TL_GSTATUS(0xffffffffffffffff, 0xc0505405, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0xfe27}, &(0x7f0000000100)=0x30) 00:55:39 executing program 5: semop(0x0, &(0x7f0000000000)=[{}, {}, {}], 0x1f4) 00:55:39 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, 0x0) 00:55:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) rt_sigaction(0x2a, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000440)) [ 229.942748][ T25] audit: type=1326 audit(1622940939.250:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12249 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:55:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) write$P9_RREADLINK(r0, &(0x7f00000003c0)=ANY=[], 0x10) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:55:39 executing program 5: semop(0x0, &(0x7f0000000000)=[{}, {}, {}], 0x1f4) 00:55:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) pipe(&(0x7f0000000100)) close(0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000000218, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000002180)) clone(0x50021000, 0x0, 0x0, 0x0, 0x0) 00:55:39 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd(0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) r2 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000001180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) [ 230.034774][T12316] 9pnet: p9_fd_create_unix (12316): problem connecting socket: éq‰Y’3aK: -111 [ 230.061884][T12326] 9pnet: p9_fd_create_unix (12326): problem connecting socket: éq‰Y’3aK: -111 [ 230.100023][T12333] loop3: detected capacity change from 0 to 87 [ 230.109135][T12335] 9pnet: p9_fd_create_unix (12335): problem connecting socket: éq‰Y’3aK: -91 [ 230.140745][T12335] 9pnet: p9_fd_create_unix (12335): problem connecting socket: éq‰Y’3aK: -91 00:55:40 executing program 5: clone(0x5fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) clone(0x101efff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x8400, &(0x7f0000000380), 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000000c0)="6d527cd53870164a3a0d4b64fb0d7bebad2dce076e7768215970e33adf15173c9e665cff10727f62077ebc24a796b221a2f39fd294dc01861206b499138d02ebf3cfc3b11f0e18858568476bac483df9c4d0a61da2d2f9b7c4cb601c0141f209fc9e06d9457920a9a749a23ccd52eb91db5b189627774719cf91bd6e63a2b8a3b657c0e438ffc3e275b03ef0f384a0c1f20143b7b87f2e34729b000000805e0ad338423d4200f349c545516c46bb9f104a3816b12950faa20fab5827bc62a8d4cc12c4c8954308a933d63aa66cdb3646a37626de7361b5338c197dd3e6844dafcb4338dce0b79ee41da150eca12fbd36b4873ce8e4747b63e8830ee6c32f254d3779e13b27a15beaf488ea843600"/297, 0xffffffca) ptrace(0x4206, r0) wait4(r0, 0x0, 0x0, 0x0) tkill(r0, 0x800000009) 00:55:40 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) read(r0, &(0x7f0000000040)=""/12, 0xc) 00:55:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000940)={0x18, 0x5a, 0xa21a0ff0c61f0d83, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @uid}]}, 0x18}], 0x1}, 0x0) 00:55:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000500)={0x18, 0x69, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x80, 0x0, 0x0, @u32}]}, 0x18}], 0x1}, 0x0) 00:55:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140)="7ce943d3045f3f1c033c", 0xa}]) 00:55:40 executing program 0: pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r2, r1, 0x200, 0x0) write$binfmt_elf64(r3, 0x0, 0x40) vmsplice(r0, &(0x7f0000000700)=[{&(0x7f0000000040)="96", 0x1}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1'}, 0x4) 00:55:40 executing program 3: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x108c01, 0x0) pwritev(r0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 00:55:40 executing program 1: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000000)=0xc, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x5c97, 0x4) recvmmsg(r0, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10020, 0x0) 00:55:40 executing program 1: unshare(0x24040400) r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_pktinfo(r0, 0x107, 0x14, 0x0, 0x4) 00:55:40 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x2000001000000007) 00:55:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@mcast2, 0x0, 0x3c}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x8, {{'mcryptd(xxhash64)\x00'}}}]}, 0x138}}, 0x0) 00:55:40 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd(0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) r2 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000001180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) 00:55:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000003900)=[{{&(0x7f0000003640)=@in6={0x2, 0x4e24, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000003880)=[@timestamping={{0x14, 0x29}}], 0x18}}], 0x1, 0x0) 00:55:40 executing program 1: r0 = io_uring_setup(0x5a3c, &(0x7f0000000000)) r1 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000080)=r1, 0x1) 00:55:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000a00)={'lo\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0xf}}) 00:55:40 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6(0xa, 0x400000000803, 0x5f) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x80, &(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @mcast2}}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:55:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b00"/233, 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:55:40 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setreuid(0x0, 0xee01) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) 00:55:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x6, 0xfffffffffffffffd, &(0x7f0000000000)) 00:55:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x2}, {0x2d}, {0x6}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 00:55:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)={0x28, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x111, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5, 0x5}]}]}, 0x28}}, 0x0) 00:55:40 executing program 2: set_mempolicy(0x3, &(0x7f0000000040)=0x4d, 0x6) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f51ab0124b50c3362201a307df03000", 0xfffff, r0) 00:55:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) get_mempolicy(0x0, &(0x7f0000000080), 0x30dc, &(0x7f0000431000/0x4000)=nil, 0x4) [ 231.055684][ T25] audit: type=1326 audit(1622940940.360:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12438 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:55:41 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd(0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) r2 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000001180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) 00:55:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) get_mempolicy(0x0, &(0x7f0000000080), 0x30dc, &(0x7f0000431000/0x4000)=nil, 0x4) 00:55:41 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x0, 0x0) mbind(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 00:55:41 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) shutdown(r0, 0x0) 00:55:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x81212, r0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) copy_file_range(r0, &(0x7f0000000000), r0, 0x0, 0x0, 0x0) [ 231.886309][ T25] audit: type=1326 audit(1622940941.190:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12438 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:55:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) get_mempolicy(0x0, &(0x7f0000000080), 0x30dc, &(0x7f0000431000/0x4000)=nil, 0x4) 00:55:43 executing program 5: gettid() 00:55:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/218, 0xda}], 0x1, 0x14a, 0x0) 00:55:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x102}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 00:55:43 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = eventfd(0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) r2 = socket$inet(0x2, 0x1, 0x0) io_setup(0x1ff, &(0x7f0000000080)=0x0) io_submit(r3, 0x1, &(0x7f0000001180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x3, r1}]) 00:55:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b00"/233, 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:55:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) get_mempolicy(0x0, &(0x7f0000000080), 0x30dc, &(0x7f0000431000/0x4000)=nil, 0x4) 00:55:43 executing program 3: open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000000), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, 0x28}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:55:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/218, 0xda}], 0x1, 0x14a, 0x0) 00:55:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) r1 = getpid() sendmsg$netlink(r0, &(0x7f0000001640)={&(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x0, &(0x7f0000001600)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 00:55:43 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x200402, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x10000000) 00:55:43 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) signalfd(r0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 00:55:43 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="100000000000000020"], 0x5c, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000140), 0x4, 0x0) 00:55:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/218, 0xda}], 0x1, 0x14a, 0x0) 00:55:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000840)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}}) 00:55:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{}, {0x0, @local}, 