e561d0b907bd044d61a29e9060014af444d9cecd5e26d2ca957fa5f9bab5b4319d0ee7ad7880635dc4e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r3 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r3, 0x3309) getpeername$inet(r3, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) getpeername$inet(r5, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xa0, 0x0, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x979}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xa82}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}]}, 0xa0}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$SNAPSHOT_SET_SWAP_AREA(0xffffffffffffffff, 0x400c330d, &(0x7f0000000200)={0x45, 0x80}) 12:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000b"], 0x1c}}, 0x0) [ 2388.236803][T26968] FAULT_INJECTION: forcing a failure. [ 2388.236803][T26968] name failslab, interval 1, probability 0, space 0, times 0 [ 2388.250010][T26968] CPU: 1 PID: 26968 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2388.259043][T26968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2388.270388][T26968] Call Trace: [ 2388.273662][T26968] dump_stack+0x137/0x19d [ 2388.278126][T26968] should_fail+0x23c/0x250 [ 2388.282558][T26968] ? isofs_mount+0x40/0x40 [ 2388.286983][T26968] ? getname_kernel+0x37/0x1d0 [ 2388.291843][T26968] __should_failslab+0x81/0x90 [ 2388.296909][T26968] should_failslab+0x5/0x20 [ 2388.301673][T26968] kmem_cache_alloc+0x46/0x2f0 [ 2388.313538][T26968] ? avc_has_perm_noaudit+0x19a/0x240 [ 2388.319023][T26968] ? isofs_mount+0x40/0x40 [ 2388.323953][T26968] getname_kernel+0x37/0x1d0 [ 2388.328546][T26968] ? isofs_mount+0x40/0x40 [ 2388.333151][T26968] kern_path+0x19/0x40 [ 2388.337404][T26968] blkdev_get_by_path+0x54/0x1b0 [ 2388.342428][T26968] mount_bdev+0x47/0x290 [ 2388.346688][T26968] ? _isofs_bmap+0x30/0x30 [ 2388.351204][T26968] isofs_mount+0x2d/0x40 [ 2388.355644][T26968] legacy_get_tree+0x70/0xc0 [ 2388.360530][T26968] vfs_get_tree+0x4a/0x1a0 [ 2388.365211][T26968] path_mount+0x11d4/0x1ce0 [ 2388.369713][T26968] __se_sys_mount+0x23d/0x2e0 [ 2388.374798][T26968] ? mntput+0x45/0x70 [ 2388.378952][T26968] __x64_sys_mount+0x63/0x70 [ 2388.383687][T26968] do_syscall_64+0x4a/0x90 [ 2388.388763][T26968] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2388.394660][T26968] RIP: 0033:0x467b1a [ 2388.399310][T26968] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2388.419994][T26968] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2388.428812][T26968] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a 12:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000c"], 0x1c}}, 0x0) 12:55:03 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2388.437340][T26968] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2388.445752][T26968] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2388.453727][T26968] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2388.462070][T26968] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000d"], 0x1c}}, 0x0) 12:55:03 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1c}, 0x300}, 0x0) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)={0x778, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_PEERS={0x6d4, 0x8, 0x0, 0x1, [{0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x6, @rand_addr=' \x01\x00', 0x1ff}}]}, {0x48, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1f9b9e05e6c390e52d2765970614f411a9cd4ff6c962b324b2c0828869d6516c"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}]}, {0xdc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc5}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x68, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @broadcast}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x304, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x6, @private0, 0x3}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x1}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9c89}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x1ff, @rand_addr=' \x01\x00'}}, @WGPEER_A_ALLOWEDIPS={0x28c, 0x9, 0x0, 0x1, [{0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2c}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}]}]}, {0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xffffff07, @dev={0xfe, 0x80, '\x00', 0x40}, 0x2}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x204, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @remote}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xb176490, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, @WGPEER_A_ALLOWEDIPS={0x1c4, 0x9, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}, {0x2c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x81}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x6}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}]}, 0x778}}, 0xc045) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) [ 2388.564331][T27008] __nla_validate_parse: 10 callbacks suppressed [ 2388.564346][T27008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2388.593720][T27008] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:55:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:04 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x6c00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000e"], 0x1c}}, 0x0) 12:55:04 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x20040090}, 0x0) 12:55:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, 0x0) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2389.228913][T27045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2389.230765][T27049] FAULT_INJECTION: forcing a failure. [ 2389.230765][T27049] name failslab, interval 1, probability 0, space 0, times 0 [ 2389.252534][T27049] CPU: 0 PID: 27049 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2389.261416][T27049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2389.272238][T27049] Call Trace: 12:55:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1002000010"], 0x1c}}, 0x0) [ 2389.275696][T27049] dump_stack+0x137/0x19d [ 2389.280238][T27049] should_fail+0x23c/0x250 [ 2389.285269][T27049] __should_failslab+0x81/0x90 [ 2389.290873][T27049] ? alloc_super+0x3a/0x520 [ 2389.295666][T27049] should_failslab+0x5/0x20 [ 2389.300402][T27049] kmem_cache_alloc_trace+0x49/0x310 [ 2389.305958][T27049] ? __blkdev_get+0x8c/0x6c0 [ 2389.311096][T27049] ? disk_block_events+0x94/0xd0 [ 2389.316481][T27049] ? mount_bdev+0x290/0x290 [ 2389.321292][T27049] alloc_super+0x3a/0x520 12:55:04 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet(0x2, 0x1, 0x80) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000200)={0x1000, {{0x2, 0x4e23, @loopback}}, 0x1}, 0x90) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0x3ff, 0x3ff, 0x4}, 0xc) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) r4 = socket$inet(0x2, 0x80000, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x3e8, 0x0, 0x0, 0x0, 0x300, 0x300, 0x300, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0xff, 0xff000000, 0x2, 0x1, {@empty, {[0x0, 0x0, 0xff, 0xff, 0xff, 0xff]}}, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0xff, 0xff, 0x0, 0xff, 0x0, 0xff]}}, 0x200, 0x1, 0x4, 0x7, 0x9a55, 0x9, 'rose0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x4}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x1}}}, {{@arp={@multicast2, @private=0xa010101, 0xffffff00, 0xffffffff, 0xe, 0xb, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0xff, 0xff]}}, 0x6ce5, 0x1000, 0xff, 0x2, 0x8001, 0xa1, 'veth0_vlan\x00', 'veth1_to_hsr\x00', {0xff}, {}, 0x0, 0x7}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @mac=@multicast, @local, @multicast2, 0x8, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x4040004}, 0x0) [ 2389.325820][T27049] ? mount_bdev+0x290/0x290 [ 2389.331073][T27049] sget+0x1a5/0x400 [ 2389.335076][T27049] ? test_bdev_super+0x30/0x30 [ 2389.340427][T27049] mount_bdev+0xd3/0x290 [ 2389.344304][T27045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2389.344959][T27049] ? isofs_mount+0x40/0x40 [ 2389.359092][T27049] ? _isofs_bmap+0x30/0x30 [ 2389.363553][T27049] isofs_mount+0x2d/0x40 [ 2389.367912][T27049] legacy_get_tree+0x70/0xc0 [ 2389.372593][T27049] vfs_get_tree+0x4a/0x1a0 [ 2389.377398][T27049] path_mount+0x11d4/0x1ce0 [ 2389.382092][T27049] __se_sys_mount+0x23d/0x2e0 [ 2389.386771][T27049] ? mntput+0x45/0x70 [ 2389.390753][T27049] __x64_sys_mount+0x63/0x70 [ 2389.395423][T27049] do_syscall_64+0x4a/0x90 [ 2389.400449][T27049] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2389.406962][T27049] RIP: 0033:0x467b1a 12:55:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1003000010"], 0x1c}}, 0x0) [ 2389.410865][T27049] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2389.431251][T27049] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2389.439840][T27049] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2389.448089][T27049] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2389.456251][T27049] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2389.464640][T27049] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 12:55:04 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x721e000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1004000010"], 0x1c}}, 0x0) [ 2389.472853][T27049] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:04 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2389.579704][T27082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2389.623597][T27093] FAULT_INJECTION: forcing a failure. [ 2389.623597][T27093] name failslab, interval 1, probability 0, space 0, times 0 [ 2389.636832][T27093] CPU: 0 PID: 27093 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2389.645600][T27093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2389.655953][T27093] Call Trace: [ 2389.659416][T27093] dump_stack+0x137/0x19d [ 2389.664538][T27093] should_fail+0x23c/0x250 [ 2389.669133][T27093] ? kzalloc+0x1d/0x30 [ 2389.673386][T27093] __should_failslab+0x81/0x90 [ 2389.678244][T27093] should_failslab+0x5/0x20 [ 2389.682744][T27093] __kmalloc+0x66/0x340 [ 2389.687153][T27093] kzalloc+0x1d/0x30 [ 2389.691040][T27093] security_sb_alloc+0x3c/0x180 [ 2389.695989][T27093] alloc_super+0x10b/0x520 [ 2389.700459][T27093] ? mount_bdev+0x290/0x290 [ 2389.705259][T27093] sget+0x1a5/0x400 [ 2389.709091][T27093] ? test_bdev_super+0x30/0x30 [ 2389.715577][T27093] mount_bdev+0xd3/0x290 [ 2389.720320][T27093] ? isofs_mount+0x40/0x40 [ 2389.725011][T27093] ? _isofs_bmap+0x30/0x30 [ 2389.729617][T27093] isofs_mount+0x2d/0x40 [ 2389.734464][T27093] legacy_get_tree+0x70/0xc0 [ 2389.739554][T27093] vfs_get_tree+0x4a/0x1a0 [ 2389.744314][T27093] path_mount+0x11d4/0x1ce0 [ 2389.749825][T27093] __se_sys_mount+0x23d/0x2e0 [ 2389.754691][T27093] ? mntput+0x45/0x70 [ 2389.758705][T27093] __x64_sys_mount+0x63/0x70 [ 2389.763416][T27093] do_syscall_64+0x4a/0x90 [ 2389.768395][T27093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2389.774688][T27093] RIP: 0033:0x467b1a [ 2389.778754][T27093] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2389.799145][T27093] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2389.807552][T27093] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2389.815865][T27093] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2389.824008][T27093] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2389.832509][T27093] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2389.842309][T27093] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2389.859046][T27082] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:55:05 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1005000010"], 0x1c}}, 0x0) 12:55:05 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7400000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:05 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2390.182163][T27122] FAULT_INJECTION: forcing a failure. [ 2390.182163][T27122] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.196047][T27122] CPU: 1 PID: 27122 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2390.204876][T27122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2390.215916][T27122] Call Trace: [ 2390.219290][T27122] dump_stack+0x137/0x19d [ 2390.223936][T27122] should_fail+0x23c/0x250 [ 2390.228447][T27122] ? prealloc_shrinker+0x5e/0x1b0 [ 2390.233573][T27122] __should_failslab+0x81/0x90 [ 2390.238779][T27130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2390.239046][T27122] should_failslab+0x5/0x20 [ 2390.253346][T27122] __kmalloc+0x66/0x340 [ 2390.258751][T27122] prealloc_shrinker+0x5e/0x1b0 [ 2390.263799][T27122] alloc_super+0x464/0x520 [ 2390.268588][T27122] ? mount_bdev+0x290/0x290 [ 2390.273284][T27122] sget+0x1a5/0x400 [ 2390.277183][T27122] ? test_bdev_super+0x30/0x30 [ 2390.281954][T27122] mount_bdev+0xd3/0x290 [ 2390.286386][T27122] ? isofs_mount+0x40/0x40 [ 2390.291096][T27122] ? _isofs_bmap+0x30/0x30 [ 2390.295622][T27122] isofs_mount+0x2d/0x40 [ 2390.300151][T27122] legacy_get_tree+0x70/0xc0 [ 2390.305122][T27122] vfs_get_tree+0x4a/0x1a0 [ 2390.311065][T27122] path_mount+0x11d4/0x1ce0 [ 2390.316671][T27122] __se_sys_mount+0x23d/0x2e0 [ 2390.321564][T27122] ? mntput+0x45/0x70 [ 2390.326171][T27122] __x64_sys_mount+0x63/0x70 [ 2390.331761][T27122] do_syscall_64+0x4a/0x90 [ 2390.336574][T27122] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2390.343378][T27122] RIP: 0033:0x467b1a [ 2390.347546][T27122] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.367789][T27122] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:55:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1006000010"], 0x1c}}, 0x0) 12:55:05 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x3a, @rand_addr=0x64010100, 0x4e23, 0x3, 'rr\x00', 0x4, 0xfffffffa, 0x68}, 0x2c) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2390.376827][T27122] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2390.385398][T27122] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2390.393764][T27122] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2390.402128][T27122] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2390.411341][T27122] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:05 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x7a00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1007000010"], 0x1c}}, 0x0) 12:55:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r1, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x564c}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x48810}, 0x20004090) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300}, 0x0) 12:55:05 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1008000010"], 0x1c}}, 0x0) 12:55:05 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2390.588644][T27177] FAULT_INJECTION: forcing a failure. [ 2390.588644][T27177] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.597535][T27167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2390.601401][T27177] CPU: 1 PID: 27177 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2390.619933][T27177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2390.630366][T27177] Call Trace: [ 2390.633802][T27177] dump_stack+0x137/0x19d [ 2390.638519][T27177] should_fail+0x23c/0x250 [ 2390.643427][T27177] ? __list_lru_init+0x70/0x520 [ 2390.648652][T27177] __should_failslab+0x81/0x90 [ 2390.653811][T27177] should_failslab+0x5/0x20 [ 2390.658763][T27177] __kmalloc+0x66/0x340 [ 2390.660284][T27167] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2390.662921][T27177] __list_lru_init+0x70/0x520 [ 2390.662946][T27177] alloc_super+0x490/0x520 [ 2390.662962][T27177] ? mount_bdev+0x290/0x290 [ 2390.663046][T27177] sget+0x1a5/0x400 [ 2390.690998][T27177] ? test_bdev_super+0x30/0x30 [ 2390.696580][T27177] mount_bdev+0xd3/0x290 [ 2390.701031][T27177] ? isofs_mount+0x40/0x40 [ 2390.705581][T27177] ? _isofs_bmap+0x30/0x30 [ 2390.711065][T27177] isofs_mount+0x2d/0x40 [ 2390.716161][T27177] legacy_get_tree+0x70/0xc0 [ 2390.720989][T27177] vfs_get_tree+0x4a/0x1a0 [ 2390.725572][T27177] path_mount+0x11d4/0x1ce0 [ 2390.730146][T27177] __se_sys_mount+0x23d/0x2e0 [ 2390.735007][T27177] ? mntput+0x45/0x70 [ 2390.739289][T27177] __x64_sys_mount+0x63/0x70 [ 2390.744149][T27177] do_syscall_64+0x4a/0x90 [ 2390.749014][T27177] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2390.755226][T27177] RIP: 0033:0x467b1a [ 2390.759386][T27177] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.780657][T27177] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2390.789343][T27177] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2390.797405][T27177] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2390.805399][T27177] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2390.813645][T27177] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2390.822500][T27177] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2100000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:06 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x4}, 0x0) 12:55:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1009000010"], 0x1c}}, 0x0) 12:55:06 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x8000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:06 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2391.180365][T27209] FAULT_INJECTION: forcing a failure. [ 2391.180365][T27209] name failslab, interval 1, probability 0, space 0, times 0 [ 2391.193873][T27209] CPU: 0 PID: 27209 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2391.202601][T27209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2391.213103][T27209] Call Trace: [ 2391.216479][T27209] dump_stack+0x137/0x19d [ 2391.220928][T27209] should_fail+0x23c/0x250 [ 2391.225350][T27209] ? __list_lru_init+0x70/0x520 [ 2391.230278][T27209] __should_failslab+0x81/0x90 [ 2391.235136][T27209] should_failslab+0x5/0x20 [ 2391.239872][T27209] __kmalloc+0x66/0x340 [ 2391.244117][T27209] __list_lru_init+0x70/0x520 [ 2391.248799][T27209] alloc_super+0x490/0x520 [ 2391.253308][T27209] ? mount_bdev+0x290/0x290 [ 2391.259037][T27209] sget+0x1a5/0x400 [ 2391.263044][T27209] ? test_bdev_super+0x30/0x30 [ 2391.267802][T27209] mount_bdev+0xd3/0x290 [ 2391.272055][T27209] ? isofs_mount+0x40/0x40 [ 2391.276604][T27209] ? _isofs_bmap+0x30/0x30 [ 2391.281192][T27209] isofs_mount+0x2d/0x40 [ 2391.285966][T27209] legacy_get_tree+0x70/0xc0 [ 2391.290586][T27209] vfs_get_tree+0x4a/0x1a0 [ 2391.295785][T27209] path_mount+0x11d4/0x1ce0 [ 2391.300506][T27209] __se_sys_mount+0x23d/0x2e0 [ 2391.305694][T27209] ? mntput+0x45/0x70 [ 2391.309927][T27209] ? __fpregs_load_activate+0x103/0x1b0 [ 2391.316998][T27209] __x64_sys_mount+0x63/0x70 [ 2391.321594][T27209] do_syscall_64+0x4a/0x90 [ 2391.326291][T27209] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2391.332297][T27209] RIP: 0033:0x467b1a [ 2391.336719][T27209] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.356862][T27209] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2391.365716][T27209] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a 12:55:06 executing program 3: pipe2(&(0x7f0000000100), 0x4800) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x129}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x10) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 12:55:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100a000010"], 0x1c}}, 0x0) [ 2391.374732][T27209] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2391.383048][T27209] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2391.391392][T27209] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2391.399753][T27209] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 [ 2391.421315][T27208] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:55:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100b000010"], 0x1c}}, 0x0) 12:55:06 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x9effffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYRESDEC=r0], 0x1c}, 0x300}, 0x0) 12:55:06 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2391.651724][T27252] FAULT_INJECTION: forcing a failure. [ 2391.651724][T27252] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2391.665506][T27252] CPU: 0 PID: 27252 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2391.674104][T27252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2391.685038][T27252] Call Trace: [ 2391.688808][T27252] dump_stack+0x137/0x19d [ 2391.693419][T27252] should_fail+0x23c/0x250 [ 2391.698572][T27252] __alloc_pages+0xe7/0x310 [ 2391.703170][T27252] kmem_getpages+0x1a/0xd0 [ 2391.707718][T27252] cache_grow_begin+0x4c/0x1a0 [ 2391.715561][T27252] cache_alloc_refill+0x326/0x3d0 [ 2391.721477][T27252] ? should_fail+0xd6/0x250 [ 2391.726547][T27252] kmem_cache_alloc_node_trace+0x25a/0x2e0 [ 2391.732441][T27252] ? __kmalloc_node+0x30/0x40 [ 2391.737216][T27252] __kmalloc_node+0x30/0x40 [ 2391.741932][T27252] kvmalloc_node+0x81/0xf0 [ 2391.746717][T27252] __list_lru_init+0x1dd/0x520 [ 2391.751831][T27252] alloc_super+0x490/0x520 [ 2391.756603][T27252] ? mount_bdev+0x290/0x290 [ 2391.761384][T27252] sget+0x1a5/0x400 [ 2391.765370][T27252] ? test_bdev_super+0x30/0x30 [ 2391.770216][T27252] mount_bdev+0xd3/0x290 [ 2391.774824][T27252] ? isofs_mount+0x40/0x40 [ 2391.779602][T27252] ? _isofs_bmap+0x30/0x30 [ 2391.784031][T27252] isofs_mount+0x2d/0x40 [ 2391.788356][T27252] legacy_get_tree+0x70/0xc0 [ 2391.793114][T27252] vfs_get_tree+0x4a/0x1a0 [ 2391.797814][T27252] path_mount+0x11d4/0x1ce0 [ 2391.802498][T27252] __se_sys_mount+0x23d/0x2e0 [ 2391.807286][T27252] ? mntput+0x45/0x70 [ 2391.811926][T27252] ? __fpregs_load_activate+0x103/0x1b0 [ 2391.817979][T27252] __x64_sys_mount+0x63/0x70 [ 2391.822788][T27252] do_syscall_64+0x4a/0x90 [ 2391.827562][T27252] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2391.833556][T27252] RIP: 0033:0x467b1a [ 2391.837539][T27252] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2391.857756][T27252] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2391.866454][T27252] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2391.874506][T27252] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2391.882651][T27252] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2391.891147][T27252] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2391.900471][T27252] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:07 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2200000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100c000010"], 0x1c}}, 0x0) 12:55:07 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x7d, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x1c}, 0x300, 0x0, 0x0, 0x10}, 0x20044000) 12:55:07 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xefffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:07 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100d000010"], 0x1c}}, 0x0) [ 2392.147108][T27277] FAULT_INJECTION: forcing a failure. [ 2392.147108][T27277] name failslab, interval 1, probability 0, space 0, times 0 [ 2392.160262][T27277] CPU: 0 PID: 27277 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2392.169034][T27277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2392.179253][T27277] Call Trace: [ 2392.182713][T27277] dump_stack+0x137/0x19d [ 2392.187141][T27277] should_fail+0x23c/0x250 [ 2392.191737][T27277] __should_failslab+0x81/0x90 [ 2392.196612][T27277] should_failslab+0x5/0x20 [ 2392.201400][T27277] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 2392.207245][T27277] ? __list_lru_init+0x70/0x520 [ 2392.212290][T27277] ? __kmalloc_node+0x30/0x40 [ 2392.217058][T27277] __kmalloc_node+0x30/0x40 [ 2392.221914][T27277] kvmalloc_node+0x81/0xf0 [ 2392.226574][T27277] __list_lru_init+0x1dd/0x520 [ 2392.231613][T27277] alloc_super+0x4bf/0x520 [ 2392.236031][T27277] ? mount_bdev+0x290/0x290 [ 2392.240644][T27277] sget+0x1a5/0x400 [ 2392.244582][T27277] ? test_bdev_super+0x30/0x30 [ 2392.249697][T27277] mount_bdev+0xd3/0x290 [ 2392.254237][T27277] ? isofs_mount+0x40/0x40 [ 2392.258651][T27277] ? _isofs_bmap+0x30/0x30 [ 2392.263070][T27277] isofs_mount+0x2d/0x40 [ 2392.267398][T27277] legacy_get_tree+0x70/0xc0 [ 2392.271991][T27277] vfs_get_tree+0x4a/0x1a0 [ 2392.276605][T27277] path_mount+0x11d4/0x1ce0 [ 2392.281149][T27277] __se_sys_mount+0x23d/0x2e0 [ 2392.285845][T27277] ? mntput+0x45/0x70 [ 2392.289888][T27277] ? __fpregs_load_activate+0x103/0x1b0 [ 2392.295451][T27277] __x64_sys_mount+0x63/0x70 [ 2392.300273][T27277] do_syscall_64+0x4a/0x90 [ 2392.304794][T27277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2392.311159][T27277] RIP: 0033:0x467b1a [ 2392.315308][T27277] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2392.335716][T27277] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2392.344231][T27277] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2392.352457][T27277] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2392.360884][T27277] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2392.368844][T27277] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2392.377780][T27277] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:07 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100e000010"], 0x1c}}, 0x0) 12:55:07 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:07 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1010000010"], 0x1c}}, 0x0) [ 2392.566235][T27313] FAULT_INJECTION: forcing a failure. [ 2392.566235][T27313] name failslab, interval 1, probability 0, space 0, times 0 [ 2392.579412][T27313] CPU: 0 PID: 27313 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2392.588308][T27313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2392.598628][T27313] Call Trace: [ 2392.601907][T27313] dump_stack+0x137/0x19d [ 2392.606240][T27313] should_fail+0x23c/0x250 [ 2392.610709][T27313] __should_failslab+0x81/0x90 [ 2392.615483][T27313] should_failslab+0x5/0x20 [ 2392.620102][T27313] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 2392.626318][T27313] ? __list_lru_init+0x70/0x520 [ 2392.631382][T27313] ? __kmalloc_node+0x30/0x40 [ 2392.636380][T27313] __kmalloc_node+0x30/0x40 [ 2392.641326][T27313] kvmalloc_node+0x81/0xf0 [ 2392.645838][T27313] __list_lru_init+0x1dd/0x520 [ 2392.650830][T27313] alloc_super+0x4bf/0x520 [ 2392.655416][T27313] ? mount_bdev+0x290/0x290 [ 2392.659944][T27313] sget+0x1a5/0x400 [ 2392.663901][T27313] ? test_bdev_super+0x30/0x30 [ 2392.668779][T27313] mount_bdev+0xd3/0x290 [ 2392.673156][T27313] ? isofs_mount+0x40/0x40 [ 2392.677667][T27313] ? _isofs_bmap+0x30/0x30 [ 2392.682396][T27313] isofs_mount+0x2d/0x40 [ 2392.686975][T27313] legacy_get_tree+0x70/0xc0 [ 2392.691768][T27313] vfs_get_tree+0x4a/0x1a0 [ 2392.696311][T27313] path_mount+0x11d4/0x1ce0 [ 2392.701012][T27313] __se_sys_mount+0x23d/0x2e0 [ 2392.705692][T27313] ? mntput+0x45/0x70 [ 2392.710885][T27313] __x64_sys_mount+0x63/0x70 [ 2392.715918][T27313] do_syscall_64+0x4a/0x90 [ 2392.720426][T27313] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2392.726738][T27313] RIP: 0033:0x467b1a [ 2392.731471][T27313] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2392.751815][T27313] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2392.760413][T27313] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a [ 2392.768911][T27313] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2392.778187][T27313] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2392.786266][T27313] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2392.794438][T27313] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:08 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2300000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1011000010"], 0x1c}}, 0x0) 12:55:08 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0xffffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:08 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:08 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, 0x0, &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_icmp(0x2, 0x2, 0x1) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2393.140417][T27349] FAULT_INJECTION: forcing a failure. [ 2393.140417][T27349] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.153735][T27349] CPU: 1 PID: 27349 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2393.162594][T27349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2393.172895][T27349] Call Trace: [ 2393.176239][T27349] dump_stack+0x137/0x19d [ 2393.180727][T27349] should_fail+0x23c/0x250 [ 2393.185226][T27349] ? match_int+0x4b/0xf0 [ 2393.189499][T27349] __should_failslab+0x81/0x90 [ 2393.194258][T27349] should_failslab+0x5/0x20 [ 2393.198796][T27349] __kmalloc_track_caller+0x64/0x340 [ 2393.204421][T27349] ? simple_strtoul+0x8a/0xb0 [ 2393.209452][T27349] kmemdup_nul+0x27/0x70 [ 2393.213894][T27349] match_int+0x4b/0xf0 [ 2393.218116][T27349] isofs_fill_super+0x1a9/0x1940 [ 2393.223325][T27349] ? snprintf+0x6f/0x90 [ 2393.228001][T27349] ? set_blocksize+0x197/0x2a0 [ 2393.233112][T27349] mount_bdev+0x1e8/0x290 [ 2393.237717][T27349] ? isofs_mount+0x40/0x40 [ 2393.242480][T27349] ? _isofs_bmap+0x30/0x30 [ 2393.247022][T27349] isofs_mount+0x2d/0x40 [ 2393.251346][T27349] legacy_get_tree+0x70/0xc0 [ 2393.256060][T27349] vfs_get_tree+0x4a/0x1a0 [ 2393.260584][T27349] path_mount+0x11d4/0x1ce0 [ 2393.265585][T27349] __se_sys_mount+0x23d/0x2e0 [ 2393.270508][T27349] ? mntput+0x45/0x70 [ 2393.274874][T27349] __x64_sys_mount+0x63/0x70 [ 2393.280159][T27349] do_syscall_64+0x4a/0x90 [ 2393.284991][T27349] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2393.291416][T27349] RIP: 0033:0x467b1a [ 2393.295371][T27349] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.316662][T27349] RSP: 002b:00007f852236ffa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2393.325969][T27349] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 0000000000467b1a 12:55:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff9, 0xfffffffffffffff9, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, r2, 0x8, 0x70bd27, 0x25dfdbfc, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e22}]}, 0x48}, 0x1, 0x0, 0x0, 0x24000841}, 0x0) 12:55:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1012000010"], 0x1c}}, 0x0) 12:55:08 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2393.334388][T27349] RDX: 0000000020000000 RSI: 0000000020000040 RDI: 00007f8522370000 [ 2393.342967][T27349] RBP: 00007f8522370040 R08: 00007f8522370040 R09: 0000000020000000 [ 2393.351196][T27349] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000020000000 [ 2393.359489][T27349] R13: 0000000020000040 R14: 00007f8522370000 R15: 0000000020001580 12:55:08 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1048000010"], 0x1c}}, 0x0) 12:55:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000000)=0x400, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x84, 0x0, 0x7, 0x3, 0x0, 0x0, {0x0, 0x0, 0x7}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x3}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x8}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x81}, @NFACCT_PKTS={0xc}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c1}, 0x10) [ 2393.481172][T27378] FAULT_INJECTION: forcing a failure. [ 2393.481172][T27378] name failslab, interval 1, probability 0, space 0, times 0 [ 2393.494183][T27378] CPU: 1 PID: 27378 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2393.503094][T27378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2393.513707][T27378] Call Trace: [ 2393.516998][T27378] dump_stack+0x137/0x19d [ 2393.521542][T27378] should_fail+0x23c/0x250 [ 2393.525981][T27378] __should_failslab+0x81/0x90 [ 2393.530965][T27378] ? kobject_uevent_env+0x1a7/0xc40 [ 2393.536275][T27378] should_failslab+0x5/0x20 [ 2393.541183][T27378] kmem_cache_alloc_trace+0x49/0x310 [ 2393.546700][T27378] ? kernfs_put+0x22a/0x300 [ 2393.551833][T27378] ? ___cache_free+0x3c/0x300 [ 2393.557910][T27378] ? dev_uevent_filter+0x70/0x70 [ 2393.563344][T27378] kobject_uevent_env+0x1a7/0xc40 [ 2393.568925][T27378] ? kernfs_put+0x2e2/0x300 [ 2393.573517][T27378] kobject_uevent+0x18/0x20 [ 2393.578279][T27378] __loop_clr_fd+0x439/0x650 [ 2393.583012][T27378] lo_ioctl+0x9eb/0x11f0 [ 2393.587638][T27378] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 2393.594137][T27378] ? call_rcu+0x259/0x6c0 [ 2393.599348][T27378] ? avc_has_extended_perms+0x5d8/0x7b0 [ 2393.605256][T27378] ? kfree+0xf0/0x1d0 [ 2393.609426][T27378] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2393.615145][T27378] ? selinux_file_ioctl+0x8e0/0x970 [ 2393.620974][T27378] ? lo_release+0x120/0x120 [ 2393.625875][T27378] blkdev_ioctl+0x1d0/0x3c0 [ 2393.630775][T27378] block_ioctl+0x6d/0x80 [ 2393.635533][T27378] ? blkdev_iopoll+0x70/0x70 [ 2393.640222][T27378] __se_sys_ioctl+0xcb/0x140 [ 2393.644974][T27378] __x64_sys_ioctl+0x3f/0x50 [ 2393.650020][T27378] do_syscall_64+0x4a/0x90 [ 2393.654989][T27378] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2393.661077][T27378] RIP: 0033:0x4663b7 [ 2393.665359][T27378] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2393.686687][T27378] RSP: 002b:00007f852236ffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2393.695721][T27378] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004663b7 [ 2393.703935][T27378] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2393.714201][T27378] RBP: 00007f85223706bc R08: 00007f8522370040 R09: 0000000020000000 [ 2393.722886][T27378] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff [ 2393.731500][T27378] R13: 0000000000000016 R14: 00007f8522370000 R15: 0000000020001580 12:55:09 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2400000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:09 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x3}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="104c000010"], 0x1c}}, 0x0) 12:55:09 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:09 executing program 3: syz_genetlink_get_family_id$devlink(&(0x7f0000000000), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYRESDEC=r2], 0x1c}, 0x300, 0x0, 0x0, 0x20000814}, 0x0) 12:55:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, 0x0, &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1068000010"], 0x1c}}, 0x0) 12:55:09 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="106c000010"], 0x1c}}, 0x0) [ 2394.131096][T27416] FAULT_INJECTION: forcing a failure. [ 2394.131096][T27416] name failslab, interval 1, probability 0, space 0, times 0 [ 2394.144662][T27416] CPU: 0 PID: 27416 Comm: syz-executor.2 Not tainted 5.12.0-syzkaller #0 [ 2394.153413][T27416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2394.163819][T27416] Call Trace: [ 2394.167208][T27416] dump_stack+0x137/0x19d [ 2394.171925][T27416] should_fail+0x23c/0x250 [ 2394.176688][T27416] __should_failslab+0x81/0x90 [ 2394.181476][T27416] ? kobject_uevent_env+0x1a7/0xc40 [ 2394.187141][T27416] should_failslab+0x5/0x20 [ 2394.192131][T27416] kmem_cache_alloc_trace+0x49/0x310 [ 2394.197428][T27416] ? kernfs_put+0x22a/0x300 [ 2394.202392][T27416] ? ___cache_free+0x3c/0x300 [ 2394.207299][T27416] ? dev_uevent_filter+0x70/0x70 [ 2394.212507][T27416] kobject_uevent_env+0x1a7/0xc40 [ 2394.217634][T27416] ? kernfs_put+0x2e2/0x300 [ 2394.222224][T27416] kobject_uevent+0x18/0x20 [ 2394.227018][T27416] __loop_clr_fd+0x439/0x650 [ 2394.231707][T27416] lo_ioctl+0x9eb/0x11f0 [ 2394.236035][T27416] ? rcu_segcblist_enqueue+0x8e/0xa0 [ 2394.241495][T27416] ? call_rcu+0x259/0x6c0 [ 2394.246060][T27416] ? avc_has_extended_perms+0x5d8/0x7b0 [ 2394.251613][T27416] ? kfree+0xf0/0x1d0 [ 2394.255710][T27416] ? kcsan_setup_watchpoint+0x26e/0x470 [ 2394.261392][T27416] ? blkdev_common_ioctl+0x9c3/0x1040 [ 2394.266972][T27416] ? selinux_file_ioctl+0x8e0/0x970 [ 2394.272606][T27416] ? lo_release+0x120/0x120 [ 2394.277285][T27416] blkdev_ioctl+0x1d0/0x3c0 [ 2394.282004][T27416] block_ioctl+0x6d/0x80 [ 2394.286505][T27416] ? blkdev_iopoll+0x70/0x70 [ 2394.291282][T27416] __se_sys_ioctl+0xcb/0x140 [ 2394.295966][T27416] __x64_sys_ioctl+0x3f/0x50 [ 2394.300568][T27416] do_syscall_64+0x4a/0x90 [ 2394.305400][T27416] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2394.311398][T27416] RIP: 0033:0x4663b7 [ 2394.315500][T27416] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2394.335703][T27416] RSP: 002b:00007f852236ffa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2394.344461][T27416] RAX: ffffffffffffffda RBX: 00000000200014c0 RCX: 00000000004663b7 [ 2394.353224][T27416] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 2394.361283][T27416] RBP: 00007f85223706bc R08: 00007f8522370040 R09: 0000000020000000 [ 2394.369459][T27416] R10: 0000000000000001 R11: 0000000000000246 R12: ffffffffffffffff [ 2394.378262][T27416] R13: 0000000000000016 R14: 00007f8522370000 R15: 0000000020001580 12:55:09 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1074000010"], 0x1c}}, 0x0) 12:55:09 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2500000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:10 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x5}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="107a000010"], 0x1c}}, 0x0) 12:55:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, 0x0, &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS2(r1, 0x4020940d, &(0x7f0000000100)) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000030010"], 0x1c}}, 0x0) 12:55:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @empty}, {0x306, @remote}, 0x10, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'netpci0\x00'}) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYRES32], 0x1c}, 0x300}, 0x0) 12:55:10 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100d030010"], 0x1c}}, 0x0) 12:55:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000050010"], 0x1c}}, 0x0) 12:55:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2600000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000060010"], 0x1c}}, 0x0) 12:55:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), 0x0) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000070010"], 0x1c}}, 0x0) 12:55:11 executing program 3: sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x4, 0x70bd29, 0x25dfdbfd}, 0x14}}, 0x24040800) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) eventfd2(0x6, 0x80000) 12:55:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x8}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:11 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFULA_CFG_NLBUFSIZ={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2002080}, 0x4008000) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a2957fa6f9bab5b434e508191940abd2227fd6e000900"/81], 0x1c}, 0x300}, 0x20040000) 12:55:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000090010"], 0x1c}}, 0x0) 12:55:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x9}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2700000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:12 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000010403000000000000000500000508000340e8ffff00000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x8000}, 0x0) 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000a0010"], 0x1c}}, 0x0) 12:55:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xa}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), 0x0) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xb}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:12 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, 0x3, 0x8, 0x101, 0x0, 0x0, {0x3, 0x0, 0x3}, [@CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8d}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x5) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r1) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x7c, r2, 0x100, 0x70bd28, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={'\x00', '\xff\xff', @private=0xa010102}}, @NLBL_UNLABEL_A_SECCTX={0x22, 0x7, 'system_u:system_r:kernel_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x48044) [ 2396.997212][T27630] __nla_validate_parse: 10 callbacks suppressed [ 2396.997224][T27630] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000b0010"], 0x1c}}, 0x0) 12:55:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:12 executing program 3: ioctl$TIOCL_GETSHIFTSTATE(0xffffffffffffffff, 0x541c, &(0x7f0000000140)={0x6, 0x3}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000200)={0xcf3d, 0x8, 0xfffb}) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1c}, 0x300}, 0x0) 12:55:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000c0010"], 0x1c}}, 0x0) 12:55:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2800000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xc}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000d0010"], 0x1c}}, 0x0) 12:55:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x7, 0x400, 0x2, 0x5, 0xe, "bc8b24e2099f6982"}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000140)={0x5, 0x9, 0x7, 0xffffffff, 0x7, "df8c00f2f816342c78193ac2389b932708c560", 0xc0, 0xffffffff}) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000060000003000000000000000081baa9e8b34307032800ffffff8ae4535344d61a29e98e0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd", @ANYRESHEX=r2, @ANYRES64=r3], 0x1c}, 0x300}, 0x8014) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x3, 0x8, 0x401, 0x0, 0x0, {0xc, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4810) 12:55:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), 0x0) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10030d0010"], 0x1c}}, 0x0) 12:55:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xd}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000e0010"], 0x1c}}, 0x0) 12:55:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000110010"], 0x1c}}, 0x0) 12:55:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2900000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000120010"], 0x1c}}, 0x0) 12:55:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000480010"], 0x1c}}, 0x0) 12:55:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYBLOB="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", @ANYRESOCT=r0, @ANYRESHEX=r2, @ANYRES32=r0], 0x1c}, 0x300, 0x0, 0x0, 0x8000}, 0x0) socket(0x1e, 0x800, 0x7) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000080)={0x2814}, 0x4) syz_open_dev$tty20(0xc, 0x4, 0x0) 12:55:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x10}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10004c0010"], 0x1c}}, 0x0) 12:55:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x11}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2a00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000680010"], 0x1c}}, 0x0) 12:55:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x12}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10006c0010"], 0x1c}}, 0x0) 12:55:15 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, r0, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x31, 0x7, 'system_u:object_r:systemd_tmpfiles_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x18}}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x805) 12:55:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x25}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000740010"], 0x1c}}, 0x0) 12:55:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000280)={0x9}, 0x4) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @rand_addr=0x64010100}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @broadcast}, 0x2, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000140)='veth1_virt_wifi\x00', 0x3, 0x8, 0x4}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x0, 0x0, [0xaa, 0xffff, 0x0, 0xdfc, 0x3a6bd56b, 0x2], 0x3, &(0x7f00000002c0)=[{}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000000000000050000aa07b343070338ac0e561d0b907bd044d61a29e98c0c587e444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd00000000000000000000000000abbee3932d96a123b726bf6c3f0e040000005dd2d64cf2853f7262d5d8a0df8e34973f8cdac2b530348620189dc213b0987cf393c5e65c8a9ae180de8c4dc048b4e26211f39355d0a1d9844258f7d2e1d087aa1b5b59796c3dc13b8d1d5092b896e2d120792057d10125f5a63f06c20000"], 