0xc, {0x2, 0x0, @loopback}, 'sit0\x00'}) 00:55:43 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_trace', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r0, 0x0, 0x3) 00:55:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000001280)=""/218, 0xda}], 0x1, 0x14a, 0x0) 00:55:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b00"/233, 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:55:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0x14, r1, 0x31e7}, 0x14}}, 0x0) 00:55:46 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getpeername$inet(r0, &(0x7f00000017c0)={0x2, 0x0, @local}, &(0x7f0000001800)=0x10) 00:55:46 executing program 3: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x902) 00:55:46 executing program 5: remap_file_pages(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xfffffffffffffffd, 0x0) 00:55:46 executing program 4: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000210007041dfffd946f610500020000e8fe0208020001080008000600fd7f0000", 0x24}], 0x1}, 0x0) 00:55:46 executing program 1: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:46 executing program 2: mkdir(&(0x7f0000003a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000003c40)='./file0\x00', &(0x7f0000003c80)='devpts\x00', 0x0, &(0x7f0000003cc0)='gid=0\x00nore') 00:55:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)={0x88, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x3a, 0xe, {@wo_ht={{}, {}, @device_a, @broadcast, @from_mac}, 0x0, @random, 0x0, @void, @val={0x1, 0xf, [{}, {}, {}, {}, {}, {}, {}]}, @void, @void, @void, @void, @void, @void, @val, @void, @void, @val={0x71, 0x7}, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_HIDDEN_SSID, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x88}}, 0x0) 00:55:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000900)={0x14, 0x0, 0xb37}, 0x14}}, 0x0) 00:55:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000640)=0x4, 0x4) sendmsg$netlink(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)={0x24, 0x12, 0x1, 0x0, 0x0, "", [@nested={0x10, 0x0, 0x0, 0x0, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}, @generic='9']}, 0x24}], 0x1}, 0x0) [ 237.141589][T12577] loop1: detected capacity change from 0 to 1 [ 237.198502][T12577] loop1: p1[EZD] p2 p3 p4 [ 237.203342][T12577] loop1: p1 start 1 is beyond EOD, truncated [ 237.209342][T12577] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 237.214505][T12592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 237.217055][T12577] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 237.227392][T12596] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 237.233496][T12577] loop1: p4 size 32768 extends beyond EOD, truncated [ 237.255132][ T1034] loop1: p1[EZD] p2 p3 p4 [ 237.262619][ T1034] loop1: p1 start 1 is beyond EOD, truncated [ 237.268888][ T1034] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 237.276805][ T1034] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 237.284308][ T1034] loop1: p4 size 32768 extends beyond EOD, truncated [ 237.344204][T12577] loop1: detected capacity change from 0 to 264192 [ 237.392977][T12577] loop1: p1[EZD] p2 p3 p4 [ 237.399445][T12577] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 237.407408][T12577] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 237.461841][ T1034] loop1: p1[EZD] p2 p3 p4 [ 237.466708][ T1034] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 237.474499][ T1034] loop1: p3 size 1912633224 extends beyond EOD, truncated 00:55:49 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b00"/233, 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:55:49 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) set_mempolicy(0x1, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x2286, &(0x7f0000000140)) 00:55:49 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f0000000400)="1e", 0x1}], 0x2) 00:55:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001100110468fe0700000000000000ff3f020000003b0a00010000000019002b000a00040014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) 00:55:49 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0xfffffffe}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') getdents64(r0, &(0x7f0000000280)=""/66, 0x42) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[], 0x208e24b) 00:55:49 executing program 1: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:49 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) [ 240.088239][T12650] loop4: detected capacity change from 0 to 264192 [ 240.115978][T12653] new mount options do not match the existing superblock, will be ignored 00:55:49 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = syz_io_uring_setup(0x2b17, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000003000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1d94, 0x0, 0x0, 0x0, 0x0) [ 240.127785][T12650] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 240.128542][T12653] new mount options do not match the existing superblock, will be ignored [ 240.147675][T12660] loop2: detected capacity change from 0 to 1 [ 240.152231][T12650] EXT4-fs error (device loop4): ext4_readdir:260: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir730861028/syzkaller.DHYJ0W/261/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 [ 240.154014][T12658] loop1: detected capacity change from 0 to 1 00:55:49 executing program 5: semget$private(0x0, 0x0, 0x73e) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000240)=0x0) gettid() shmctl$IPC_SET(0x0, 0x1, &(0x7f00000002c0)={{0x1, 0xee00, r0, r1, 0x0, 0x40}, 0x5a000000, 0x80, 0xfff, 0x100000001, 0xffffffffffffffff, 0x0, 0x100}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@private0, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x1, 0x0, 0xb7}}, 0xe8) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x8000000000001f4) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x2, &(0x7f0000000000)=0xfffff7fffffffffd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) [ 240.191010][T12650] EXT4-fs error (device loop4): __ext4_new_inode:1069: comm syz-executor.4: reserved inode found cleared - inode=1 00:55:49 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000040)) 00:55:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x28, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x111, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MAX_OFFSET={0x5}]}]}, 0x28}}, 0x0) [ 240.259657][T12660] loop2: p1[EZD] p2 p3 p4 [ 240.264251][T12658] loop1: p1[EZD] p2 p3 p4 [ 240.264566][T12660] loop2: p1 start 1 is beyond EOD, truncated [ 240.268907][T12658] loop1: p1 start 1 is beyond EOD, truncated [ 240.274677][T12660] loop2: p2 size 1073741824 extends beyond EOD, [ 240.280739][T12658] loop1: p2 size 1073741824 extends beyond EOD, [ 240.280745][T12660] truncated [ 240.280752][T12658] truncated 00:55:49 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000100)='./file1\x00') r0 = creat(&(0x7f0000000180)='./file1\x00', 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r0, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f0000000200)='./bus\x00', 0x4c102, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) [ 240.313372][T12658] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 240.333278][T12658] loop1: p4 size 32768 extends beyond EOD, truncated [ 240.343298][T12660] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 240.353097][ T1034] loop1: p1[EZD] p2 p3 p4 [ 240.354567][T12697] loop3: detected capacity change from 0 to 264192 [ 240.358464][ T1034] loop1: p1 start 1 is beyond EOD, truncated [ 240.367807][T12660] loop2: p4 size 32768 extends beyond EOD, truncated [ 240.370199][ T1034] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 240.392640][ T1034] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 240.401279][ T1034] loop1: p4 size 32768 extends beyond EOD, truncated 00:55:52 executing program 1: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:55:52 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000040)}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2", 0x3b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) exit_group(0x0) 00:55:52 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40505330, &(0x7f0000000340)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000500)) tkill(r0, 0x7) 00:55:52 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) 00:55:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x120, &(0x7f00000005c0)="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"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:55:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 243.102902][T12740] autofs4:pid:12740:autofs_fill_super: called with bogus options [ 243.123536][T12753] loop2: detected capacity change from 0 to 1 [ 243.129871][T12747] loop1: detected capacity change from 0 to 1 [ 243.164621][T12771] autofs4:pid:12771:autofs_fill_super: called with bogus options [ 243.179234][T12753] loop2: p1[EZD] p2 p3 p4 [ 243.180084][T12747] loop1: p1[EZD] p2 p3 p4 [ 243.183711][T12753] loop2: p1 start 1 is beyond EOD, truncated [ 243.192977][T12747] loop1: p1 start 1 is beyond EOD, truncated [ 243.194102][T12753] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 243.200071][T12747] loop1: p2 size 1073741824 extends beyond EOD, truncated 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:55:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) [ 243.208390][T12753] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 243.222215][T12753] loop2: p4 size 32768 extends beyond EOD, truncated [ 243.252399][T12785] autofs4:pid:12785:autofs_fill_super: called with bogus options [ 243.257204][T12747] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 243.267954][T12747] loop1: p4 size 32768 extends beyond EOD, truncated [ 243.294740][ T1034] loop1: p1[EZD] p2 p3 p4 [ 243.302788][ T1034] loop1: p1 start 1 is beyond EOD, truncated 00:55:52 executing program 1: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:55:52 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000008780)=[{{&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @multicast2}}}, @ip_retopts={{0x10}}], 0x30}}], 0x1, 0x0) [ 243.308964][ T1034] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 243.316917][ T1034] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 243.324965][ T1034] loop1: p4 size 32768 extends beyond EOD, truncated 00:55:52 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x30) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 00:55:52 executing program 2: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02015500000001000000ff0700000000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x20000, 0x0) open(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) 00:55:52 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 243.359115][T12808] autofs4:pid:12808:autofs_fill_super: called with bogus options [ 243.413232][T12820] loop1: detected capacity change from 0 to 1 [ 243.420021][T12824] autofs4:pid:12824:autofs_fill_super: called with bogus options [ 243.432374][T12825] loop2: detected capacity change from 0 to 1 [ 243.469391][ T1034] loop2: p1[EZD] p2 p3 p4 [ 243.474355][T12820] loop1: p1[EZD] p2 p3 p4 [ 243.475900][ T1034] loop2: p1 start 1 is beyond EOD, truncated [ 243.478815][T12820] loop1: p1 start 1 is beyond EOD, truncated [ 243.484886][ T1034] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 243.490855][T12820] loop1: p2 size 1073741824 extends beyond EOD, truncated [ 243.498820][ T1034] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 243.507193][T12820] loop1: p3 size 1912633224 extends beyond EOD, truncated [ 243.514127][ T1034] loop2: p4 size 32768 extends beyond EOD, truncated [ 243.519897][T12820] loop1: p4 size 32768 extends beyond EOD, truncated [ 243.534248][T12825] loop2: p1[EZD] p2 p3 p4 [ 243.538708][T12825] loop2: p1 start 1 is beyond EOD, truncated [ 243.544723][T12825] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 243.554986][T12825] loop2: p3 size 1912633224 extends beyond EOD, truncated [ 243.562596][T12825] loop2: p4 size 32768 extends beyond EOD, truncated 00:55:55 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x841, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xa021, 0x0) 00:55:55 executing program 0: io_setup(0x48, &(0x7f0000000000)=0x0) io_destroy(r0) io_setup(0x1, &(0x7f0000000040)) io_destroy(r0) 00:55:55 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80300380, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0xd42a, 0x17) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:55:55 executing program 3: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='.\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d0020002000200020002000200020002000200020002000000000000000005002000000000250252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c1001000000000000000001120000000022001601", 0xa0, 0x8800}, {&(0x7f0000014600)="2200160100000000011600080000000008007809140b2a", 0x17, 0x8b003}], 0x0, &(0x7f0000000140)={[{@mode}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) 00:55:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000480)=[{}], 0x1, 0x0, 0x0, 0x0) 00:55:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ff0853ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents(r0, 0x0, 0x0) getdents64(r0, &(0x7f0000000540)=""/103, 0x67) 00:55:55 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40103d0b, &(0x7f0000000080)={{0x0, 0x10}}) [ 246.155566][T12876] autofs4:pid:12876:autofs_fill_super: called with bogus options [ 246.172254][T12880] loop2: detected capacity change from 0 to 4096 00:55:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 00:55:55 executing program 4: prlimit64(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x24, 0x0, "12476376be060067e0377d6c3fa955825a423c0db20733230d8500000000ca6d00000000000000272f00264022118624203d00"}, 0xd8) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x1) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x5, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) write(r0, &(0x7f0000000240)="fc", 0xe10) [ 246.198341][T12880] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 246.211636][T12880] EXT4-fs error (device loop2): ext4_readdir:260: inode #2: block 17: comm syz-executor.2: path /root/syzkaller-testdir240656572/syzkaller.C3tSSJ/263/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 [ 246.238772][T12887] loop3: detected capacity change from 0 to 2224 00:55:55 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') preadv(r0, &(0x7f0000002540)=[{&(0x7f0000000140)=""/211, 0xd3}], 0x1, 0x8, 0x0) 00:55:55 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, r3) rt_tgsigqueueinfo(r1, r0, 0x13, &(0x7f0000000640)) ptrace(0x4206, r0) 00:55:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) 00:55:55 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x18, &(0x7f0000000140)={0x0, {{0x2, 0x0, @dev}}}, 0x88) 00:55:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000180)='+\x8b\x8a\x16^\x84\xa7\x85\x0e\xe5W\f\x00\x00\x00\x00\x00\x00\x00\x00\xe5\xd4\xc4\xd9\x17\xf6\x95\xf2\xc2\x88L\xa4\xb0y\xd8fu\xa5\x1d~\xb6V\xeb\xfd\x89o\xbf\x85\xa0\xaf\x17]\x12\x89\x01\x8fP\x1e\xa0|Zp\xfa', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) dup3(r1, r2, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) dup2(r3, r0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:55:55 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0xb, 0x0, 0xc04a01) 00:55:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) shutdown(r0, 0x0) 00:55:55 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x139}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:55:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x7f) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet6(r0, &(0x7f0000000040)='F', 0xfffffffffffffea0, 0x20000002, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) dup2(r0, r1) 00:55:55 executing program 0: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r2, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f00000003c0)={r2, 0x3, 0x6, @broadcast}, 0x10) 00:55:55 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0x0, 0xaad57c81b7a27570, &(0x7f0000000100)={0x2, 0x10004e23, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 246.438745][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 246.461356][T12951] device lo entered promiscuous mode [ 246.476008][T12945] device lo left promiscuous mode [ 246.494385][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 246.505846][T12956] device lo entered promiscuous mode [ 246.514337][T12945] device lo left promiscuous mode 00:55:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) 00:55:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, 0x0) 00:55:56 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x10000005d2f, 0x4) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000500), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private}]}, 0x2c}}, 0x0) 00:55:56 executing program 5: open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) set_mempolicy(0x1, &(0x7f00000001c0)=0x1, 0x83) acct(&(0x7f0000000280)='./bus\x00') 00:55:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0xb1}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000001e00), 0x3fffffffffffe36, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:55:56 executing program 3: rseq(&(0x7f0000000100), 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) prctl$PR_SET_SECCOMP(0x35, 0x1, 0x0) 00:55:56 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x0, "372338012742b61af274dfb26bf5fa03132e919f907a03368d5151edbf2be004eb08a5d9ee1cd9e531365c0690f86d76512e2091360698cfebeabe0d145614ee"}, 0x48, 0xfffffffffffffffb) keyctl$search(0x15, r0, 0x0, 0x0, 0x0) 00:55:56 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 247.222277][T12980] Process accounting resumed 00:55:56 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) futex(0x0, 0x85, 0x0, 0x0, &(0x7f0000000000), 0x9000000) [ 247.264240][T12980] Process accounting resumed [ 247.284220][ T25] audit: type=1326 audit(1622940956.591:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:56 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\t&-\x96') 00:55:56 executing program 5: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) tkill(r0, 0x1000000000016) [ 247.322159][ T25] audit: type=1326 audit(1622940956.621:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x140}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:55:56 executing program 3: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="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", 0x1a0, 0xb800}, {&(0x7f0000010d00)="6600180000000000001800080000000008007809140b2a3a080200000100000101005252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08006600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0800860021000000000000211a0400000000041a7809140b2a3a08000000010000010846494c45302e3b31", 0xf5, 0xc000}], 0x0, &(0x7f0000011700)) openat(r0, &(0x7f0000001780)='./file0/file0\x00', 0x0, 0x0) 00:55:56 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) 00:55:56 executing program 0: mkdir(&(0x7f0000000300)='./bus\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000000)={{}, {}, [], {0x4, 0x1}, [], {0x10, 0x3}}, 0x24, 