0x1c}, 0x300}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000100), 0x18000000000, 0x301442) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f00000004c0)=0xe8) 12:55:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10007a0010"], 0x1c}}, 0x0) 12:55:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x48}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000011"], 0x1c}}, 0x0) 12:55:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(0x0, &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000012"], 0x1c}}, 0x0) 12:55:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000010403000000050800034000000400000081baaa07b343ff2b2a5dfc1f0f0000000044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdb4a68ef0df46"], 0x1c}, 0x300}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000000)={0x20, 0x0, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x8001}, 0x80) 12:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000001c"], 0x1c}}, 0x0) 12:55:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r2, 0x80083313, &(0x7f0000000340)) ioctl$SNAPSHOT_FREE(r2, 0x3305) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000029"], 0x1c}}, 0x0) 12:55:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x60}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x11, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1020000190"], 0x1c}}, 0x0) 12:55:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0xfffffffffffffffe, 0x4000) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wg2\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @loopback}, &(0x7f0000000100)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x29, 0xf8, 0x0, 0x6, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x10, 0x10, 0x4, 0x2}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x7, 0x700, 0x4, 0x4, {{0x6, 0x4, 0x3, 0x1c, 0x18, 0x65, 0x0, 0x26, 0x29, 0x0, @multicast1, @empty, {[@end]}}}}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000300)={@initdev, @loopback, 0x0}, &(0x7f0000000340)=0xc) syz_io_uring_complete(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0x660, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [{{0x8}, {0x268, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xe034}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb9c6}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffb}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x84, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}]}}, {{0x8}, {0x274, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6b}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x7f, 0x9, 0xf, 0x8}, {0x9c, 0x9, 0x40, 0x5}, {0x9, 0x2, 0x1f, 0x200}, {0x8400, 0x3, 0x2, 0x5}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8}, {0xcc, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x1f, 0x2, 0x1f, 0x4}, {0x182f, 0x6, 0x8, 0x5}, {0x3, 0x6e, 0xfe, 0x1000}]}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}]}, 0x660}}, 0xc001) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000020010"], 0x1c}}, 0x0) 12:55:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) socket(0x11, 0x1, 0xfffffffb) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x800}, 0x8000) 12:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000030010"], 0x1c}}, 0x0) 12:55:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x68}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000040010"], 0x1c}}, 0x0) 12:55:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x12, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000080000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000050010"], 0x1c}}, 0x0) 12:55:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) 12:55:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x13, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000060010"], 0x1c}}, 0x0) 12:55:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x14, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x74}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000070010"], 0x1c}}, 0x0) 12:55:18 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf8, 0x4, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x9}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x10}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x66a}]}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_COUNTERS={0x7c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xc8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xfffffffffffffffe}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x5}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xa7}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xb47}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x9}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}]}, 0xf8}, 0x1, 0x0, 0x0, 0x881}, 0x24000800) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab8ab2fc9a61443cc7bd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x5}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x8}]}, 0x48}}, 0x20004000) [ 2402.991855][ T26] audit: type=1326 audit(1620132918.256:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28131 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 12:55:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7a}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000080010"], 0x1c}}, 0x0) 12:55:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x15, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000090010"], 0x1c}}, 0x0) [ 2403.816206][ T26] audit: type=1326 audit(1620132919.076:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=28131 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 12:55:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x16, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000a0010"], 0x1c}}, 0x0) 12:55:19 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r3, 0x3309) getpeername$inet(r3, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c005f20a7ba2f043dadffcc7171742dce8f7dec3cb830289016011c6c27f4a4e23b04495f7deb3c44e552ecfd64902e8a76528692725cc6ad148702d3fdbf8c922b938460633a168608e940a978c679faffc6c75b7f83a19e4a401687cf4f5b3fd7e04c75880821f15a2ff39a3fdb34d981c5c5fd73ff447984408134b10f7e126f64cbf51bf9e88e524c4fb45ba37aef08b965d48f99ba1fb7010256fe974cf7218711e6108b3e0943828d65a116", @ANYRES16=r4, @ANYBLOB="01002abd7000fcdbdf25020000000800080004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r5) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000000)={0x400}, 0x4) ioctl$TIOCCBRK(r3, 0x5428) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="b5fe4887f6999f7ed7c70dddf5dd121549599d20d29df61fa6176e61d64c9fa52dece8271c130c5f2108a7be67e0490df74313d99a89295326a6be9785baae1f1a883f755a19f41d5a05d1a18225dab4839519102ca57732cb69ddb08c61900f41c1a316955260bd93557c5cff00b9", @ANYRESOCT=r0], 0x1c}, 0x300, 0x0, 0x0, 0x81}, 0x0) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) 12:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000b0010"], 0x1c}}, 0x0) 12:55:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000c0010"], 0x1c}}, 0x0) 12:55:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x338}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x17, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000d0010"], 0x1c}}, 0x0) 12:55:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000e0010"], 0x1c}}, 0x0) 12:55:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x22, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r1, @ANYRESDEC=r1, @ANYRES32], 0x1c}, 0x300}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x64, r6, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}]}, 0xfffffffffffffd71}, 0x1, 0x0, 0x0, 0x40}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000200)={{{@in, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @loopback, 0x0}, &(0x7f0000000140)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x218, 0x0, 0x300, 0x70bd28, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x17c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}]}, 0x218}}, 0x800) 12:55:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000100010"], 0x1c}}, 0x0) 12:55:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x25, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000110010"], 0x1c}}, 0x0) 12:55:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x5503000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x48, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x600}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000120010"], 0x1c}}, 0x0) 12:55:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000480010"], 0x1c}}, 0x0) 12:55:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x700}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10004c0010"], 0x1c}}, 0x0) 12:55:21 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338acd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd000000000000"], 0x1c}, 0x300}, 0x0) 12:55:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000680010"], 0x1c}}, 0x0) 12:55:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x900}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10006c0010"], 0x1c}}, 0x0) 12:55:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xa00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x68, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xfffffff7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008881}, 0x4000001) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x4000000}, 0x4000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @private, @broadcast}, &(0x7f0000000040)=0xc) r3 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r3, 0x3309) getpeername$inet(r3, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000000104010200000000004000000a00000706000640000400000a00020000000007010000000a00020000000005020000000800054000000087"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f00000005c0)=0xe8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000640)={'ip_vti0\x00', &(0x7f0000000600)={'syztnl1\x00', r2, 0x20, 0x7, 0x976, 0x100, {{0x8, 0x4, 0x1, 0x5, 0x20, 0x67, 0x0, 0xa7, 0x29, 0x0, @local, @remote, {[@lsrr={0x83, 0xb, 0xab, [@loopback, @multicast1]}, @noop]}}}}}) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000680)={@multicast2, @loopback}, &(0x7f00000006c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000700)={'wg1\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@private2}}, &(0x7f0000000840)=0xe8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000880)={'tunl0\x00', r2, 0x7800, 0x1, 0x3, 0x7, {{0x2b, 0x4, 0x0, 0x33, 0xac, 0x68, 0x0, 0x20, 0x6, 0x0, @local, @multicast1, {[@generic={0x94, 0xa, "4ca15b66cd5ae35a"}, @timestamp_addr={0x44, 0x44, 0x95, 0x1, 0xd, [{@local, 0x80}, {@multicast2, 0x5}, {@empty, 0x6}, {@dev={0xac, 0x14, 0x14, 0xe}, 0x58}, {@multicast1, 0x6}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x80000001}, {@rand_addr=0x64010100, 0x3}, {@loopback, 0x9}]}, @timestamp_prespec={0x44, 0x44, 0x40, 0x3, 0x2, [{@dev={0xac, 0x14, 0x14, 0x3a}, 0x2}, {@broadcast, 0xfd}, {@multicast1, 0x40}, {@multicast1, 0x3}, {@rand_addr=0x64010102, 0x7}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x8}, {@private=0xa010101, 0x4}, {@empty, 0x1f}]}, @generic={0x7, 0x6, "d6c56069"}]}}}}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001640)={0xad4, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x13c, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x54}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xd13}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x134, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r2}, {0xc0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffa}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r2}, {0x13c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x16c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1f}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80fe}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}]}}, {{0x8, 0x1, r5}, {0x218, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r2}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x253}}}]}}, {{0x8, 0x1, r2}, {0x214, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x7203, 0x7, 0x5}, {0x4, 0x1, 0x5, 0xb94d}, {0x101, 0x58, 0x9, 0x200}, {0x5, 0x3, 0x2, 0x6}, {0x3, 0x6, 0x0, 0x2}, {0x0, 0x9, 0x5, 0x3}, {0x7fff, 0xee, 0x7f, 0x84}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}]}, 0xad4}, 0x1, 0x0, 0x0, 0x20044051}, 0x800) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200), 0x200, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r9, 0x80083314, &(0x7f0000000240)) 12:55:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6082140}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="880088f6", @ANYRES16=0x0, @ANYBLOB="000125bd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r1, @ANYBLOB="0e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c00040000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008c0004000000"], 0x88}, 0x1, 0x0, 0x0, 0x40c0}, 0x4800) r2 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x0, &(0x7f0000000580)=0x45, 0x0, 0x4) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000280)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x1, &(0x7f0000000240)={0x0, 0x3938700}, 0x1, 0x1, 0x0, {0x0, r4}}, 0x5) 12:55:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000740010"], 0x1c}}, 0x0) 12:55:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xb00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10007a0010"], 0x1c}}, 0x0) 12:55:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xc00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x1c}, 0x300}, 0x0) 12:55:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x74, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000310"], 0x1c}}, 0x0) 12:55:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xd00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000d0310"], 0x1c}}, 0x0) 12:55:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000510"], 0x1c}}, 0x0) 12:55:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:23 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x80, 0x10, 0x8, 0x7ff, {{0xb, 0x4, 0x0, 0x3c, 0x2c, 0x68, 0x0, 0x3f, 0x2f, 0x0, @loopback, @private=0xa010102, {[@end, @rr={0x7, 0x13, 0x4a, [@remote, @dev={0xac, 0x14, 0x14, 0x32}, @multicast1, @multicast2]}, @noop]}}}}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in6=@ipv4={""/10, ""/2, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000340)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0x518, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x170, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x34dd}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x83e}}, {0x8}}}]}}, {{0x8}, {0x1d0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4ab}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x518}, 0x1, 0x0, 0x0, 0x4004050}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000610"], 0x1c}}, 0x0) 12:55:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1100}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000710"], 0x1c}}, 0x0) 12:55:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xaf, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:23 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001041300000000050000050800034000000400001681baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca958026f9bab5b434e508191940abd2227fd000000"], 0x1c}, 0x300, 0x0, 0x0, 0x80c0}, 0x2400c040) 12:55:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000910"], 0x1c}}, 0x0) 12:55:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000a80)={0x0, 0x0, 0xc, 0xb, 0x13d, &(0x7f0000000680)="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"}) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4c000000040a010200000000000000cf3c82ebfe982d2d005d797a31000000004f83101d73797a31000000000a000700726f75746500000008000a40000000010900010073797a310000000069ac3f64ef74991b289f3918822469ce21831e7a01112c5640591823744d2e550b6b0333973b630a66fd404adffed0b0e599a89e031e8cfadb8e32df49777180bab9094680f20a8a6424ee3931fb2dbf43aff79377d557b8"], 0x4c}, 0x1, 0x0, 0x0, 0x40050}, 0x20000000) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x44010}, 0x0) r2 = socket(0x21, 0xc, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000300)={0x7fff, {{0x2, 0x4e24, @multicast1}}, 0x1, 0x1, [{{0x2, 0x4e21, @local}}]}, 0x110) set_robust_list(&(0x7f0000000640)={&(0x7f0000000580)={&(0x7f0000000540)}, 0x9, &(0x7f0000000600)={&(0x7f00000005c0)}}, 0x18) getsockopt$inet_mreqsrc(r2, 0x0, 0x26, &(0x7f00000004c0)={@private, @multicast1, @multicast1}, &(0x7f0000000500)=0xc) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x2c, 0x0, 0x7, 0x0, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xc9223c8}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x20000000) 12:55:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1200}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000a10"], 0x1c}}, 0x0) 12:55:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfe, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000b10"], 0x1c}}, 0x0) 12:55:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c03000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1e72}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x204, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000c10"], 0x1c}}, 0x0) 12:55:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @empty, @broadcast}, &(0x7f00000000c0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000100)={@local, @private, 0x0}, &(0x7f0000000140)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000780)={0x2b0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x10c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x180, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x81, 0xff, 0x3, 0x8}, {0xfff7, 0x9, 0x7, 0x1f}, {0xff, 0x0, 0x4, 0x2}]}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r3}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}]}}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x4010}, 0x824) 12:55:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x30, 0x1, 0x4, 0x801, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0x8000}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000600000000000000b343070338ac0e561d0b907bd044d61a29e98c0c34afd5e26d2ca957fa6f9bab5b434e508191940abd2227fd00000000"], 0x1c}, 0x300}, 0x0) 12:55:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000d10"], 0x1c}}, 0x0) [ 2409.677894][T28648] loop2: detected capacity change from 0 to 1 12:55:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2409.747140][T28648] loop2: detected capacity change from 0 to 1 12:55:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000030d10"], 0x1c}}, 0x0) 12:55:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2409.890690][T28699] loop2: detected capacity change from 0 to 1 12:55:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x6d03000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b34307030c34af444d9cecd5e26d2c8857fa6f9bab5b434e508191940abd2227fd000000000000000000000000000000fd98da0563b574e55a46ec46ee1e668190a8c17982e774979ad3dd98e5d7828c4a68589595d601915569e704e3642a4fb91bd38b3e3dd0d6347b9521a8a59c400d61fe0e71a49060b0456f9b664461d447f1fba3080000000000000094d18cec8f3e"], 0x1c}, 0x300}, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000440)={0x0, @initdev, @initdev}, &(0x7f0000000340)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000380)={@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, r3}, 0xc) r4 = accept$inet(r1, 0x0, &(0x7f0000000300)) setsockopt$IP_VS_SO_SET_TIMEOUT(r4, 0x0, 0x48a, &(0x7f0000000480)={0x400, 0x1f}, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="00010000030801040100000000000000030000001400048008000140000000000000050003001100000044000480080006400000000408000540ffffffff080004400000000008000340ffffffff080004400000000908000640000000010800024000000005080003400000000944000480080001400000000008000740000004000800074000000449080003400000015d080001400000000108000640000080010800034000000001080001400000550c34000480080007400000000308000840000000080800094000000fff080004400000000708000300000047c008000740000003ff0900010073797a3100000000"], 0x100}, 0x1, 0x0, 0x0, 0x4000005}, 0x800) 12:55:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x3803}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000e10"], 0x1c}}, 0x0) 12:55:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x350, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000001110"], 0x1c}}, 0x0) 12:55:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0xa4, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x2, 'lblcr\x00', 0x10, 0x8001, 0x39}, 0x2c) 12:55:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2410.679019][T28730] loop2: detected capacity change from 0 to 1 12:55:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000001210"], 0x1c}}, 0x0) [ 2410.764042][T28730] loop2: detected capacity change from 0 to 1 12:55:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x402, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000a1440df87232d6e3948285280001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2410.907800][T28769] loop2: detected capacity change from 0 to 2 [ 2410.967849][T28769] loop2: detected capacity change from 0 to 2 12:55:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000004810"], 0x1c}}, 0x0) 12:55:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd923f95de607753d98cb0e8d59067293c10f63d6c6b75482895ac56c7b158380f5d9ecddb83f506a2b7c1b40da75819302ab241700b9e245d9b51fba31b81c11b28d33463e937e3f071d7446951d6abcb2622241067edd3482fefe88c8e2483fed53101f1a19e277780acc0025cf3ec9213689a211d592578bc7202ed3954620f008a5aa3d6e5b3610914eb92a7c5a0758c4f79c6026b8026d1805652777f8d1654db7c22a2948a8bbc974f6b3df0f1cfe1de685e3be7344031e7aa849ad2f218f23f55c59dcb1343a8eca060c77f9f9624ea5a125810a9ac44413c50eae60b85696a1065c9117d628c354f32bcbf6fbc99f6720c998107c59da034ab59ca091920fbc0bd49e91388a125ead52a"], 0x1c}, 0x300}, 0x0) 12:55:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x406, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000004c10"], 0x1c}}, 0x0) [ 2411.648952][T28805] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2411.649561][T28796] loop2: detected capacity change from 0 to 2 12:55:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000006810"], 0x1c}}, 0x0) [ 2411.745402][T28796] loop2: detected capacity change from 0 to 2 12:55:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000006c10"], 0x1c}}, 0x0) 12:55:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2411.873788][T28837] loop2: detected capacity change from 0 to 2 [ 2411.925803][T28837] loop2: detected capacity change from 0 to 2 12:55:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000007410"], 0x1c}}, 0x0) 12:55:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:27 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @private}, &(0x7f0000000080)=0xc) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f0000001280)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @broadcast}, &(0x7f0000000100)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @empty}, &(0x7f0000000200)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000240)={@remote, @multicast1, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}, 0x0, @in=@private}}, &(0x7f00000003c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'gre0\x00', &(0x7f00000004c0)={'gretap0\x00', 0x0, 0x80, 0x0, 0x1ca, 0x3f, {{0x1d, 0x4, 0x0, 0x3, 0x74, 0x64, 0x0, 0x34, 0x2f, 0x0, @empty, @multicast2, {[@ra={0x94, 0x4}, @generic={0x89, 0xd, "7f12e4119995069dd906ff"}, @ssrr={0x89, 0x1b, 0x49, [@rand_addr=0x64010102, @broadcast, @rand_addr=0x64010101, @rand_addr=0x64010100, @empty, @dev={0xac, 0x14, 0x14, 0x28}]}, @timestamp_prespec={0x44, 0xc, 0xce, 0x3, 0x0, [{@local, 0x5}]}, @lsrr={0x83, 0x27, 0xe5, [@broadcast, @multicast1, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @private=0xa010101, @multicast2]}, @end]}}}}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000006c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000800)={'gretap0\x00', &(0x7f0000000780)={'tunl0\x00', 0x0, 0x20, 0x8000, 0x8, 0x8, {{0x14, 0x4, 0x1, 0x6, 0x50, 0x67, 0x0, 0x3f, 0x29, 0x0, @multicast1, @rand_addr=0x64010101, {[@timestamp_prespec={0x44, 0x2c, 0x1f, 0x3, 0x7, [{@multicast2, 0xdb}, {@local}, {@loopback, 0x7f}, {@private=0xa010101}, {@rand_addr=0x64010100}]}, @end, @timestamp={0x44, 0xc, 0x9, 0x0, 0x2, [0x7, 0x80000000]}, @end]}}}}}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000840)={@initdev, @multicast2, 0x0}, &(0x7f0000000880)=0xc) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000940)={'ip6gre0\x00', &(0x7f00000008c0)={'ip6tnl0\x00', 0x0, 0x4, 0x3f, 0x80, 0x4, 0x6b, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x1}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001200)={&(0x7f0000000980)={0x880, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [{{0x8}, {0xd0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x6, 0x2, 0x7, 0xe0bf}]}}}]}}, {{0x8, 0x1, r4}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r6}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xe06}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x1a4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r12}}}]}}, {{0x8}, {0x21c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6e}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r13}}}]}}, {{0x8}, {0xe8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r14}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf6b7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xccae}}}]}}]}, 0x880}, 0x1, 0x0, 0x0, 0x1}, 0x844) 12:55:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000007a10"], 0x1c}}, 0x0) [ 2412.620590][T28877] loop2: detected capacity change from 0 to 3 12:55:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x721e}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000a"], 0x1c}}, 0x0) [ 2412.703898][T28877] loop2: detected capacity change from 0 to 3 12:55:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000003"], 0x1c}}, 0x0) 12:55:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x604, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:28 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000000)) [ 2412.800216][T28917] loop2: detected capacity change from 0 to 3 [ 2412.863410][T28917] loop2: detected capacity change from 0 to 3 12:55:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x7fffffffffffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000005"], 0x1c}}, 0x0) 12:55:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7400}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:28 executing program 3: r0 = syz_io_uring_complete(0x0) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000000), r0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$SIOCGSTAMPNS(r7, 0x8907, &(0x7f00000000c0)) recvfrom$inet(r8, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRESHEX=r1, @ANYRES32=r8, @ANYRES64=r7, @ANYRESDEC, @ANYRES32=r5, @ANYRESOCT=r6], 0x1c}, 0x300, 0x0, 0x0, 0x8010}, 0x0) 12:55:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000006"], 0x1c}}, 0x0) [ 2413.596342][T28949] loop2: detected capacity change from 0 to 3 12:55:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7a00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000007"], 0x1c}}, 0x0) 12:55:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x34000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2413.688098][T28949] loop2: detected capacity change from 0 to 3 12:55:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000009"], 0x1c}}, 0x0) 12:55:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2413.818504][T29009] loop2: detected capacity change from 0 to 4 12:55:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x400300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000a"], 0x1c}}, 0x0) 12:55:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:29 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x800, 0x8040) renameat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2414.563014][T29039] loop2: detected capacity change from 0 to 5 12:55:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe0ffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000002b0a"], 0x1c}}, 0x0) [ 2414.621853][T29039] loop2: detected capacity change from 0 to 5 12:55:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000b"], 0x1c}}, 0x0) 12:55:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:30 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0xc8c0) [ 2414.735751][T29076] loop2: detected capacity change from 0 to 5 [ 2414.820177][T29091] Restarting kernel threads ... done. [ 2414.828310][T29076] loop2: detected capacity change from 0 to 5 [ 2414.864266][T29098] Restarting kernel threads ... done. 12:55:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x9200000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000c"], 0x1c}}, 0x0) 12:55:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$KDMKTONE(r1, 0x4b30, 0x800) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa76ac7144de07b34307033829e98c0c34af444d9cecd5e26d2ca962fa6f9bab5b434e508191940abd2227fd00"/85], 0x1c}, 0x300}, 0x0) 12:55:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:30 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xbc, 0x3, 0x8, 0x801, 0x0, 0x0, {0xa, 0x0, 0x9}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x400}]}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x59}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffffdf47}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x400}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x180000}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x59}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x890d}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xc}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3a}, @CTA_TIMEOUT_DATA={0x34, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1f}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xff}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6006}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0xbc}, 0x1, 0x0, 0x0, 0x22004044}, 0x20001050) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004044) [ 2415.526464][T29125] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2415.534782][T29122] loop2: detected capacity change from 0 to 6 12:55:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000d"], 0x1c}}, 0x0) 12:55:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x3000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2415.602035][T29122] loop2: detected capacity change from 0 to 6 12:55:30 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x30044095}, 0x20000004) 12:55:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000e"], 0x1c}}, 0x0) [ 2415.689225][T29156] loop2: detected capacity change from 0 to 6 12:55:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x9300000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000210"], 0x1c}}, 0x0) 12:55:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x3380000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x0, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000310"], 0x1c}}, 0x0) 12:55:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2416.530779][T29194] loop2: detected capacity change from 0 to 7 12:55:31 executing program 3: shmget(0x3, 0x4000, 0x4, &(0x7f0000ff9000/0x4000)=nil) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7ff, 0x109000) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x9}}, @NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x800}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x44) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fafd00"/80], 0x1c}, 0x300}, 0x0) [ 2416.620983][T29194] loop2: detected capacity change from 0 to 7 12:55:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x5000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000410"], 0x1c}}, 0x0) 12:55:32 executing program 3: socket$inet_icmp(0x2, 0x2, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2416.761944][T29231] loop2: detected capacity change from 0 to 7 [ 2416.839670][T29231] loop2: detected capacity change from 0 to 7 12:55:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x97ffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000510"], 0x1c}}, 0x0) 12:55:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@broadcast, @dev={0xac, 0x14, 0x14, 0x3c}}, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1020, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x0, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0xc020660b, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="0000000001040300000000000000050000050800034000000400000081baaa07b343072218ac0e561d0b907bd00010000034741e311a29e9880c34af444d9cecd5e26d0ba9572454144d5b434e508191"], 0x1c}, 0x300}, 0x0) [ 2417.476171][T29266] loop2: detected capacity change from 0 to 8 12:55:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000610"], 0x1c}}, 0x0) 12:55:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2417.522051][T29266] loop2: detected capacity change from 0 to 8 12:55:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034007b343070338ac0e561d0b907bd044d61a550f8c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd000000000000004000"], 0x1c}, 0x300}, 0x0) 12:55:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000710"], 0x1c}}, 0x0) 12:55:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1100, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2417.636137][T29312] loop2: detected capacity change from 0 to 8 [ 2417.683850][T29312] loop2: detected capacity change from 0 to 8 12:55:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaa00000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000810"], 0x1c}}, 0x0) 12:55:33 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000001000000050000050800034000000400000081baaa07b343070338ac0ec46f0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfec6c69a924c6a677bdd60e5189f316f0f763db249cb9fe47d358e27f307cf337db428f0ec574644c5991704d53bfbea4e56978aa7caa5e9ffa7e83fbeee01ce3246b76b0df328158645aa4d5f2e85dd035387f068c73813625bc2923bc3089c654667c1e6e747d8a1af3e41ff22b4c75c3ff4c367aa318c041ef9599a84"], 0x1c}, 0x300}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000428bd7000fedbdf2503000000060001004e24000006000a004e230000050004000200000005000300020000001400090000000e0000000000000090a9068cc9c821c535d33733f18b50ed00000000000014000700fe8000000000000000000000000000bb14000900fe880000000000000000000000000101"], 0x70}, 0x1, 0x0, 0x0, 0x6205bf1f7a3d6ee4}, 0x4000815) 12:55:33 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x8000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1200, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x0, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000910"], 0x1c}}, 0x0) [ 2418.439576][T29340] loop2: detected capacity change from 0 to 9 [ 2418.461708][T29345] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2418.491189][T29340] loop2: detected capacity change from 0 to 9 12:55:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1300, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000a10"], 0x1c}}, 0x0) 12:55:33 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x9000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:33 executing program 3: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x4e20, @broadcast}, {0x6}, 0x0, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'tunl0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @rand_addr, @dev}, &(0x7f0000000140)=0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @initdev}, &(0x7f0000000280)=0x10, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f00000002c0)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000340), 0xfffffffffffffff9, 0xc00) syz_genetlink_get_family_id$team(&(0x7f0000000300), r2) 12:55:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000b10"], 0x1c}}, 0x0) [ 2418.664178][T29382] loop2: detected capacity change from 0 to 9 [ 2418.714216][T29382] loop2: detected capacity change from 0 to 9 12:55:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xac4322ec00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xa000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000c10"], 0x1c}}, 0x0) 12:55:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1400, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(0xffffffffffffffff, 0x80083314, &(0x7f0000000000)) 12:55:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000d10"], 0x1c}}, 0x0) 12:55:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000e10"], 0x1c}}, 0x0) [ 2419.444239][T29438] loop2: detected capacity change from 0 to 10 12:55:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x37}}, 0x10) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000010403b1d13d8c0a000000000000000500000508000340bf000400000181baaa0100008000000000561d0b907bd044d61a29e98c0434af444d9cecd5e26d2ca957fa6f09ab5b434e508191940abd2227fdfff3a2f9336444353be0b164cf7465ebbb6206ff48a8245b67afcc90f43560fb89e1e149562ab53e6823cff45fdacf29b2ec5df8b5e0edc868577e34095701609fa8d694b8d9788849a837fd2879770af4c892d000000000000000"], 0x1c}, 0x300}, 0x0) 12:55:34 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES16, @ANYRESHEX=r1, @ANYRES16=r3, @ANYRES64=r2], 0x1c}, 0x300}, 0x4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) 12:55:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xb000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2419.526642][T29438] loop2: detected capacity change from 0 to 10 [ 2419.531070][T29471] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:55:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1500, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2419.618085][T29484] loop2: detected capacity change from 0 to 10 [ 2419.653715][T29484] loop2: detected capacity change from 0 to 10 12:55:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000001010"], 0x1c}}, 0x0) 12:55:35 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xc000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1600, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000001110"], 0x1c}}, 0x0) [ 2420.384887][T29515] loop2: detected capacity change from 0 to 11 12:55:35 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xd000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1700, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2420.455187][T29515] loop2: detected capacity change from 0 to 11 12:55:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000001210"], 0x1c}}, 0x0) [ 2420.546413][T29545] loop2: detected capacity change from 0 to 11 12:55:35 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="030000070600024000000000050003003a0000000600010073397a3000000000050003003a00d1040000000000000000000000000000001099f631add328491aed50d64606ee06838664fbf5f58be799e3a03f5f2d302d1c86a1b01bccf513c1f5"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x800) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000104030000000000000081050000bf000000400000040000aa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd000000"], 0x1c}, 0x300}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r1) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)={0x48, 0x0, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x9}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x8008) 12:55:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000004810"], 0x1c}}, 0x0) 12:55:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2420.609301][T29545] loop2: detected capacity change from 0 to 11 [ 2420.697569][T29576] loop2: detected capacity change from 0 to 16 [ 2420.760088][T29576] loop2: detected capacity change from 0 to 16 12:55:36 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:36 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000004c10"], 0x1c}}, 0x0) 12:55:36 executing program 3: iopl(0x9) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000006810"], 0x1c}}, 0x0) [ 2421.366513][T29606] loop2: detected capacity change from 0 to 16 12:55:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESOCT], 0x1c}, 0x300}, 0x0) 12:55:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000006c10"], 0x1c}}, 0x0) 12:55:36 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x10000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2421.445978][T29606] loop2: detected capacity change from 0 to 16 12:55:36 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2200, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:36 executing program 3: r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='/\x00', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)={0x0, 0x0, @c}, 0x29, 0xfffffffffffffffa) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffa, r1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2421.615546][T29652] loop2: detected capacity change from 0 to 17 12:55:37 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000007410"], 0x1c}}, 0x0) 12:55:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000000)='./file0\x00', 0x10a, 0x2002, 0x12345}, 0x2101) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdcf783ec532f6712ae20921e131335dc2789d2decc14be764a196be083409e1285f3241145335dbd04c7f75df79d38dea8a1097bc23f9aa4ae662ac2f36ae2ce1f77ebb1ea982b8ac308f38f078f174508db7f658c1c265405be4e93e8f3e70deea98852c1622322387c4d9756705"], 0x1c}, 0x300}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x1, 'vlan0\x00', 0x3}, 0x18) 12:55:37 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x11000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2500, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000007a10"], 0x1c}}, 0x0) [ 2422.323639][T29670] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2422.376272][T29683] loop2: detected capacity change from 0 to 18 12:55:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000011"], 0x1c}}, 0x0) 12:55:37 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x12000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:37 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2422.485236][T29683] loop2: detected capacity change from 0 to 18 12:55:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000012"], 0x1c}}, 0x0) 12:55:37 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x20000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2422.558528][T29714] loop2: detected capacity change from 0 to 31 [ 2422.611606][T29714] loop2: detected capacity change from 0 to 31 [ 2423.157180][T29736] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:55:38 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000001c"], 0x1c}}, 0x0) 12:55:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:38 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x25000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x8, 0x3, 0x0, 0x0, {0x1, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x20040001}, 0x800) 12:55:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000029"], 0x1c}}, 0x0) [ 2423.347869][T29753] loop2: detected capacity change from 0 to 32 12:55:38 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x48000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:38 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000002"], 0x1c}}, 0x0) 12:55:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="02002abd7000fddbdf25c90000000c0006e7fabb627d793837a73ffc0003000000030000003d928992245e21958f01daa550a44de5eee86e25df90e82d69bf74e967c568f2bf98ee07660de178a986"], 0x20}, 0x1, 0x0, 0x0, 0x24000000}, 0x4002) 12:55:38 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4800, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2423.420562][T29753] loop2: detected capacity change from 0 to 32 12:55:38 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), r2) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r3 = accept4$inet(r1, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10, 