0x0) lchown(&(0x7f0000000340)='./bus\x00', r3, 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) [ 247.377262][ T25] audit: type=1326 audit(1622940956.621:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="b007d9d506a53ddee01a29f93a871f6ae2570cee6952280f0b7271a055c402aa87b45235285b12ee533398e52dc42b4def4fe0cd698e7fa8d2f9273546ccbb8d873cbf55d8a6050a9327fe0679f6072306fac15f7fdea01c3ac048b99d1199fcf0c6650d3810110a6b938713ad3257d708e9df7aa082eee5df8b94d01008df838f592c052bb98671d994b0e9447a8057590b264c6cc95b819c", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:55:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x0, 0x3, &(0x7f00000025c0)=[{0x0}, {0x0}, {&(0x7f00000012c0)="0428cf7c434bb69f3f46b1cfd41b2f5b212d3963d536591a7782c7061d20265c62cc5efe75b56530ec6c591e72f6c1f2152b3e77423c98136fbd1b7ec9ed7bfec30c396467af42922d602b9ff3b95f9f323abd130e2712ad45a7c91724f5608cf8b5799b46eef8325823eb8658e7e41c25d3843035de4d2dca595c77ab850efa03fefcd8265f81af7c751f574258563aa9c35aed61d05e396c9b7ec20272a7c3c669668358884e05bd349e7c33c562f10075f63720430894b9d66af4b853fd09bbb935d732901040cfa023", 0xcb, 0x6}], 0x0, &(0x7f00000026c0)={[], [{@fsmagic}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@dont_measure}]}) connect(0xffffffffffffffff, &(0x7f00000051c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x3, 0x0, "fa1b995fc7e02f6d8ea44434f875f624dabd63e0c620e4594e94525094bc127be9e4a4ed2fa031ca2a4c784d98d44665e38a97e2593128376ac8bec2da7e41"}, 0x80) socket$inet(0x2, 0x2, 0x6) open(&(0x7f0000005300)='./file0\x00', 0x0, 0x0) 00:55:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000400)={0xa, 0x0, 0x0, @remote}, 0x1c) 00:55:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:55:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) fcntl$lock(r0, 0x26, &(0x7f0000000100)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x40001}) [ 247.459375][T13026] loop3: detected capacity change from 0 to 192 [ 247.482746][ T25] audit: type=1326 audit(1622940956.621:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:56 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') [ 247.554020][ T25] audit: type=1326 audit(1622940956.621:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=334 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 247.591663][ T25] audit: type=1326 audit(1622940956.621:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:56 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 247.641231][ T25] audit: type=1326 audit(1622940956.621:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 247.667850][ T25] audit: type=1326 audit(1622940956.621:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 247.693332][ T25] audit: type=1326 audit(1622940956.621:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 247.760729][ T25] audit: type=1326 audit(1622940956.621:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=12982 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:55:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) fcntl$setownex(r0, 0xf, &(0x7f0000000080)) readv(r0, 0x0, 0x0) 00:55:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x0, 0x3, &(0x7f00000025c0)=[{0x0}, {0x0}, {&(0x7f00000012c0)="0428cf7c434bb69f3f46b1cfd41b2f5b212d3963d536591a7782c7061d20265c62cc5efe75b56530ec6c591e72f6c1f2152b3e77423c98136fbd1b7ec9ed7bfec30c396467af42922d602b9ff3b95f9f323abd130e2712ad45a7c91724f5608cf8b5799b46eef8325823eb8658e7e41c25d3843035de4d2dca595c77ab850efa03fefcd8265f81af7c751f574258563aa9c35aed61d05e396c9b7ec20272a7c3c669668358884e05bd349e7c33c562f10075f63720430894b9d66af4b853fd09bbb935d732901040cfa023", 0xcb, 0x6}], 0x0, &(0x7f00000026c0)={[], [{@fsmagic}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@dont_measure}]}) connect(0xffffffffffffffff, &(0x7f00000051c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x3, 0x0, "fa1b995fc7e02f6d8ea44434f875f624dabd63e0c620e4594e94525094bc127be9e4a4ed2fa031ca2a4c784d98d44665e38a97e2593128376ac8bec2da7e41"}, 0x80) socket$inet(0x2, 0x2, 0x6) open(&(0x7f0000005300)='./file0\x00', 0x0, 0x0) 00:55:59 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:55:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:55:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:55:59 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 00:55:59 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:55:59 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x2}, 0x10) write(r0, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a000000000000000000000008000b0000000000", 0x24) 00:55:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x0, 0x3, &(0x7f00000025c0)=[{0x0}, {0x0}, {&(0x7f00000012c0)="0428cf7c434bb69f3f46b1cfd41b2f5b212d3963d536591a7782c7061d20265c62cc5efe75b56530ec6c591e72f6c1f2152b3e77423c98136fbd1b7ec9ed7bfec30c396467af42922d602b9ff3b95f9f323abd130e2712ad45a7c91724f5608cf8b5799b46eef8325823eb8658e7e41c25d3843035de4d2dca595c77ab850efa03fefcd8265f81af7c751f574258563aa9c35aed61d05e396c9b7ec20272a7c3c669668358884e05bd349e7c33c562f10075f63720430894b9d66af4b853fd09bbb935d732901040cfa023", 0xcb, 0x6}], 0x0, &(0x7f00000026c0)={[], [{@fsmagic}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@dont_measure}]}) connect(0xffffffffffffffff, &(0x7f00000051c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x3, 0x0, "fa1b995fc7e02f6d8ea44434f875f624dabd63e0c620e4594e94525094bc127be9e4a4ed2fa031ca2a4c784d98d44665e38a97e2593128376ac8bec2da7e41"}, 0x80) socket$inet(0x2, 0x2, 0x6) open(&(0x7f0000005300)='./file0\x00', 0x0, 0x0) 00:55:59 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c9000/0x4000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:55:59 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = memfd_create(&(0x7f0000000000)='\xff\x00l\x1e\xa0\xd7\x80\xf6\xe5\xf3\xaf\xb4%\xe6\xb6\xa5\xcd\x99\r\xeaI\xce\xd9A\xf3y\x13\x10\x86)\xa4.h\xd3Q\xb1\xa2\n\xe37\xc5\xa1imd\xd5\'\\\xef\x9f\x83\x8c\xcaGU\xaa\x87\xdbc%@\xf0bv:~o\xcf\xd2\xb8a_K\xb7I\xb5b]\f\x8b}\'\xc21\x18#a\xa3\xd3\x90\xb5W\xeb\xaap\xbcU', 0x0) lseek(r0, 0x0, 0x0) 00:55:59 executing program 3: mremap(&(0x7f0000e95000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) 00:55:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000100), 0x0, 0x0, 0x3, &(0x7f00000025c0)=[{0x0}, {0x0}, {&(0x7f00000012c0)="0428cf7c434bb69f3f46b1cfd41b2f5b212d3963d536591a7782c7061d20265c62cc5efe75b56530ec6c591e72f6c1f2152b3e77423c98136fbd1b7ec9ed7bfec30c396467af42922d602b9ff3b95f9f323abd130e2712ad45a7c91724f5608cf8b5799b46eef8325823eb8658e7e41c25d3843035de4d2dca595c77ab850efa03fefcd8265f81af7c751f574258563aa9c35aed61d05e396c9b7ec20272a7c3c669668358884e05bd349e7c33c562f10075f63720430894b9d66af4b853fd09bbb935d732901040cfa023", 0xcb, 0x6}], 0x0, &(0x7f00000026c0)={[], [{@fsmagic}, {@context={'context', 0x3d, 'staff_u'}}, {@appraise}, {@dont_measure}]}) connect(0xffffffffffffffff, &(0x7f00000051c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x3, 0x0, "fa1b995fc7e02f6d8ea44434f875f624dabd63e0c620e4594e94525094bc127be9e4a4ed2fa031ca2a4c784d98d44665e38a97e2593128376ac8bec2da7e41"}, 0x80) socket$inet(0x2, 0x2, 0x6) open(&(0x7f0000005300)='./file0\x00', 0x0, 0x0) 00:55:59 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r3) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg(r1, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000300)="f7", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)='>', 0x1}], 0x1}}], 0x2, 0x400c06c) 00:55:59 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0xb) 00:56:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:56:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x12c, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x10\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\n{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\bCR\xf6ibs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\x9ef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd7\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000007}]}, 0x12c}, 0x1, 0x1100}, 0x0) 00:56:00 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 00:56:00 executing program 5: syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000021c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 00:56:00 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000140)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}], 0x0, &(0x7f0000000080)) 00:56:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:56:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) 00:56:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:56:00 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000003240)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 251.266450][T13199] loop3: detected capacity change from 0 to 136 [ 251.275585][T13199] isofs_fill_super: root inode is not a directory. Corrupted media? 00:56:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) [ 251.316258][T13199] loop3: detected capacity change from 0 to 136 [ 251.330298][T13199] isofs_fill_super: root inode is not a directory. Corrupted media? 00:56:00 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000003240)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:56:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000080)={0x3, {0x2, 0x0, 0x0, 0x400}}) 00:56:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000180)='.dead\x00', 0x0, 0x0, 0x0, 0x0) 00:56:00 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x5, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) 00:56:01 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 00:56:01 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000003240)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:56:01 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x32d400, 0x0) dup2(r1, r0) fcntl$setflags(r0, 0x2, 0x0) 00:56:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000480)="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", 0xff) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="4e7940063ac2cfdf38ab3d0f4bfec2662e90dc", 0x13}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r4, 0x5, 0x5, &(0x7f00000027c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 00:56:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ppoll(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="b8000000130001000000000000000000ff010000000000000000000000000001fe80000000000000000000000000000000000000000000000200200000000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="0000004dca23550000000000000000000000000000000000000000000000000000fbae00000000000000000000000000351e2aa0b16a1e0000000000000000000000000000004000"/106], 0xb8}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) symlink(&(0x7f00000001c0)='./file0/file1\x00', &(0x7f0000000200)='./file0/file0\x00') write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) rename(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') rename(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0/file1\x00', 0x0) 00:56:01 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000080)='m$\x00\xdc\xb7\xb8\xd0>,\xb0\x13\x8b3z>K\x84\x05\x00\x00\x00\x9c\x81\xed\xc2\x00', 0x6e93ebbbcc0884ee, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000003240)=[{&(0x7f0000000180)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 00:56:01 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x32d400, 0x0) dup2(r1, r0) fcntl$setflags(r0, 0x2, 0x0) 00:56:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2, @dev={0xac, 0x14, 0x14, 0x35}}, 0xb) 00:56:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') lseek(r0, 0x10000400006c, 0x0) 00:56:01 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x32d400, 0x0) dup2(r1, r0) fcntl$setflags(r0, 0x2, 0x0) 00:56:01 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:56:02 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x32d400, 0x0) dup2(r1, r0) fcntl$setflags(r0, 0x2, 0x0) 00:56:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') lseek(r0, 0x10000400006c, 0x0) 00:56:02 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x8) ptrace$cont(0x9, r0, 0x0, 0x0) 00:56:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000480)="60d47e7df9047a03cafafede083b6d3dc4033683c22adb4347f48629c4a9c0a016aeb3f1c3bf6e454ec8f7dea874836ec6a502000000000000ee5185e69bcc8a6f4fb3e1024847bf2e3e9995452c3ecb50235af037fd674e37344c3958332d3c91b2b6e0b5e3e33209c389d5df4fa7ab1c6512de418bd55d71b2931949398982d9f5995741cca2422f141a450b07bbda163fe94c3e4c650f5461ff4ca294aa0e15e1051f80ee2be846aacb987c119c6672b99ef2c8cd6ada5c12539aeff7f7fc375eac59be9dca0ecf4e8c8216eb68212d3f762cfd1c61d527a5762e05cda638189e89368cea99823b4a9dccd5c60a82cfac9c35014d638424ca6962252b80", 0xff) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="4e7940063ac2cfdf38ab3d0f4bfec2662e90dc", 0x13}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r4, 0x5, 0x5, &(0x7f00000027c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 00:56:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) setresuid(0x0, 0xee01, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b2f, 0x0) 00:56:03 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x5, 0x3) set_mempolicy(0x1, &(0x7f0000000040)=0x3, 0x9) r0 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r0, 0x1f00000000000000, 0xcc, &(0x7f0000000000), 0x3c) 00:56:03 executing program 3: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3}) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000100)={[0x7f]}, 0x8) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r2, &(0x7f0000000740)=""/377, 0x179) 00:56:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') lseek(r0, 0x10000400006c, 0x0) 00:56:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') lseek(r0, 0x10000400006c, 0x0) 00:56:03 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)={[{@sbsector}]}) 00:56:03 executing program 4: io_setup(0x191, &(0x7f0000000000)=0x0) io_destroy(r0) io_cancel(r0, &(0x7f0000001040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 00:56:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000180)=0x7, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) 00:56:03 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000300)={0x1, @time}) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0605345, &(0x7f00000003c0)={0x0, 0x0, 'client0\x00', 0x0, "eed006e17c7e0471", "516f97daa2bff2ceb3104dce2589865e5b5c753b7ef2b5bd5a603cad865a10d8"}) r3 = eventfd2(0x0, 0x0) dup3(r3, r2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x45, 0xda1, 0x0) tkill(r0, 0x7) 00:56:03 executing program 2: set_mempolicy(0x3, &(0x7f0000000180)=0x7, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) [ 254.023127][T13339] ISOFS: Unable to identify CD-ROM format. [ 254.074260][T13350] ISOFS: Unable to identify CD-ROM format. 00:56:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r1 = fsopen(&(0x7f0000000000)='mqueue\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) mknodat(r2, &(0x7f00000000c0)='./file\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x0, 0xee01, 0x1000000) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file\x00', &(0x7f0000000180)={0x20000}, 0x18) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f00000001c0)={0x2, 0x7b, "b8411e8610dc66388a96bc31949a82039c07c8adcc681a7f70e1463fd5f51fba4146230c7ae53c7ea4d6548552824abeecc8d5f36cd8fe101209da2bc7dc7da40b77c5550f27300b0cff709b5a71fc2cba3848cea18be8dc419d790a8c97cc98b77b2ba241d1ab9bf0cfa860f054378380033925dc665ea7e64b0e"}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000002c0)=""/4096) syz_mount_image$tmpfs(0x0, &(0x7f0000003b80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2811400, 0x0) syz_mount_image$ext4(&(0x7f0000000240)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x30100a4, &(0x7f0000000280)={[{@journal_ioprio}, {@journal_checksum}]}) 00:56:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000180)=0x7, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) 00:56:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg$sock(r0, &(0x7f0000001800)=[{{&(0x7f0000000400)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "9524abc7e1bff2ce72939a79a6d05fc728d4b167438e620a6c3cbf29fd5801b2cde85fcf46e0d1a5e1fb8892f2c00516565e6976cface5a0f4f14983f3cf55"}, 0x80, 0x0, 0x0, &(0x7f0000000080)=[@txtime={{0xfffffeb9}}, @timestamping], 0x18}}], 0x1, 0x0) 00:56:05 executing program 1: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x8) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800, 0x0, 0x2000000000903, 0x1}, 0x20) 00:56:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000000101140000000000000000020000002400018014000180080001000000000008000200000000000c0002800500010000000000240002801400018008000100ac14140008000200ac1e00010c00028005000100000000000800074000000004"], 0x80}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x4c}}, 0x0) 00:56:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000480)="60d47e7df9047a03cafafede083b6d3dc4033683c22adb4347f48629c4a9c0a016aeb3f1c3bf6e454ec8f7dea874836ec6a502000000000000ee5185e69bcc8a6f4fb3e1024847bf2e3e9995452c3ecb50235af037fd674e37344c3958332d3c91b2b6e0b5e3e33209c389d5df4fa7ab1c6512de418bd55d71b2931949398982d9f5995741cca2422f141a450b07bbda163fe94c3e4c650f5461ff4ca294aa0e15e1051f80ee2be846aacb987c119c6672b99ef2c8cd6ada5c12539aeff7f7fc375eac59be9dca0ecf4e8c8216eb68212d3f762cfd1c61d527a5762e05cda638189e89368cea99823b4a9dccd5c60a82cfac9c35014d638424ca6962252b80", 0xff) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="4e7940063ac2cfdf38ab3d0f4bfec2662e90dc", 0x13}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r4, 0x5, 0x5, &(0x7f00000027c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 00:56:05 executing program 2: set_mempolicy(0x3, &(0x7f0000000180)=0x7, 0x6) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) 00:56:05 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='[\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x90\x93\x12l\xb6Z\x95\xab\x00{\xe9\xc2Y\x01\x00\x81\x9eG\xf9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x8a\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\x95\xd2q#\xc6\xca\x97!