0x0) getpeername$inet(r3, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r1) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100), r2) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="d874bcdc982b841f689650a8bfd8fe5fb37afee3606ea13b1d56541a802ece539eb82d3874421200d2c9daa4ddcc70e904e8ec913107000000d657127af46f365c7c6cd57cf98d9ac5d55d69b36471e173c9162c78fd6b8d64435612b71604711feb34e8f6ff0b46e9cbd396f72877eac1010b991cbb0310cde2471dcc6c7385590e0b63675900d92271277b685e4ba3ec29e68dc398a2a961c1ab76d68fa2c55ea9873848ee5bfa8f19503136fdb1ff5a4f4d44", @ANYRES16=r4, @ANYBLOB="000828bd7000fcdbdf2507000000080005000a0101021400020000000000000000000000000000000001050001000000000005000100000000001400060073797a6b616c6c657230000000000000"], 0x54}, 0x1, 0x0, 0x0, 0x14}, 0x40000) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000bccaf5c9c04f01040300000000000000ae3872b60800eb40000004efffff80baaa07b343078bbaac0e561d0b907bd044d61a29e98c0c1b57612634af444d9cecd5e26d2ca957fa6f9bab5b434e508191940a"], 0x1c}, 0x300}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r5) [ 2423.508726][T29788] loop2: detected capacity change from 0 to 36 [ 2423.582092][T29788] loop2: detected capacity change from 0 to 36 12:55:39 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000003"], 0x1c}}, 0x0) 12:55:39 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x1c}, 0x300}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 12:55:39 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) [ 2424.294752][T29826] loop2: detected capacity change from 0 to 38 12:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000004"], 0x1c}}, 0x0) 12:55:39 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x60000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000005"], 0x1c}}, 0x0) [ 2424.354167][T29826] loop2: detected capacity change from 0 to 38 12:55:39 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5003, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000006"], 0x1c}}, 0x0) 12:55:39 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x68000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2424.476725][T29864] loop2: detected capacity change from 0 to 40 [ 2424.570699][T29864] loop2: detected capacity change from 0 to 40 12:55:40 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffffffffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000007"], 0x1c}}, 0x0) 12:55:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6800, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:40 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:40 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300, 0x0, 0x0, 0x40080c0}, 0x4000084) r1 = syz_io_uring_complete(0x0) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x4, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000804}, 0x4000001) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000100)={'wpan1\x00'}) 12:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000008"], 0x1c}}, 0x0) 12:55:40 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x721e0000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2425.311302][T29910] loop2: detected capacity change from 0 to 52 12:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000009"], 0x1c}}, 0x0) 12:55:40 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9b00000000000000070abd2227fd"], 0x1c}, 0x300}, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) getpeername$inet(r1, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x1, 0x4, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFULA_CFG_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x80000000}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x1}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0x8}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x2}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0x6}, @NFULA_CFG_QTHRESH={0x8, 0x5, 0x1, 0x0, 0xd4ca}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x48015) [ 2425.391519][T29910] loop2: detected capacity change from 0 to 52 12:55:40 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000a"], 0x1c}}, 0x0) [ 2425.499427][T29947] loop2: detected capacity change from 0 to 54 12:55:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f000000000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:41 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x74000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000b"], 0x1c}}, 0x0) 12:55:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7400, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:41 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) r3 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r3, 0x0) r5 = syz_io_uring_complete(r4) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) getpeername$inet(r5, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x8080}, 0x0) 12:55:41 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000c"], 0x1c}}, 0x0) 12:55:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000d"], 0x1c}}, 0x0) [ 2426.268250][T29967] loop2: detected capacity change from 0 to 58 12:55:41 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7a000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2426.352248][T29967] loop2: detected capacity change from 0 to 58 12:55:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000e"], 0x1c}}, 0x0) 12:55:41 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:41 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x9effffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2426.473203][T30008] loop2: detected capacity change from 0 to 61 [ 2426.543051][T30008] loop2: detected capacity change from 0 to 61 12:55:42 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffbffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000011"], 0x1c}}, 0x0) 12:55:42 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xefffffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xaf00, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:42 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:42 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:42 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c63dea13f4d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd4dda8aa0"], 0x1c}, 0x300}, 0x0) [ 2427.265678][T30038] loop2: detected capacity change from 0 to 87 12:55:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000012"], 0x1c}}, 0x0) [ 2427.332389][T30063] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2427.354636][T30038] loop2: detected capacity change from 0 to 87 12:55:42 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc0, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:42 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xf0ffffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$link(0x8, r1, r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff9, r0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000001c"], 0x1c}}, 0x0) [ 2427.525631][T30089] loop2: detected capacity change from 0 to 118 [ 2427.597174][T30089] loop2: detected capacity change from 0 to 118 12:55:43 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x4e20, @remote}, {0x7, @local}, 0x48, {0x2, 0x4e21, @broadcast}, 'bond0\x00'}) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d01a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:43 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffe000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000029"], 0x1c}}, 0x0) 12:55:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:43 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x5456, &(0x7f0000000100)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000000a"], 0x1c}}, 0x0) [ 2428.259155][T30139] loop2: detected capacity change from 0 to 127 12:55:43 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffff7f}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:43 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffe, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000090"], 0x1c}}, 0x0) 12:55:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8c0}, 0x84) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000200)) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c0000000156c6f2390d9fde1c17cdacc5695411040300000000000000050000050800034000000400000081eeb48810baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444dafecd5e26d5f1eac"], 0x1c}, 0x300}, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4800) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x418, 0x0, 0x110, 0x0, 0x330, 0x330, 0x330, 0x4, &(0x7f0000000280), {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0x4}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @mac=@local, @multicast2, @local, 0x8}}}, {{@arp={@multicast1, @remote, 0xff000000, 0xff000000, 0x3, 0xa, {@empty, {[0xff, 0xff, 0xff, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff]}}, 0x5, 0x1f, 0x1, 0x9, 0x1000, 0x9, 'caif0\x00', 'ip6gre0\x00', {0x101}, {}, 0x0, 0xa1}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="cd8619ed3f93", @empty, @multicast2, @private=0xa010102, 0x4, 0x3b319b44c3ed616}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x468) [ 2428.338942][T30139] loop2: detected capacity change from 0 to 127 [ 2428.442028][T30179] loop2: detected capacity change from 0 to 127 12:55:44 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0xf}}, 0x0) 12:55:44 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffff9e}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:44 executing program 3: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x80, 0x7, 0x4, {{0x7, 0x4, 0x1, 0x4, 0x1c, 0x65, 0x0, 0x12, 0x29, 0x0, @local, @broadcast, {[@end, @generic={0x86, 0x4, "4906"}, @noop]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@private1}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)={@dev, @dev, 0x0}, &(0x7f00000004c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r6, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f0000000f80)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @private=0xa010101}, 0x20, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000f40)='hsr0\x00', 0xb2e6, 0x3f, 0x8001}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @local, @dev}, &(0x7f0000000580)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000ec0)={&(0x7f00000005c0)={0x8e8, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8}, {0xe0, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x20, 0x7, 0x3, 0x7}, {0x101, 0x6, 0xf0}, {0x8, 0x82, 0x2, 0x2}, {0x7, 0x3, 0x3, 0x8000}, {0xae, 0x8, 0xdd, 0x3}, {0x654c, 0x7f, 0xff, 0x40}]}}}]}}, {{0x8, 0x1, r1}, {0xfc, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8d7e}}, {0x8}}}]}}, {{0x8}, {0x68, 0x2, 0x0, 0x1, [{0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x3, 0x2, 0x4, 0xff}, {0x7f, 0x3, 0x20}, {0x6, 0x6, 0x20, 0x9}, {0x4, 0x0, 0xf6, 0x2a24}, {0xffe0, 0x3, 0x0, 0x7ff}, {0x6, 0x1, 0x2, 0x3}]}}}]}}, {{0x8, 0x1, r5}, {0x120, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xc0d}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x60, 0x2, 0x0, 0x1, [{0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0x604, 0x1f, 0x27, 0xaa977e8}, {0x2, 0x85, 0x1f, 0x1}, {0xe0a, 0x7f, 0x7, 0x2000}, {0x3, 0x5, 0x20, 0x8}, {0x4, 0x6, 0x7f, 0x8}]}}}]}}, {{0x8}, {0x218, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x39a}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3fffc0}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}]}, 0x8e8}, 0x1, 0x0, 0x0, 0x40004}, 0x48851) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) [ 2429.262531][T30223] loop2: detected capacity change from 0 to 256 12:55:44 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffffef}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x14}}, 0x0) 12:55:44 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xfffffff0}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2429.411200][T30223] loop2: detected capacity change from 0 to 256 12:55:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0xc0}}, 0x0) 12:55:44 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2429.535589][T30273] loop2: detected capacity change from 0 to 1024 12:55:45 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffff0700, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0xec0}}, 0x0) 12:55:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80040, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:45 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x40030000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:45 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x0, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:45 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r2, 0x3309) r3 = socket$inet(0x2, 0x5, 0x81) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000240)={{0x0, @rand_addr=0x64010101, 0x4e20, 0x0, 'none\x00', 0x9, 0x8, 0x58}, {@multicast1, 0x4e20, 0x0, 0x1, 0x100, 0x6}}, 0x44) getpeername$inet(r2, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) sendmsg$NFULNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES64=r2, @ANYRES32], 0x1c}, 0x300, 0x0, 0x0, 0x10}, 0x0) syz_io_uring_setup(0x2cfc, &(0x7f0000000080)={0x0, 0x84d8, 0x10, 0x2, 0x2dd, 0x0, r2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) r5 = syz_io_uring_complete(r4) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000200)) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x7, 0x4, 0x410, 0x0, 0x110, 0x218, 0x328, 0x328, 0x328, 0x4, &(0x7f0000000040), {[{{@arp={@dev={0xac, 0x14, 0x14, 0x27}, @local, 0x0, 0xffffffff, 0x10, 0xa, {@empty, {[0x0, 0xff, 0x0, 0x0, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}}, 0x7, 0x1, 0x0, 0x7fff, 0x9, 0xcba, 'wg0\x00', 'veth1_to_bridge\x00', {0xff}, {0xff}, 0x0, 0x4}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @local, 0x1, 0x1}}}, {{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x1, {0x7}}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @mac=@remote, @local, @dev={0xac, 0x14, 0x14, 0xd}, 0x1, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x460) 12:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x33fe0}}, 0x0) 12:55:45 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe0ffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x2000045c}}, 0x0) [ 2430.248520][T30320] loop2: detected capacity change from 0 to 1024 12:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x7ffff000}}, 0x0) [ 2430.326273][T30320] loop2: detected capacity change from 0 to 1024 12:55:45 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0xfffffdef}}, 0x0) [ 2430.472389][T30371] loop2: detected capacity change from 0 to 8192 [ 2430.557953][T30371] loop2: detected capacity change from 0 to 8192 12:55:46 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff7f, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:46 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x100000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x2}, 0x0) 12:55:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:46 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x78, 0x0, 0x7, 0x101, 0x0, 0x0, {0xc, 0x0, 0x3}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x2c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x80}, @NFACCT_FILTER_VALUE={0x8}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x1000}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) [ 2431.254663][T30423] loop2: detected capacity change from 0 to 32768 12:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x8}, 0x0) 12:55:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d8191940abd2227fd"], 0x1c}, 0x300}, 0x0) 12:55:46 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x200000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:46 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2431.364350][T30423] loop2: detected capacity change from 0 to 32768 12:55:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x300}, 0x0) 12:55:46 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x81, 0x28040) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000000c0)) sendmsg$NFT_MSG_GETCHAIN(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="70008000040a010800000000000000000500000308000a400000000208000540fffffffe00340008800c00014000000000000000ad0c00014000000000000000040c00024000000000000000080c00024000000000005b00070900030073797a3000000000000000000000000000000003"], 0x70}, 0x1, 0x0, 0x0, 0xc081}, 0x4040) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c00200001040300800000000000050000418a00034000000400000081baaa07b343070391ac0e561d0b907bd044d61a29e98c0c34af444d0008d5e26d2ca957fa6f9bab5b434e508191dd0a29c5c1e36b7eab78f29c940abd2227fd6d9a4f2bc51716d9a16321b953ab01acf5542db04e898db3d0e998f6d3bf37e0542906b6dd42f1ba061bf2907b741d2f616607fa6fc692702b5c2a79e337c6caff2c312d61bb64e00c8a1b648202642609cf1b9d23c75bcaed410f187eeb59f52b77f3dd4d187ffdc42c4867625db9ed5f06949bcf06e5a9d86643337e8c6bd87fdf342fd8380ad194cc9bf4d5dab9e8497edee7a680d5ae6426a35bfacf611635959011e1fc1af050a3cf9030c080efeab5c2691d7250744c2ce85e7ce1"], 0x1c}, 0x300}, 0x0) r2 = syz_io_uring_complete(0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @multicast2}, &(0x7f0000000440)=0xc) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000500)={&(0x7f0000000100), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008000}, 0x4008041) [ 2431.493133][T30468] loop2: detected capacity change from 0 to 65536 [ 2431.600952][T30468] loop2: detected capacity change from 0 to 65536 12:55:47 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x2}, 0x0) 12:55:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1800000001040300000700000000050000050800034040000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f8191940abd2227fd58c4fbc557df965b4015fc868905222cffce959a681afbe6f9414e68289654f8b899f01e3b306906ce0ba78dd4d8f7217e231e789110e192779b2eb242753cf454f06577b44c0e1399dc69a36b17522fcf043553eb70ffcd4a867e4ccae8fa0cd953ff1efc606eab9959a83393a2bc9aa7ce3f9a53c437e723b18cd181ab4ae435526015e34ca5"], 0x1c}, 0x300, 0x0, 0x0, 0x8001}, 0x0) 12:55:47 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x300000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2040000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:47 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x338000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x3}, 0x0) [ 2432.222885][T30518] loop2: detected capacity change from 0 to 66048 [ 2432.234607][T30528] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:55:47 executing program 3: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x4000080) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1c}, 0x300}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c302fd5ceb516d2}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x88, 0x0, 0x730, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x2c, 0x7, 'system_u:object_r:load_policy_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wlan0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'gretap0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @broadcast}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 2432.298858][T30518] loop2: detected capacity change from 0 to 66048 12:55:47 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:47 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4}, 0x0) 12:55:47 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYRES16=r1], 0x1c}, 0x300}, 0x0) [ 2432.437980][T30565] loop2: detected capacity change from 0 to 98304 [ 2432.497107][T30565] loop2: detected capacity change from 0 to 98304 12:55:48 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000400), 0x0, &(0x7f0000000480)) 12:55:48 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x400000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x5}, 0x0) 12:55:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:48 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6}, 0x0) [ 2433.187212][T30611] loop2: detected capacity change from 0 to 131072 12:55:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2433.247560][T30611] loop2: detected capacity change from 0 to 131072 12:55:48 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x500000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_TID={0xc, 0x3, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x40001) 12:55:48 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7}, 0x0) [ 2433.407825][T30647] loop2: detected capacity change from 0 to 163840 12:55:48 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:48 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e10ea736a0e0000907bd044d61a29e98c0c34af446d2ca957fa6f03005b434e508191940abd2227ff40545b802b72a8f5"], 0x1c}, 0x300}, 0x0) [ 2433.607465][T30673] loop2: detected capacity change from 0 to 196608 [ 2433.634921][T30679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 12:55:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x2, &(0x7f0000000480)) 12:55:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x600000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x8}, 0x0) 12:55:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6040000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:49 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:49 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x9}, 0x0) [ 2434.134829][T30698] ISOFS: Unable to identify CD-ROM format. [ 2434.149911][T30702] loop3: detected capacity change from 0 to 32768 12:55:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x700000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2434.184440][T30711] loop2: detected capacity change from 0 to 197120 12:55:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xa}, 0x0) [ 2434.239251][T30698] ISOFS: Unable to identify CD-ROM format. 