*\x886Ka\x13\xf9\x0f\xb1{\xa6@\xf1\xcd\xd7\xdf< K\\\xb7\xa0\xfbf', 0x1) write$binfmt_script(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0002"], 0xc) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 00:56:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) [ 256.022020][T13384] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 256.044137][T13384] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 00:56:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000000)={'netpci0\x00', @ifru_map}) 00:56:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000000101140000000000000000020000002400018014000180080001000000000008000200000000000c0002800500010000000000240002801400018008000100ac14140008000200ac1e00010c00028005000100000000000800074000000004"], 0x80}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x4c}}, 0x0) 00:56:05 executing program 1: clone3(&(0x7f0000001340)={0x8002080, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000001300)=[0xffffffffffffffff], 0x1}, 0x58) [ 256.082718][T13383] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 256.111164][T13383] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,journal_checksum,,errors=continue. Quota mode: none. 00:56:05 executing program 0: syz_genetlink_get_family_id$wireguard(&(0x7f0000000dc0), 0xffffffffffffffff) 00:56:05 executing program 4: r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0xff8a) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x34, r0, 0x1, 0x0, 0x0, {0x12}, [@ETHTOOL_A_PAUSE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 00:56:05 executing program 2: io_setup(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4100) ftruncate(0xffffffffffffffff, 0x3) lseek(0xffffffffffffffff, 0x1200, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8400fffffffa) io_submit(0x0, 0x4, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x8, 0x8, 0xffffffffffffffff, &(0x7f0000000240)="767bc5e0b64ca16a3e00a1c4e8a99ee59e2d120b047c87a84dab5510b68044a1539031fa3ef885a649a7c5aa7725b4299fc2ede72f0b408c2c70a0fabf56fba17301b4106dcb1cb45feb5c3202ca606931ada233bb4f12c37fc86302124b6b98ebccb5117cf6eb098d71d98891fc70ea04ff4177d241c28d711580f6306eca6b08f7d314e9ed1afb9020ec9e49f6716ba2e8b3f65bfaf63a8a2c01aa02f18c5d1b42f6e863515927d87c3c3096136e634dac945559821f9a735b7f2b836f958b9b684cbd5490f557ef61fe7f05a39c79576a1f9a7999b8d86d1d081cf5881d647ff81f912c650a164168751ed1585dc38073f9f30b538c51", 0xf8, 0x2, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x9, 0xffffffffffffffff, &(0x7f0000000340)="f3b6b12f6895f421036974c0d227be0b8a4d7bda30c2880154e514524e81ff0318b8bf4b86a7ea34e39ada7d3f6e9fa6beb3f7ccf15782f8cccf59f5c4f716c145eec4e074fdc988dc8f070e0403ede1280911200b50ea6d239c534a18aa35de6aec2bb54c662d192f32338ccc0a5ad49b49272913758333b3468e458cadc8f6f860865c11e1b827c8d89b84077fe1fb88a605", 0x93, 0x0, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0x61, 0xffffffffffffffff, &(0x7f0000000400)="138d9be7f0acda03", 0x8, 0x3f}, 0x0]) perf_event_open(&(0x7f0000002580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xc008, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x1000000000000000, 0x0, 0x5, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) io_submit(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x202, 0x0) io_submit(0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000080)) io_submit(0x0, 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000580)={0x0, 0x8}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xa001071c, 0x4ca31, 0xffffffffffffffff, 0x0) 00:56:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000680)="5f0f7cc1fd7f9e4085d11b4d", 0xc}], 0x1) 00:56:05 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000000101140000000000000000020000002400018014000180080001000000000008000200000000000c0002800500010000000000240002801400018008000100ac14140008000200ac1e00010c00028005000100000000000800074000000004"], 0x80}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x4c}}, 0x0) [ 256.163252][T13383] EXT4-fs (sda1): changing journal_checksum during remount not supported; ignoring [ 256.176337][T13409] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 256.193280][T13383] EXT4-fs (sda1): re-mounted. Opts: journal_ioprio=0x0000000000000000,journal_checksum,,errors=continue. Quota mode: none. [ 256.273368][T13430] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 00:56:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x4, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000480)="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", 0xff) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)="4e7940063ac2cfdf38ab3d0f4bfec2662e90dc", 0x13}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x3, &(0x7f0000000140)=0x0) io_pgetevents(r4, 0x5, 0x5, &(0x7f00000027c0)=[{}, {}, {}, {}, {}], &(0x7f0000000040)={0x0, 0x3938700}, 0x0) 00:56:06 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) r0 = getpgrp(0x0) r1 = getpgrp(0x0) kcmp(r0, r1, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) 00:56:06 executing program 0: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x29) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) acct(&(0x7f00000001c0)='./file0\x00') fcntl$setlease(r1, 0x400, 0x0) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:56:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) exit_group(0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:56:06 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="80000000000101140000000000000000020000002400018014000180080001000000000008000200000000000c0002800500010000000000240002801400018008000100ac14140008000200ac1e00010c00028005000100000000000800074000000004"], 0x80}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x4c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_SEQ_ADJ_REPLY={0x14, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8}, @CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x4c}}, 0x0) 00:56:06 executing program 2: r0 = socket$inet(0x10, 0x80003, 0x0) set_mempolicy(0x1, 0x0, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000180003041dfffd946f6105000214010a1f0000050c1008000400080004000000", 0x24}], 0x1}, 0x0) 00:56:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) 00:56:06 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='iocharset=macinuit,utf8,nocompress,map=off,cruft,session=0x0']) 00:56:06 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x2c, 0x2, 0x2, 0x101, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @empty}}}]}]}, 0x2c}}, 0x0) [ 257.063947][T13448] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 257.068920][T13449] Process accounting resumed 00:56:06 executing program 0: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() connect(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x5, @private0}}}, 0x80) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000140)="f4fbee5dac") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="be9ff483111ec7c05a6e35766a9c5cd98ed812fee8ee677c468e2d01bb015a560342c1891c9b259ef048c5ac173518e9cd261fa6cbe6a89b00bbcac9c7a8fc13d6d5661f30c63f72be485d2065e695187bb1482dff9c9d341184640629dc64bb37212a404898297b90eb535ba521052c06a3f59c8a96155e941ed41bc723c4062d6dc6418cd0808ff3") ptrace$getregset(0x4205, r0, 0x2, &(0x7f00000005c0)={0x0}) 00:56:06 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100fffe53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000140)="040000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)=ANY=[]) 00:56:06 executing program 1: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f0000d99000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_LINK_TIMEOUT={0xf, 0xa89a1c1bd660819, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffda6}, 0x5) r3 = dup(r0) io_uring_enter(r3, 0x6708, 0x0, 0x0, 0x0, 0x0) [ 257.121121][T13449] Process accounting resumed [ 257.182152][T13477] loop4: detected capacity change from 0 to 512 [ 257.194603][T13477] EXT4-fs (loop4): failed to initialize system zone (-117) [ 257.197814][T13468] ISOFS: Unable to identify CD-ROM format. [ 257.216944][T13477] EXT4-fs (loop4): mount failed [ 257.313712][T13500] loop4: detected capacity change from 0 to 512 [ 257.327476][T13500] EXT4-fs (loop4): failed to initialize system zone (-117) [ 257.334792][T13500] EXT4-fs (loop4): mount failed 00:56:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100fffe53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000140)="040000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)=ANY=[]) 00:56:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0000070000000000fae636fc000000cc1000"}) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x1c}) 00:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000006c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000500)="f04407ee248a4094b1c545717c6e1228b631af2afa7572ae5fe604ad1ba823d20f", 0x0, 0x0, 0x0, 0x0, 0x0}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 00:56:07 executing program 1: prctl$PR_SET_MM_AUXV(0x3c, 0xc, &(0x7f0000000600)="94", 0x1) 00:56:07 executing program 3: r0 = openat$rtc(0xffffff9c, &(0x7f0000000080), 0x82802, 0x0) read(r0, &(0x7f00000000c0)=""/87, 0x57) 00:56:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x22, &(0x7f0000000000)=0x9, 0x4) 00:56:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000580)={0x1, 0x0, 0x1d, 0x4000000, 0x10001}) 00:56:07 executing program 3: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/kernel/kexec_crash_size', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r0, 0x0, 0x101) 00:56:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 00:56:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x3c, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e08af20"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 258.176347][ C0] sd 0:0:1:0: [sg0] tag#237 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.178520][T13518] loop4: detected capacity change from 0 to 512 [ 258.186744][ C0] sd 0:0:1:0: [sg0] tag#237 CDB: opcode=0xf0 (vendor) [ 258.186776][ C0] sd 0:0:1:0: [sg0] tag#237 CDB[00]: f0 44 07 ee 24 8a 40 94 b1 c5 45 71 7c 6e 12 28 [ 258.209297][ C0] sd 0:0:1:0: [sg0] tag#237 CDB[10]: b6 31 af 2a fa 75 72 ae 5f e6 04 ad 1b a8 23 d2 [ 258.218840][ C0] sd 0:0:1:0: [sg0] tag#237 CDB[20]: 0f [ 258.249502][T13518] EXT4-fs (loop4): failed to initialize system zone (-117) [ 258.266560][T13518] EXT4-fs (loop4): mount failed [ 258.269672][ C0] sd 0:0:1:0: [sg0] tag#238 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.281814][ C0] sd 0:0:1:0: [sg0] tag#238 CDB: opcode=0xf0 (vendor) [ 258.288605][ C0] sd 0:0:1:0: [sg0] tag#238 CDB[00]: f0 44 07 ee 24 8a 40 94 b1 c5 45 71 7c 6e 12 28 00:56:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=@newsa={0x184, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x32}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x4c, 0x12, {{'rfc7539(lrw(aes-generic),sm3-generic)\x00'}}}, @algo_auth={0x48, 0x1, {{'cbcmac(anubis-generic)\x00'}}}]}, 