12:55:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:49 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x3, &(0x7f0000000480)) [ 2434.306893][T30711] loop2: detected capacity change from 0 to 197120 12:55:49 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xb}, 0x0) 12:55:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:49 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xc}, 0x0) [ 2434.444356][T30768] ISOFS: Unable to identify CD-ROM format. [ 2434.468213][T30784] loop2: detected capacity change from 0 to 229376 [ 2434.529697][T30768] ISOFS: Unable to identify CD-ROM format. [ 2434.557382][T30784] loop2: detected capacity change from 0 to 229376 12:55:50 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:50 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:50 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x900000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd}, 0x0) 12:55:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x4, &(0x7f0000000480)) 12:55:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xe}, 0x0) [ 2434.992201][T30831] loop2: detected capacity change from 0 to 262144 12:55:50 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xa00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:50 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x10}, 0x0) [ 2435.048120][T30831] loop2: detected capacity change from 0 to 262144 [ 2435.073179][T30842] ISOFS: Unable to identify CD-ROM format. 12:55:50 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xb00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2435.184610][T30842] ISOFS: Unable to identify CD-ROM format. [ 2435.191355][T30881] loop2: detected capacity change from 0 to 264192 [ 2435.247549][T30881] loop2: detected capacity change from 0 to 264192 12:55:51 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x11}, 0x0) 12:55:51 executing program 3: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x5, &(0x7f0000000480)) 12:55:51 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xc00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:51 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:51 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x12}, 0x0) [ 2435.928555][T30911] ISOFS: Unable to identify CD-ROM format. [ 2435.947337][T30916] loop2: detected capacity change from 0 to 264192 12:55:51 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xd00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:51 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) [ 2435.988994][T30911] ISOFS: Unable to identify CD-ROM format. 12:55:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x48}, 0x0) 12:55:51 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x6, &(0x7f0000000480)) [ 2436.046038][T30916] loop2: detected capacity change from 0 to 264192 [ 2436.157714][T30964] ISOFS: Unable to identify CD-ROM format. 12:55:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:52 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x10}}, 0x0) 12:55:52 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xe00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4c}, 0x0) 12:55:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x7, &(0x7f0000000480)) 12:55:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x68}, 0x0) 12:55:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:55:52 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2436.864074][T30991] ISOFS: Unable to identify CD-ROM format. [ 2436.870929][T30993] loop2: detected capacity change from 0 to 264192 12:55:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6c}, 0x0) 12:55:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:55:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x74}, 0x0) [ 2436.929372][T30993] loop2: detected capacity change from 0 to 264192 [ 2436.958910][T30991] ISOFS: Unable to identify CD-ROM format. 12:55:52 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:52 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:52 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1100000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:52 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, 0x0, 0x0) 12:55:52 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x8, &(0x7f0000000480)) 12:55:52 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7a}, 0x0) 12:55:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x300}, 0x0) [ 2437.738109][T31089] ISOFS: Unable to identify CD-ROM format. [ 2437.749626][T31098] loop2: detected capacity change from 0 to 264192 12:55:53 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x1200000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2437.808448][T31089] ISOFS: Unable to identify CD-ROM format. 12:55:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x30d}, 0x0) [ 2437.947311][T31154] loop2: detected capacity change from 0 to 264192 [ 2437.998595][T31154] loop2: detected capacity change from 0 to 264192 12:55:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:53 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x9, &(0x7f0000000480)) 12:55:53 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 12:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x500}, 0x0) 12:55:53 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x10}}, 0x0) [ 2438.614119][T31187] loop2: detected capacity change from 0 to 264192 12:55:53 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x600}, 0x0) 12:55:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x10}}, 0x0) 12:55:54 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x2500000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2438.701173][T31196] ISOFS: Unable to identify CD-ROM format. [ 2438.712753][T31187] loop2: detected capacity change from 0 to 264192 12:55:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x700}, 0x0) [ 2438.791559][T31196] ISOFS: Unable to identify CD-ROM format. [ 2438.824183][T31247] loop2: detected capacity change from 0 to 264192 [ 2438.885402][T31247] loop2: detected capacity change from 0 to 264192 12:55:54 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x10}}, 0x0) 12:55:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xa, &(0x7f0000000480)) 12:55:54 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x900}, 0x0) 12:55:54 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:54 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xb, &(0x7f0000000480)) [ 2439.522547][T31283] ISOFS: Unable to identify CD-ROM format. 12:55:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x10}}, 0x0) 12:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xa00}, 0x0) [ 2439.571088][T31298] loop2: detected capacity change from 0 to 264192 12:55:54 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x4c00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:54 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xb00}, 0x0) 12:55:54 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x10}}, 0x0) [ 2439.656661][T31298] loop2: detected capacity change from 0 to 264192 [ 2439.684805][T31311] ISOFS: Unable to identify CD-ROM format. [ 2439.768330][T31311] ISOFS: Unable to identify CD-ROM format. 12:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xc00}, 0x0) 12:55:55 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x11000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[], 0x10}}, 0x0) 12:55:55 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xc, &(0x7f0000000480)) 12:55:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x10}}, 0x0) 12:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd00}, 0x0) [ 2440.448633][T31381] ISOFS: Unable to identify CD-ROM format. [ 2440.455829][T31387] loop2: detected capacity change from 0 to 264192 12:55:55 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x12000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:55 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6800000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:55 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x10}}, 0x0) [ 2440.537402][T31381] ISOFS: Unable to identify CD-ROM format. 12:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd03}, 0x0) 12:55:55 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xd, &(0x7f0000000480)) [ 2440.582724][T31431] loop2: detected capacity change from 0 to 264192 [ 2440.641471][T31431] loop2: detected capacity change from 0 to 264192 [ 2440.695978][T31461] ISOFS: Unable to identify CD-ROM format. [ 2440.753121][T31461] ISOFS: Unable to identify CD-ROM format. 12:55:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:56 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x6c00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB], 0x10}}, 0x0) 12:55:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x13000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xe00}, 0x0) 12:55:56 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xe, &(0x7f0000000480)) 12:55:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x10}}, 0x0) [ 2441.335080][T31500] loop2: detected capacity change from 0 to 264192 12:55:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1100}, 0x0) 12:55:56 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x721e000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x10}}, 0x0) [ 2441.399372][T31511] ISOFS: Unable to identify CD-ROM format. [ 2441.435615][T31500] loop2: detected capacity change from 0 to 264192 12:55:56 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x14000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="100000"], 0x10}}, 0x0) [ 2441.512804][T31511] ISOFS: Unable to identify CD-ROM format. [ 2441.523416][T31560] loop2: detected capacity change from 0 to 264192 [ 2441.607685][T31560] loop2: detected capacity change from 0 to 264192 12:55:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1200}, 0x0) 12:55:57 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xf, &(0x7f0000000480)) 12:55:57 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7400000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x10}}, 0x0) 12:55:57 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x15000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x10}}, 0x0) 12:55:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4800}, 0x0) 12:55:57 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x7a00000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2442.318749][T31611] loop2: detected capacity change from 0 to 264192 [ 2442.318905][T31592] ISOFS: Unable to identify CD-ROM format. 12:55:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="10000000"], 0x10}}, 0x0) 12:55:57 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4c00}, 0x0) [ 2442.400567][T31611] loop2: detected capacity change from 0 to 264192 12:55:57 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x13000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2442.460989][T31592] ISOFS: Unable to identify CD-ROM format. [ 2442.544581][T31676] loop3: detected capacity change from 0 to 264192 12:55:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x16000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:58 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x8000000000000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x10, &(0x7f0000000480)) 12:55:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6800}, 0x0) 12:55:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) r3 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r3, 0x0) r5 = syz_io_uring_complete(r4) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) getpeername$inet(r5, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x8080}, 0x0) 12:55:58 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6c00}, 0x0) [ 2443.207535][T31706] loop2: detected capacity change from 0 to 264192 12:55:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x17000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2443.264029][T31707] ISOFS: Unable to identify CD-ROM format. 12:55:58 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xefffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:58 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7400}, 0x0) [ 2443.347337][T31707] ISOFS: Unable to identify CD-ROM format. 12:55:58 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x11, &(0x7f0000000480)) [ 2443.406278][T31751] loop2: detected capacity change from 0 to 264192 [ 2443.495290][T31751] loop2: detected capacity change from 0 to 264192 [ 2443.514784][T31779] ISOFS: Unable to identify CD-ROM format. [ 2443.581919][T31779] ISOFS: Unable to identify CD-ROM format. 12:55:59 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:55:59 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:55:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7a00}, 0x0) 12:55:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x12, &(0x7f0000000480)) 12:55:59 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) r3 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r3, 0x0) r5 = syz_io_uring_complete(r4) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) getpeername$inet(r5, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x8080}, 0x0) 12:55:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x20000}, 0x0) 12:55:59 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2444.129646][T31831] ISOFS: Unable to identify CD-ROM format. [ 2444.135714][T31822] loop2: detected capacity change from 0 to 264192 12:55:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x34000}, 0x0) [ 2444.200072][T31822] loop2: detected capacity change from 0 to 264192 12:55:59 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x20100000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:55:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x400300}, 0x0) [ 2444.290260][T31831] ISOFS: Unable to identify CD-ROM format. 12:55:59 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2444.343801][T31891] loop2: detected capacity change from 0 to 264192 [ 2444.405608][T31891] loop2: detected capacity change from 0 to 264192 12:56:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1000000}, 0x0) 12:56:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x13, &(0x7f0000000480)) 12:56:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x22000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:00 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:00 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) r3 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r2}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r3, 0x0) r5 = syz_io_uring_complete(r4) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) getpeername$inet(r5, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$NS_GET_USERNS(r5, 0xb701, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000000)=ANY=[], 0x1c}, 0x300, 0x0, 0x0, 0x8080}, 0x0) 12:56:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x2000000}, 0x0) [ 2445.016100][T31936] loop2: detected capacity change from 0 to 264192 [ 2445.017570][T31931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2445.025172][T31932] ISOFS: Unable to identify CD-ROM format. [ 2445.050834][T31931] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:00 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x25000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x3000000}, 0x0) [ 2445.084197][T31936] loop2: detected capacity change from 0 to 264192 [ 2445.111830][T31932] ISOFS: Unable to identify CD-ROM format. 12:56:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x14, &(0x7f0000000480)) 12:56:00 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4000000}, 0x0) [ 2445.204725][T31989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2445.223444][T31988] loop2: detected capacity change from 0 to 264192 [ 2445.226810][T31989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2445.286532][T31999] ISOFS: Unable to identify CD-ROM format. 12:56:01 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x5000000}, 0x0) 12:56:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:01 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x3}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x15, &(0x7f0000000480)) 12:56:01 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) r4 = syz_io_uring_complete(r3) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r4, 0x3309) getpeername$inet(r4, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$NS_GET_USERNS(r4, 0xb701, 0x0) 12:56:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6000000}, 0x0) [ 2445.901074][T32028] ISOFS: Unable to identify CD-ROM format. [ 2445.912960][T32034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2445.919055][T32029] loop2: detected capacity change from 0 to 264192 12:56:01 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2445.962176][T32034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:01 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7000000}, 0x0) 12:56:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x8000000}, 0x0) [ 2446.058856][T32028] ISOFS: Unable to identify CD-ROM format. [ 2446.085917][T32069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x16, &(0x7f0000000480)) [ 2446.142179][T32069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2446.158957][T32082] loop2: detected capacity change from 0 to 264192 [ 2446.209072][T32082] loop2: detected capacity change from 0 to 264192 [ 2446.232115][T32105] ISOFS: Unable to identify CD-ROM format. [ 2446.273993][T32105] ISOFS: Unable to identify CD-ROM format. 12:56:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x9000000}, 0x0) 12:56:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000800, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x17, &(0x7f0000000480)) 12:56:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) r4 = syz_io_uring_complete(r3) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r4, 0x3309) getpeername$inet(r4, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) 12:56:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xa000000}, 0x0) [ 2446.786229][T32140] ISOFS: Unable to identify CD-ROM format. [ 2446.787562][T32131] loop2: detected capacity change from 0 to 264192 [ 2446.803055][T32139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2446.851110][T32139] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2446.889901][T32140] ISOFS: Unable to identify CD-ROM format. 12:56:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x48000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xb000000}, 0x0) 12:56:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x18, &(0x7f0000000480)) [ 2446.974531][T32184] loop2: detected capacity change from 0 to 264192 12:56:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x7}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2447.026920][T32184] loop2: detected capacity change from 0 to 264192 [ 2447.124772][T32212] ISOFS: Unable to identify CD-ROM format. [ 2447.164814][T32212] ISOFS: Unable to identify CD-ROM format. 12:56:02 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xc000000}, 0x0) 12:56:02 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:02 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x8}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:02 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x19, &(0x7f0000000480)) 12:56:02 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) r4 = syz_io_uring_complete(r3) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r4, 0x3309) [ 2447.627338][T32227] ISOFS: Unable to identify CD-ROM format. 12:56:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd000000}, 0x0) [ 2447.694174][T32227] ISOFS: Unable to identify CD-ROM format. [ 2447.711104][T32239] loop2: detected capacity change from 0 to 264192 12:56:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1a, &(0x7f0000000480)) 12:56:03 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x9}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd030000}, 0x0) 12:56:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xe000000}, 0x0) [ 2447.776653][T32239] loop2: detected capacity change from 0 to 264192 12:56:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x50030000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2447.862012][T32278] ISOFS: Unable to identify CD-ROM format. [ 2447.883769][T32294] loop2: detected capacity change from 0 to 264192 [ 2447.956079][T32278] ISOFS: Unable to identify CD-ROM format. [ 2447.963411][T32294] loop2: detected capacity change from 0 to 264192 12:56:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x10000000}, 0x0) 12:56:03 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xa}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x68000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:03 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1b, &(0x7f0000000480)) [ 2448.504316][T32319] loop2: detected capacity change from 0 to 264192 [ 2448.522791][T32320] ISOFS: Unable to identify CD-ROM format. 12:56:03 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500)=0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) syz_io_uring_complete(r3) 12:56:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x11000000}, 0x0) 12:56:03 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xb}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2448.564625][T32319] loop2: detected capacity change from 0 to 264192 12:56:03 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:03 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x12000000}, 0x0) [ 2448.641299][T32320] ISOFS: Unable to identify CD-ROM format. 12:56:03 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1c, &(0x7f0000000480)) 12:56:04 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xc}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x48000000}, 0x0) [ 2448.730535][T32367] loop2: detected capacity change from 0 to 264192 12:56:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x74000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2448.797371][T32369] ISOFS: Unable to identify CD-ROM format. [ 2448.858700][T32369] ISOFS: Unable to identify CD-ROM format. [ 2448.861929][T32454] loop2: detected capacity change from 0 to 264192 [ 2448.922473][T32454] loop2: detected capacity change from 0 to 264192 12:56:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4c000000}, 0x0) 12:56:04 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xd}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:04 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) 12:56:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1d, &(0x7f0000000480)) 12:56:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:04 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x68000000}, 0x0) 12:56:04 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xe}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:04 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2449.501398][T32485] loop2: detected capacity change from 0 to 264192 [ 2449.533571][T32492] ISOFS: Unable to identify CD-ROM format. 12:56:06 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1e, &(0x7f0000000480)) 12:56:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6c000000}, 0x0) 12:56:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x74000000}, 0x0) [ 2452.229712][T32521] ISOFS: Unable to identify CD-ROM format. [ 2452.236958][T32506] loop2: detected capacity change from 0 to 264192 12:56:07 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7a000000}, 0x0) [ 2452.293138][T32521] ISOFS: Unable to identify CD-ROM format. [ 2452.299313][T32506] loop2: detected capacity change from 0 to 264192 [ 2452.385686][T32554] __nla_validate_parse: 17 callbacks suppressed [ 2452.385697][T32554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2452.429675][T32554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2453.518308][T32568] cgroup: Unknown subsys name 'perf_event' [ 2453.524695][T32568] cgroup: Unknown subsys name 'net_cls' 12:56:10 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) 12:56:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:10 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x21, &(0x7f0000000480)) 12:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x9effffff}, 0x0) 12:56:10 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xefffffff}, 0x0) 12:56:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xf0ffffff}, 0x0) 12:56:10 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x12}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2455.546427][ T656] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2455.552016][ T655] loop2: detected capacity change from 0 to 264192 [ 2455.579711][ T656] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:10 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xac4322ec, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2455.651449][ T655] loop2: detected capacity change from 0 to 264192 12:56:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x22, &(0x7f0000000480)) 12:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xffffff7f}, 0x0) [ 2455.720902][ T695] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2455.746717][ T695] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2455.771601][ T717] loop2: detected capacity change from 0 to 264192 12:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xffffff9e}, 0x0) 12:56:11 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) 12:56:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x25}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xaf000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x23, &(0x7f0000000480)) 12:56:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xffffffef}, 0x0) 12:56:11 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2456.419411][ T747] loop2: detected capacity change from 0 to 264192 [ 2456.443013][ T758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xfffffff0}, 0x0) 12:56:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x48}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2456.479623][ T758] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:11 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x24, &(0x7f0000000480)) 12:56:11 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x2000000000000}, 0x0) [ 2456.571969][ T787] loop2: detected capacity change from 0 to 264192 [ 2456.597062][ T790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:11 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2456.617402][ T790] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2456.667547][ T787] loop2: detected capacity change from 0 to 264192 12:56:12 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, 0xffffffffffffffff, 0x0) 12:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x40030000000000}, 0x0) 12:56:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xec2243ac, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x25, &(0x7f0000000480)) 12:56:12 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x0, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x68}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x100000000000000}, 0x0) [ 2457.314214][ T848] loop2: detected capacity change from 0 to 264192 12:56:12 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:12 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x26, &(0x7f0000000480)) [ 2457.415062][ T872] __nla_validate_parse: 4 callbacks suppressed [ 2457.415076][ T872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2457.451624][ T888] loop2: detected capacity change from 0 to 264192 12:56:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x200000000000000}, 0x0) 12:56:12 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6c}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2457.464685][ T872] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2457.514029][ T888] loop2: detected capacity change from 0 to 264192 [ 2457.532115][ T907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2457.586949][ T907] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:13 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_complete(0x0) r2 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a, 0x0, r1}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r2, 0x0) 12:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x300000000000000}, 0x0) 12:56:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf9fdffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x27, &(0x7f0000000480)) 12:56:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x74}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x0, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x400000000000000}, 0x0) 12:56:13 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x7a}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2458.204626][ T933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2458.213057][ T931] loop2: detected capacity change from 0 to 264192 [ 2458.220061][ T933] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:13 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x28, &(0x7f0000000480)) 12:56:13 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x500000000000000}, 0x0) [ 2458.342605][ T960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2458.359956][ T960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2458.406682][ T985] loop2: detected capacity change from 0 to 264192 12:56:14 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x204003, 0x0) r1 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r1, 0x0) 12:56:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x600000000000000}, 0x0) 12:56:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x29, &(0x7f0000000480)) 12:56:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfeffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x0, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x700000000000000}, 0x0) 12:56:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x338}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2459.092535][ T1013] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2459.105680][ T1015] loop2: detected capacity change from 0 to 264192 [ 2459.109306][ T1013] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x800000000000000}, 0x0) 12:56:14 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2459.177292][ T1015] loop2: detected capacity change from 0 to 264192 12:56:14 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x2a, &(0x7f0000000480)) 12:56:14 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2459.321480][ T1067] loop2: detected capacity change from 0 to 264192 12:56:15 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r1, 0x0) 12:56:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x900000000000000}, 0x0) 12:56:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:15 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x48, &(0x7f0000000480)) 12:56:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xa00000000000000}, 0x0) [ 2459.979147][ T1099] loop2: detected capacity change from 0 to 264192 [ 2459.994181][ T1097] ISOFS: Unable to identify CD-ROM format. 12:56:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x700}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2460.027112][ T1099] loop2: detected capacity change from 0 to 264192 [ 2460.065017][ T1097] ISOFS: Unable to identify CD-ROM format. 12:56:15 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x900}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xb00000000000000}, 0x0) 12:56:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2460.115463][ T1140] loop2: detected capacity change from 0 to 264192 [ 2460.217047][ T1154] loop2: detected capacity change from 0 to 264192 12:56:16 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x4c, &(0x7f0000000480)) 12:56:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xc00000000000000}, 0x0) 12:56:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd00000000000000}, 0x0) [ 2460.870977][ T1183] ISOFS: Unable to identify CD-ROM format. [ 2460.879146][ T1185] loop2: detected capacity change from 0 to 264192 12:56:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xb00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:16 executing program 3: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xd03000000000000}, 0x0) [ 2460.934581][ T1183] ISOFS: Unable to identify CD-ROM format. 12:56:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x60, &(0x7f0000000480)) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xe00000000000000}, 0x0) 12:56:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:16 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1000000000000000}, 0x0) [ 2461.056342][ T1234] loop2: detected capacity change from 0 to 264192 12:56:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xd00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2461.126999][ T1234] loop2: detected capacity change from 0 to 264192 12:56:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:16 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:16 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x68, &(0x7f0000000480)) 12:56:16 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:16 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1100000000000000}, 0x0) 12:56:16 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xe00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:17 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x1200000000000000}, 0x0) 12:56:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x1100}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2461.747219][ T1302] loop2: detected capacity change from 0 to 264192 12:56:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x6c, &(0x7f0000000480)) 12:56:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4800000000000000}, 0x0) 12:56:17 executing program 3: r0 = syz_io_uring_setup(0x0, &(0x7f0000000480)={0x0, 0xda1f, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2461.874014][ T1302] loop2: detected capacity change from 0 to 264192 12:56:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x0, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:17 executing program 3: r0 = syz_io_uring_setup(0x7ecd, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:17 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x1200}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x4c00000000000000}, 0x0) 12:56:17 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffe, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:17 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x74, &(0x7f0000000480)) 12:56:17 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6800000000000000}, 0x0) 12:56:17 executing program 3: r0 = syz_io_uring_setup(0x7ecd, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2462.620596][ T1372] __nla_validate_parse: 22 callbacks suppressed [ 2462.620607][ T1372] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2462.649636][ T1380] loop2: detected capacity change from 0 to 264192 12:56:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x1e72}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:18 executing program 3: r0 = syz_io_uring_setup(0x7ecd, 0x0, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6c00000000000000}, 0x0) [ 2462.699902][ T1393] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x7a, &(0x7f0000000480)) [ 2462.762175][ T1380] loop2: detected capacity change from 0 to 264192 [ 2462.844992][ T1432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2462.888710][ T1432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x0, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:18 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7400000000000000}, 0x0) 12:56:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x2000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:18 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x92, &(0x7f0000000480)) 12:56:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x7a00000000000000}, 0x0) [ 2463.541514][ T1477] loop2: detected capacity change from 0 to 264192 [ 2463.569780][ T1479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:18 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:18 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:18 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x8000000000000000}, 0x0) 12:56:18 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x2500}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2463.586089][ T1463] ISOFS: Unable to identify CD-ROM format. [ 2463.610177][ T1479] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:18 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0x0, 0x8, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2463.683742][ T1504] loop2: detected capacity change from 0 to 264192 [ 2463.687027][ T1463] ISOFS: Unable to identify CD-ROM format. [ 2463.719795][ T1517] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2463.769624][ T1517] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x0, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:19 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x0, 0x92c, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x9effffff00000000}, 0x0) 12:56:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:19 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x93, &(0x7f0000000480)) 12:56:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x3803}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:19 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f, 0x0, 0x0, 0x5a}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2464.468352][ T1541] loop2: detected capacity change from 0 to 264192 12:56:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xefffffff00000000}, 0x0) 12:56:19 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2464.512941][ T1554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2464.529307][ T1541] loop2: detected capacity change from 0 to 264192 [ 2464.535277][ T1550] ISOFS: Unable to identify CD-ROM format. [ 2464.540591][ T1554] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:19 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:19 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:19 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xf0ffffff00000000}, 0x0) [ 2464.609137][ T1550] ISOFS: Unable to identify CD-ROM format. [ 2464.631104][ T1600] loop2: detected capacity change from 0 to 264192 12:56:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xaa, &(0x7f0000000480)) 12:56:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:20 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xffffff7f00000000}, 0x0) 12:56:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0xffffffff00000000}, 0x0) 12:56:20 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) [ 2465.382627][ T1644] loop2: detected capacity change from 0 to 264192 12:56:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:20 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:20 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x2}, 0x0) 12:56:20 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xfe, &(0x7f0000000480)) [ 2465.476584][ T1644] loop2: detected capacity change from 0 to 264192 12:56:20 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:20 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6800}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2465.611285][ T1727] loop2: detected capacity change from 0 to 264192 12:56:21 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x3}, 0x0) 12:56:21 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x204, &(0x7f0000000480)) 12:56:21 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x4}, 0x0) 12:56:21 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x721e}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2466.277922][ T1763] ISOFS: Unable to identify CD-ROM format. [ 2466.284434][ T1766] loop2: detected capacity change from 0 to 264192 12:56:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x5}, 0x0) 12:56:21 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x7400}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:21 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r0, 0x0) 12:56:21 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x6}, 0x0) [ 2466.392090][ T1763] ISOFS: Unable to identify CD-ROM format. [ 2466.400558][ T1766] loop2: detected capacity change from 0 to 264192 12:56:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x6c, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:22 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x204000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:22 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x300, &(0x7f0000000480)) 12:56:22 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x0) 12:56:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x7}, 0x0) 12:56:22 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x8}, 0x0) [ 2467.173384][ T1858] loop2: detected capacity change from 0 to 264192 [ 2467.175416][ T1864] ISOFS: Unable to identify CD-ROM format. 12:56:22 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:22 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x9}, 0x0) 12:56:22 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xa}, 0x0) [ 2467.287318][ T1858] loop2: detected capacity change from 0 to 264192 [ 2467.312655][ T1864] ISOFS: Unable to identify CD-ROM format. 12:56:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:23 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:23 executing program 3: r0 = syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xb}, 0x0) 12:56:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:23 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x355, &(0x7f0000000480)) 12:56:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xc}, 0x0) 12:56:23 executing program 3: syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) [ 2468.044829][ T1930] loop2: detected capacity change from 0 to 264192 [ 2468.057920][ T1932] __nla_validate_parse: 17 callbacks suppressed [ 2468.057933][ T1932] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2468.066234][ T1933] ISOFS: Unable to identify CD-ROM format. [ 2468.111448][ T1932] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xd}, 0x0) 12:56:23 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xe0ffff}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:23 executing program 3: syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) 12:56:23 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xe}, 0x0) [ 2468.152942][ T1930] loop2: detected capacity change from 0 to 264192 [ 2468.188410][ T1933] ISOFS: Unable to identify CD-ROM format. [ 2468.253341][ T1971] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x36c, &(0x7f0000000480)) 12:56:24 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:24 executing program 3: syz_io_uring_setup(0x7ecd, &(0x7f0000000480)={0x0, 0xda1f}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000500), &(0x7f0000000540)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, 0xffffffffffffffff, 0x0) 12:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x10}, 0x0) 12:56:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x11}, 0x0) 12:56:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2468.947142][ T2002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2468.970670][ T2002] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:24 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:24 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x36d, &(0x7f0000000480)) [ 2468.999141][ T2009] loop2: detected capacity change from 0 to 264192 12:56:24 executing program 3: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x21, &(0x7f0000000480)) 12:56:24 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x12}, 0x0) [ 2469.042507][ T2029] loop3: detected capacity change from 0 to 264192 [ 2469.062882][ T2036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2469.073129][ T2009] loop2: detected capacity change from 0 to 264192 [ 2469.144037][ T2036] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x48}, 0x0) 12:56:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r2}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6c000000}, 0x0) 12:56:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x402, &(0x7f0000000480)) 12:56:25 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x6000000}, 0x0) 12:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x4c}, 0x0) [ 2469.868470][ T2087] loop2: detected capacity change from 0 to 264192 [ 2469.877604][ T2083] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x68}, 0x0) 12:56:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x3380000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2469.922497][ T2086] ISOFS: Unable to identify CD-ROM format. [ 2469.948031][ T2087] loop2: detected capacity change from 0 to 264192 [ 2469.955583][ T2083] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x6c}, 0x0) 12:56:25 executing program 3: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x2}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2470.009378][ T2086] ISOFS: Unable to identify CD-ROM format. [ 2470.068822][ T2133] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2470.138487][ T2145] loop2: detected capacity change from 0 to 264192 [ 2470.185738][ T2145] loop2: detected capacity change from 0 to 264192 [ 2470.193898][ T1031] ================================================================== [ 2470.202316][ T1031] BUG: KCSAN: data-race in kthread_is_per_cpu / page_cache_ra_unbounded [ 2470.211517][ T1031] [ 2470.213962][ T1031] write to 0xffff888129a420ac of 4 bytes by task 2153 on cpu 0: [ 2470.221848][ T1031] page_cache_ra_unbounded+0xa8/0x410 [ 2470.227213][ T1031] force_page_cache_ra+0x246/0x280 [ 2470.233020][ T1031] page_cache_sync_ra+0xcc/0xe0 [ 2470.238085][ T1031] filemap_read+0x388/0x1230 [ 2470.243601][ T1031] generic_file_read_iter+0x75/0x2c0 [ 2470.249304][ T1031] blkdev_read_iter+0xb3/0xc0 [ 2470.254061][ T1031] vfs_read+0x565/0x5d0 [ 2470.258293][ T1031] ksys_read+0xce/0x180 [ 2470.262562][ T1031] __x64_sys_read+0x3e/0x50 [ 2470.268023][ T1031] do_syscall_64+0x4a/0x90 [ 2470.272606][ T1031] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2470.278694][ T1031] [ 2470.281442][ T1031] read to 0xffff888129a420ac of 4 bytes by task 1031 on cpu 1: [ 2470.289517][ T1031] kthread_is_per_cpu+0x2d/0x80 [ 2470.294454][ T1031] can_migrate_task+0xf/0x180 [ 2470.299456][ T1031] detach_tasks+0xab/0x380 [ 2470.304005][ T1031] load_balance+0x768/0xcc0 [ 2470.308586][ T1031] newidle_balance+0x10b/0x310 [ 2470.313458][ T1031] pick_next_task_fair+0x37/0x270 [ 2470.319075][ T1031] __schedule+0x256/0x5b0 [ 2470.323757][ T1031] schedule+0x67/0x90 [ 2470.327829][ T1031] schedule_hrtimeout_range_clock+0x115/0x1d0 [ 2470.333984][ T1031] schedule_hrtimeout_range+0x25/0x30 [ 2470.339835][ T1031] do_epoll_wait+0xe80/0xf00 [ 2470.345514][ T1031] __x64_sys_epoll_wait+0xf6/0x120 [ 2470.351083][ T1031] do_syscall_64+0x4a/0x90 [ 2470.355708][ T1031] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2470.361789][ T1031] [ 2470.364121][ T1031] Reported by Kernel Concurrency Sanitizer on: [ 2470.370586][ T1031] CPU: 1 PID: 1031 Comm: systemd-udevd Not tainted 5.12.0-syzkaller #0 [ 2470.379274][ T1031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2470.389678][ T1031] ================================================================== 12:56:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x74}, 0x0) 12:56:25 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x406, &(0x7f0000000480)) 12:56:25 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:25 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:25 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x604000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x7a}, 0x0) [ 2470.734436][ T2169] loop2: detected capacity change from 0 to 264192 12:56:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2470.780235][ T2177] loop3: detected capacity change from 0 to 264192 [ 2470.785741][ T2169] loop2: detected capacity change from 0 to 264192 [ 2470.800916][ T2170] ISOFS: Unable to identify CD-ROM format. 12:56:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x300}, 0x0) 12:56:26 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0xc8c0) 12:56:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2470.898132][ T2210] Restarting kernel threads ... done. [ 2470.921583][ T2170] ISOFS: Unable to identify CD-ROM format. [ 2470.962418][ T2216] loop2: detected capacity change from 0 to 264192 [ 2471.042017][ T2216] loop2: detected capacity change from 0 to 264192 12:56:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:26 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0xc8c0) 12:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x30d}, 0x0) 12:56:26 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:26 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x500, &(0x7f0000000480)) 12:56:26 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:26 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x500}, 0x0) 12:56:26 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) sendmsg$NFULNL_MSG_CONFIG(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fd"], 0x1c}, 0x300}, 0xc8c0) [ 2471.639935][ T2249] Restarting kernel threads ... done. [ 2471.655137][ T2253] loop2: detected capacity change from 0 to 264192 [ 2471.663057][ T2250] ISOFS: Unable to identify CD-ROM format. 12:56:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x600}, 0x0) 12:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x700}, 0x0) [ 2471.751881][ T2250] ISOFS: Unable to identify CD-ROM format. [ 2471.753311][ T2253] loop2: detected capacity change from 0 to 264192 12:56:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2471.785070][ T2286] Restarting kernel threads ... done. 12:56:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:27 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x600, &(0x7f0000000480)) 12:56:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x900}, 0x0) 12:56:27 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) 12:56:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xa00}, 0x0) [ 2472.528276][ T2323] Restarting kernel threads ... done. [ 2472.544088][ T2328] loop2: detected capacity change from 0 to 264192 12:56:27 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) 12:56:27 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2472.602284][ T2324] ISOFS: Unable to identify CD-ROM format. 12:56:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xb00}, 0x0) 12:56:27 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2472.656317][ T2328] loop2: detected capacity change from 0 to 264192 12:56:28 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) [ 2472.717778][ T2324] ISOFS: Unable to identify CD-ROM format. [ 2472.791567][ T2371] loop2: detected capacity change from 0 to 264192 12:56:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xc00}, 0x0) 12:56:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:28 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x604, &(0x7f0000000480)) 12:56:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:28 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) getpeername$inet(r8, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) 12:56:28 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r8, 0x3309) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r9, 0x3305) 12:56:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xd00}, 0x0) [ 2473.460232][ T2406] loop2: detected capacity change from 0 to 264192 [ 2473.473367][ T2410] __nla_validate_parse: 16 callbacks suppressed [ 2473.473442][ T2410] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.495525][ T2401] ISOFS: Unable to identify CD-ROM format. 12:56:28 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xd03}, 0x0) 12:56:28 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_complete(0x0) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r8, 0x3305) [ 2473.508667][ T2410] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.527926][ T2423] Restarting kernel threads ... done. [ 2473.548840][ T2406] loop2: detected capacity change from 0 to 264192 12:56:28 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:28 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2473.619115][ T2401] ISOFS: Unable to identify CD-ROM format. [ 2473.640385][ T2442] Restarting kernel threads ... done. [ 2473.692937][ T2451] loop2: detected capacity change from 0 to 264192 [ 2473.714077][ T2453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.731315][ T2453] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2473.755517][ T2451] loop2: detected capacity change from 0 to 264192 12:56:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x700, &(0x7f0000000480)) 12:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xe00}, 0x0) 12:56:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xd000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:29 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r8, 0x3305) 12:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x1100}, 0x0) [ 2474.330296][ T2479] Restarting kernel threads ... [ 2474.330387][ T2485] loop2: detected capacity change from 0 to 264192 [ 2474.339050][ T2479] done. [ 2474.348658][ T2478] ISOFS: Unable to identify CD-ROM format. [ 2474.367978][ T2485] loop2: detected capacity change from 0 to 264192 12:56:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xf00000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2474.378991][ T2490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:29 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r8, 0x3305) 12:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x1200}, 0x0) [ 2474.433051][ T2490] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2474.465882][ T2478] ISOFS: Unable to identify CD-ROM format. [ 2474.484673][ T2512] loop2: detected capacity change from 0 to 264192 12:56:29 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:29 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x900, &(0x7f0000000480)) 12:56:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x4800}, 0x0) 12:56:29 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20001418}, 0xc, &(0x7f0000000bc0)={&(0x7f00000006c0)={0x4c8, 0x0, 0x200, 0x70bd2d, 0x25dfdbff, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r2}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x101}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x80}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x30}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x14f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0x4c8}, 0x1, 0x0, 0x0, 0x4000840}, 0x44) r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r8, 0x3305) [ 2474.535844][ T2537] Restarting kernel threads ... done. [ 2474.608193][ T2550] Restarting kernel threads ... done. [ 2474.630491][ T2541] loop2: detected capacity change from 0 to 264192 [ 2474.661585][ T2547] ISOFS: Unable to identify CD-ROM format. [ 2474.680522][ T2555] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2474.709278][ T2555] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2474.736407][ T2547] ISOFS: Unable to identify CD-ROM format. 12:56:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:30 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000640)={0x0, @remote, @dev}, &(0x7f0000000680)=0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x4c00}, 0x0) 12:56:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xa00, &(0x7f0000000480)) 12:56:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x6800}, 0x0) [ 2475.254133][ T2589] loop2: detected capacity change from 0 to 264192 [ 2475.267108][ T2593] Restarting kernel threads ... done. [ 2475.274437][ T2590] ISOFS: Unable to identify CD-ROM format. [ 2475.287080][ T2592] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:30 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xb00, &(0x7f0000000480)) 12:56:30 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @local, @multicast1}, &(0x7f0000000600)=0xc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) [ 2475.321974][ T2592] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2475.352145][ T2589] loop2: detected capacity change from 0 to 264192 12:56:30 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) [ 2475.368518][ T2626] Restarting kernel threads ... done. 12:56:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:30 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x11000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2475.442460][ T2627] ISOFS: Unable to identify CD-ROM format. [ 2475.470590][ T2642] Restarting kernel threads ... done. [ 2475.478087][ T2645] loop2: detected capacity change from 0 to 264192 [ 2475.530170][ T2627] ISOFS: Unable to identify CD-ROM format. 12:56:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x6c00}, 0x0) 12:56:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:31 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in, @in6=@ipv4}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x12000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:31 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xc00, &(0x7f0000000480)) 12:56:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x7400}, 0x0) 12:56:31 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x7a00}, 0x0) 12:56:31 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x4, 0xf4, 0x80, 0x3, 0x34, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x80, 0x7fff, 0xff}}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) [ 2476.142182][ T2670] Restarting kernel threads ... done. [ 2476.166105][ T2681] loop2: detected capacity change from 0 to 264192 12:56:31 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:31 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1300000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2476.222023][ T2681] loop2: detected capacity change from 0 to 264192 [ 2476.225831][ T2683] ISOFS: Unable to identify CD-ROM format. 12:56:31 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) [ 2476.287341][ T2711] Restarting kernel threads ... done. [ 2476.349062][ T2683] ISOFS: Unable to identify CD-ROM format. [ 2476.363558][ T2729] Restarting kernel threads ... done. [ 2476.397332][ T2732] loop2: detected capacity change from 0 to 264192 12:56:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x20000}, 0x0) 12:56:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x25000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:32 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x8000, 0x20, 0x93e, 0xfffffffe, {{0x19, 0x4, 0x0, 0x29, 0x64, 0x67, 0x0, 0xfd, 0x4, 0x0, @loopback, @broadcast, {[@timestamp={0x44, 0x20, 0xc7, 0x0, 0x5, [0xffff, 0x8, 0x9, 0x4, 0x8, 0x8, 0x9]}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x4, "a8ab"}, @cipso={0x86, 0x25, 0x3, [{0x0, 0xb, "4ad04a71af84f543d4"}, {0x3, 0x6, "fffe26fc"}, {0x1, 0xe, "75a10d58b7e151027546a213"}]}]}}}}}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:32 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xd00, &(0x7f0000000480)) 12:56:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1400000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x34000}, 0x0) [ 2477.050850][ T2750] Restarting kernel threads ... done. [ 2477.079240][ T2756] loop2: detected capacity change from 0 to 264192 [ 2477.091968][ T2755] ISOFS: Unable to identify CD-ROM format. 12:56:32 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x8, 0x0, 0x10, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x44}, 0x8040, 0x8, 0x6, 0x1ff}}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:32 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1500000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x400300}, 0x0) 12:56:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x1000000}, 0x0) [ 2477.171394][ T2755] ISOFS: Unable to identify CD-ROM format. [ 2477.191580][ T2780] Restarting kernel threads ... done. [ 2477.277080][ T2800] loop2: detected capacity change from 0 to 264192 [ 2477.317546][ T2800] loop2: detected capacity change from 0 to 264192 12:56:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:33 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xe00, &(0x7f0000000480)) 12:56:33 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x2000000}, 0x0) 12:56:33 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) getpeername$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @local}, &(0x7f0000000400)=0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1600000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2477.945615][ T2826] Restarting kernel threads ... done. [ 2477.973574][ T2832] loop2: detected capacity change from 0 to 264192 12:56:33 executing program 3: r0 = syz_io_uring_complete(0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r0, 0x3309) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) 12:56:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x3000000}, 0x0) [ 2477.996923][ T2827] ISOFS: Unable to identify CD-ROM format. 12:56:33 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:33 executing program 3: syz_io_uring_complete(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) [ 2478.035753][ T2851] Restarting kernel threads ... done. [ 2478.041163][ T2832] loop2: detected capacity change from 0 to 264192 12:56:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x4000000}, 0x0) 12:56:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1700000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2478.081180][ T2827] ISOFS: Unable to identify CD-ROM format. [ 2478.122239][ T2869] Restarting kernel threads ... done. [ 2478.181210][ T2885] loop2: detected capacity change from 0 to 264192 12:56:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0xf00, &(0x7f0000000480)) 12:56:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x5000000}, 0x0) 12:56:34 executing program 3: syz_io_uring_complete(0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 12:56:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x6000000}, 0x0) [ 2478.845783][ T2904] Restarting kernel threads ... done. [ 2478.865276][ T2907] loop2: detected capacity change from 0 to 264192 [ 2478.877541][ T2906] ISOFS: Unable to identify CD-ROM format. 12:56:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40), 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 12:56:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x7000000}, 0x0) 12:56:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) [ 2478.899442][ T2910] __nla_validate_parse: 14 callbacks suppressed [ 2478.899456][ T2910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2478.924491][ T2910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 12:56:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x8000000}, 0x0) 12:56:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) [ 2478.975582][ T2907] loop2: detected capacity change from 0 to 264192 [ 2478.991266][ T2946] Restarting kernel threads ... done. [ 2478.998739][ T2906] ISOFS: Unable to identify CD-ROM format. [ 2479.041061][ T2949] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2479.060843][ T2949] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2479.094083][ T2961] loop2: detected capacity change from 0 to 264192 [ 2479.165346][ T2961] loop2: detected capacity change from 0 to 264192 12:56:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x401, @broadcast}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, {0x2, 0x4e20, @empty}, 0x64, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x2, 0x8}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) r2 = getgid() getresgid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) setxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_default\x00', &(0x7f00000005c0)={{}, {0x1, 0x5}, [{0x2, 0x4, r1}, {0x2, 0x1}, {0x2, 0x2, 0xee01}, {}], {0x4, 0x4}, [{0x8, 0x0, r2}, {0x8, 0x7, 0xee01}, {0x8, 0x6, 0xee01}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x0, r3}, {}], {0x10, 0x4}, {0x20, 0x4}}, 0x74, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000180)={[], [{@obj_user={'obj_user', 0x3d, '*:*&#'}}, {@subj_user={'subj_user', 0x3d, '/,\x0f\xbe\xa25^5\xf9\xb5\x14pJ\x10u*\x17,\xed\xd6 \xab\x827\xb3\xc9\x8a\xe1\xc0\x8f\xcd\b\xf6\xfc\x8d\xe4\xa2W\xd9\xd3\x15(\xfd\b\xab[X\x13\xa9\x92_ \xbf\xde=\x96\xf3M\x98*86\xfd\xa2F'}}, {@audit}, {@context={'context', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}]}) 12:56:34 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 12:56:34 executing program 1: sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x44) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fork() sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c00000001040300000000000000050000050800034000000400000081baaa07b343070338ac0e561d0b907bd044d61a29e98c0c34af444d9cecd5e26d2ca957fa6f9bab5b434e508191940abd2227fdfe153420e5a5b8bee9b1d74584232c339e9aef95"], 0x1c}, 0x1, 0x0, 0x0, 0x721e0000}, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) getpeername$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000280)) 12:56:34 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1020, &(0x7f0000000480)) 12:56:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0x9000000}, 0x0) 12:56:34 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2200000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xa000000}, 0x0) 12:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xb000000}, 0x0) [ 2479.744879][ T2988] loop2: detected capacity change from 0 to 264192 12:56:35 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x48000, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 12:56:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1000000010"], 0x1c}, 0x1, 0x0, 0xc000000}, 0x0) [ 2479.795403][ T2998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2479.808808][ T2988] loop2: detected capacity change from 0 to 264192 12:56:35 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000001580)={[{@block={'block', 0x3d, 0x200}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}]}) 12:56:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x1100, &(0x7f0000000480)) [ 2479.855188][ T2998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2479.946341][ T3042] loop2: detected capacity change from 0 to 264192 [ 2480.008702][ T3042] loop2: detected capacity change from 0 to 264192