0x184}}, 0x0) 00:56:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000400)={r3, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r1, 0x107, 0x2, &(0x7f0000000040)={r3, 0x3, 0x6, @broadcast}, 0x10) [ 258.298085][ C0] sd 0:0:1:0: [sg0] tag#238 CDB[10]: b6 31 af 2a fa 75 72 ae 5f e6 04 ad 1b a8 23 d2 [ 258.307562][ C0] sd 0:0:1:0: [sg0] tag#238 CDB[20]: 0f [ 258.323602][T13535] loop1: detected capacity change from 0 to 1051 00:56:07 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100fffe53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000140)="040000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)=ANY=[]) 00:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000006c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000500)="f04407ee248a4094b1c545717c6e1228b631af2afa7572ae5fe604ad1ba823d20f", 0x0, 0x0, 0x0, 0x0, 0x0}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 00:56:07 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet6(r0, &(0x7f0000000540)={&(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000080)="8ee2", 0x9}], 0x1, &(0x7f0000000380)=[@dstopts_2292={{0x18}}], 0x18}, 0x0) [ 258.348368][T13535] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 258.382572][T13535] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated 00:56:07 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xfffff51a, 0x0, 0x0, "ce35a247b86144f36fa74e282777e1167dbf81"}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000005c0)=0x6) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, "35f2f65b7ae8c661d638d38cd9bf8ab42a6787"}) [ 258.395666][ C0] sd 0:0:1:0: [sg0] tag#244 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.402946][T13563] device lo entered promiscuous mode [ 258.405950][ C0] sd 0:0:1:0: [sg0] tag#244 CDB: opcode=0xf0 (vendor) [ 258.417978][ C0] sd 0:0:1:0: [sg0] tag#244 CDB[00]: f0 44 07 ee 24 8a 40 94 b1 c5 45 71 7c 6e 12 28 [ 258.427477][ C0] sd 0:0:1:0: [sg0] tag#244 CDB[10]: b6 31 af 2a fa 75 72 ae 5f e6 04 ad 1b a8 23 d2 [ 258.429620][T13563] device lo left promiscuous mode [ 258.436945][ C0] sd 0:0:1:0: [sg0] tag#244 CDB[20]: 0f 00:56:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000006c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000500)="f04407ee248a4094b1c545717c6e1228b631af2afa7572ae5fe604ad1ba823d20f", 0x0, 0x0, 0x0, 0x0, 0x0}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 00:56:07 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xfffff51a, 0x0, 0x0, "ce35a247b86144f36fa74e282777e1167dbf81"}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000005c0)=0x6) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, "35f2f65b7ae8c661d638d38cd9bf8ab42a6787"}) 00:56:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shutdown(r1, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c}, 0x1c}}, 0x0) close(r1) [ 258.448415][T13563] device lo entered promiscuous mode [ 258.453806][T13570] device lo left promiscuous mode [ 258.464816][T13560] loop4: detected capacity change from 0 to 512 [ 258.489236][T13535] EXT4-fs (loop1): get root inode failed [ 258.494916][T13535] EXT4-fs (loop1): mount failed [ 258.507993][T13560] EXT4-fs (loop4): failed to initialize system zone (-117) [ 258.521385][T13560] EXT4-fs (loop4): mount failed [ 258.522663][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 258.540124][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:56:07 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) write(r0, &(0x7f00000002c0)="fb", 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000080)={0xffffffc4, 0x0, 0x0, 0x0, 0x0, "b05ed32976199f526289fd1cca8d9f1de553c8"}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x5412, &(0x7f00000000c0)=0x13) [ 258.552734][ C1] sd 0:0:1:0: [sg0] tag#245 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 258.563282][ C1] sd 0:0:1:0: [sg0] tag#245 CDB: opcode=0xf0 (vendor) [ 258.570188][ C1] sd 0:0:1:0: [sg0] tag#245 CDB[00]: f0 44 07 ee 24 8a 40 94 b1 c5 45 71 7c 6e 12 28 [ 258.579787][ C1] sd 0:0:1:0: [sg0] tag#245 CDB[10]: b6 31 af 2a fa 75 72 ae 5f e6 04 ad 1b a8 23 d2 [ 258.589268][ C1] sd 0:0:1:0: [sg0] tag#245 CDB[20]: 0f [ 258.624830][T13535] loop1: detected capacity change from 0 to 1051 [ 258.638692][T13535] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 258.648532][T13535] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 258.661235][T13535] EXT4-fs (loop1): get root inode failed [ 258.667214][T13535] EXT4-fs (loop1): mount failed 00:56:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) [ 258.744382][T13609] loop1: detected capacity change from 0 to 1051 [ 258.753889][T13609] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 258.763454][T13609] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 258.775649][T13609] EXT4-fs (loop1): get root inode failed [ 258.781309][T13609] EXT4-fs (loop1): mount failed 00:56:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000006c0)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000500)="f04407ee248a4094b1c545717c6e1228b631af2afa7572ae5fe604ad1ba823d20f", 0x0, 0x0, 0x0, 0x0, 0x0}) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 00:56:10 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xfffff51a, 0x0, 0x0, "ce35a247b86144f36fa74e282777e1167dbf81"}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000005c0)=0x6) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, "35f2f65b7ae8c661d638d38cd9bf8ab42a6787"}) 00:56:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$lock(r0, 0x24, &(0x7f0000000080)={0x0, 0x1, 0x7fffffffffffffff, 0x8}) 00:56:10 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x28, {0x2, 0x0, @empty}, 'lo\x00'}) 00:56:10 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100fffe53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000140)="040000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)=ANY=[]) 00:56:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) [ 261.303673][T13626] loop1: detected capacity change from 0 to 1051 [ 261.304395][ C1] sd 0:0:1:0: [sg0] tag#246 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 261.317793][T13626] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 261.320333][ C1] sd 0:0:1:0: [sg0] tag#246 CDB: opcode=0xf0 (vendor) [ 261.336386][ C1] sd 0:0:1:0: [sg0] tag#246 CDB[00]: f0 44 07 ee 24 8a 40 94 b1 c5 45 71 7c 6e 12 28 00:56:10 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x0, 0xfffff51a, 0x0, 0x0, "ce35a247b86144f36fa74e282777e1167dbf81"}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f00000005c0)=0x6) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, "35f2f65b7ae8c661d638d38cd9bf8ab42a6787"}) 00:56:10 executing program 4: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) write(r1, &(0x7f0000000100), 0xfffffe5d) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) write(r3, &(0x7f0000000100), 0xfffffe5d) 00:56:10 executing program 2: r0 = memfd_create(&(0x7f0000000280)=')\x8b\x8a\x16\x11\x92O\xd5 1\xc1\x8cN\xedH\xdd\xdfk\x81\xff\xff\xff\xff\xff\xff\xffJ\x02u\x9b\xafe\xac\xd0\xf8TU\xaf\xb6\xbc\xd2\xff\xabll\xca\xc7\x90\xce\xe7\xef\x98\xf28\x8a8\xfd\x8a\x06o\xf00\xcf^\xa8\xc6\xbd> zY3R\xceh\xec\x01b\xb4\x81}\xcb\f\x1a\xd9S*\xfb\xd7Eh5\xc8\x94\xcfeX0L\x1a\xb6\xbc\v\x02)^\a\xaf\xdb\xa6\xde\xad \xccN\xca\x05yy\xdb', 0x3) write(r0, &(0x7f0000000140)="d4", 0x1) pwritev(r0, &(0x7f0000003480)=[{&(0x7f0000000000)="cb", 0x1}], 0x1, 0x8001, 0x0) fcntl$addseals(r0, 0x409, 0xc) 00:56:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r0, 0x1, 0x37, 0xfffffffffffffffe, &(0x7f0000000000)=0xc) [ 261.345886][ C1] sd 0:0:1:0: [sg0] tag#246 CDB[10]: b6 31 af 2a fa 75 72 ae 5f e6 04 ad 1b a8 23 d2 [ 261.355539][ C1] sd 0:0:1:0: [sg0] tag#246 CDB[20]: 0f [ 261.380402][T13626] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated 00:56:10 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x7) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000000c0)=0x27df, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x582, 0x4) 00:56:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001280), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x2284, &(0x7f0000000000)) 00:56:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x48, &(0x7f00000000c0)="18662de8", 0x4) 00:56:10 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="ef", 0x1}]) [ 261.433051][T13626] EXT4-fs (loop1): get root inode failed [ 261.438797][T13626] EXT4-fs (loop1): mount failed 00:56:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8", 0x78}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) syz_io_uring_setup(0x9c2, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:10 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) 00:56:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x2, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 00:56:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:10 executing program 5: prctl$PR_SET_IO_FLUSHER(0x39, 0x1) clone(0x40000000, 0x0, 0x0, 0x0, 0x0) [ 261.594601][T13678] Restarting kernel threads ... [ 261.594874][T13675] loop1: detected capacity change from 0 to 1051 [ 261.596244][T13678] done. [ 261.615920][T13675] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 00:56:10 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000001200)=[{{&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000d40)=[@mark={{0x14}}], 0xf}}], 0x1, 0x0) 00:56:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@private1, 0x0, 0x0, 0xff, 0xb, 0x0, 0x7}, 0x21) 00:56:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xd, &(0x7f0000ffc000/0x4000)=nil) 00:56:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) [ 261.646308][T13685] loop2: detected capacity change from 0 to 87 [ 261.682157][T13675] EXT4-fs error (device loop1): ext4_fill_super:4954: inode #2: comm syz-executor.1: iget: root inode unallocated [ 261.715135][T13675] EXT4-fs (loop1): get root inode failed [ 261.720970][T13675] EXT4-fs (loop1): mount failed [ 261.738006][T13710] SELinux: duplicate or incompatible mount options [ 261.745169][T13710] SELinux: duplicate or incompatible mount options 00:56:11 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0x1, 0x101) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 00:56:11 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) close(r0) 00:56:11 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f00000000000400060005", 0x1f}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:56:11 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f9", 0x1}], 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:56:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xd, &(0x7f0000ffc000/0x4000)=nil) [ 261.766180][T13685] attempt to access beyond end of device [ 261.766180][T13685] loop2: rw=0, want=92, limit=87 00:56:11 executing program 5: unshare(0xc000400) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 00:56:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:11 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x36, 0x0, 0x0) 00:56:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xd, &(0x7f0000ffc000/0x4000)=nil) [ 261.831394][T13724] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. [ 261.842136][T13718] attempt to access beyond end of device [ 261.842136][T13718] loop2: rw=2049, want=96, limit=87 [ 261.842262][T13726] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 00:56:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080), 0x4) 00:56:11 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000100)={0x0, 0x0, {0x3, 0x0, 0x80000}}) 00:56:11 executing program 5: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:11 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xd, &(0x7f0000ffc000/0x4000)=nil) [ 261.952951][T13747] loop2: detected capacity change from 0 to 87 00:56:11 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 00:56:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xdc, &(0x7f00000005c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250deae7a6d8332607f93938fabe2e77eb4ff46d2b6acf3307cc56a31e02e391ddc16c13dc7d29b1066029eb7c8e2104f912e73029259c5bae94591ce8aeee0a0e17619d8bb"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:56:11 executing program 5: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) [ 262.001031][T13747] attempt to access beyond end of device [ 262.001031][T13747] loop2: rw=0, want=92, limit=87 00:56:11 executing program 1: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:11 executing program 3: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:11 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000140)=0x2, 0x4) sendmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 262.102104][T13775] PM: suspend entry (deep) 00:56:11 executing program 0: ioprio_set$pid(0x1, 0x0, 0x4007) [ 262.128595][T13782] PM: suspend entry (deep) [ 262.133057][T13782] PM: suspend exit [ 262.140755][T13775] Filesystems sync: 0.034 seconds [ 262.154654][T13775] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 262.170663][T13775] OOM killer disabled. [ 262.174749][T13775] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 262.184921][T13775] printk: Suspending console(s) (use no_console_suspend to debug) 00:56:12 executing program 3: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:12 executing program 5: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) [ 262.225675][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 262.764817][T13775] ACPI: Preparing to enter system sleep state S3 [ 262.764911][T13775] PM: Saving platform NVS memory [ 262.764915][T13775] Disabling non-boot CPUs ... [ 262.768685][T13775] smpboot: CPU 1 is now offline [ 262.771555][T13775] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 262.771617][T13775] ACPI: Low-level resume complete [ 262.771700][T13775] PM: Restoring platform NVS memory [ 262.771740][T13775] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 262.782944][T13775] Enabling non-boot CPUs ... [ 262.783233][T13775] x86: Booting SMP configuration: [ 262.783237][T13775] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 262.783446][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 262.784717][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 262.786371][T13775] CPU1 is up [ 262.786735][T13775] ACPI: Waking up from system sleep state S3 [ 262.909444][T13775] OOM killer enabled. [ 262.910057][T13775] Restarting tasks ... [ 262.924128][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 262.926465][ T1034] block loop3: uevent: failed to send synthetic uevent [ 262.934418][T13795] PM: suspend entry (deep) [ 262.935219][T13795] PM: suspend exit [ 262.936237][T13775] done. [ 262.937752][T13775] PM: suspend exit [ 262.939645][T13790] loop2: detected capacity change from 0 to 87 00:56:12 executing program 0: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x7, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) 00:56:12 executing program 3: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:12 executing program 5: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) [ 262.970077][T13790] attempt to access beyond end of device [ 262.970077][T13790] loop2: rw=0, want=92, limit=87 [ 262.992435][T13804] PM: suspend entry (deep) [ 263.002082][T13804] Filesystems sync: 0.008 seconds [ 263.006494][T13804] Freezing user space processes ... (elapsed 0.016 seconds) done. [ 263.024500][T13804] OOM killer disabled. [ 263.025132][T13804] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 263.027875][T13804] printk: Suspending console(s) (use no_console_suspend to debug) [ 263.298166][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 263.827196][T13804] ACPI: Preparing to enter system sleep state S3 [ 263.827316][T13804] PM: Saving platform NVS memory [ 263.827319][T13804] Disabling non-boot CPUs ... [ 263.830806][T13804] smpboot: CPU 1 is now offline [ 263.833494][T13804] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 263.833553][T13804] ACPI: Low-level resume complete [ 263.833627][T13804] PM: Restoring platform NVS memory [ 263.833635][T13804] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 263.845681][T13804] Enabling non-boot CPUs ... [ 263.845925][T13804] x86: Booting SMP configuration: [ 263.845929][T13804] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 263.846107][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 263.847189][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 263.848747][T13804] CPU1 is up [ 263.849046][T13804] ACPI: Waking up from system sleep state S3 [ 263.956894][T13804] OOM killer enabled. [ 263.957447][T13804] Restarting tasks ... done. [ 263.963337][T13804] PM: suspend exit 00:56:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/201) 00:56:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) truncate(&(0x7f0000000100)='./bus\x00', 0x7) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:14 executing program 1: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x4}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="3a311abd", 0x4}], 0x1}}], 0x1, 0x0) 00:56:14 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x5452, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getown(r0, 0x9) 00:56:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x13f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 265.079937][T13823] PM: suspend entry (deep) [ 265.091400][T13823] Filesystems sync: 0.010 seconds [ 265.093527][T13823] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 265.102890][T13823] OOM killer disabled. [ 265.103471][T13823] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 265.106241][T13823] printk: Suspending console(s) (use no_console_suspend to debug) 00:56:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/201) 00:56:15 executing program 3: clone(0x300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x119}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 265.151821][ T4389] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 265.682824][T13823] ACPI: Preparing to enter system sleep state S3 [ 265.682926][T13823] PM: Saving platform NVS memory [ 265.682930][T13823] Disabling non-boot CPUs ... [ 265.686543][T13823] smpboot: CPU 1 is now offline [ 265.689322][T13823] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 265.689388][T13823] ACPI: Low-level resume complete [ 265.689537][T13823] PM: Restoring platform NVS memory [ 265.689545][T13823] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 265.701794][T13823] Enabling non-boot CPUs ... [ 265.701998][T13823] x86: Booting SMP configuration: [ 265.702011][T13823] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 265.702255][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 265.703405][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 265.704762][T13823] CPU1 is up [ 265.705135][T13823] ACPI: Waking up from system sleep state S3 [ 265.822895][T13823] OOM killer enabled. [ 265.823775][T13823] Restarting tasks ... done. [ 265.838596][T13832] loop2: detected capacity change from 0 to 87 [ 265.844381][T13823] PM: suspend exit 00:56:15 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0xff, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="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", 0x0, 0x0, 0x0, 0x0, 0x0}) 00:56:15 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000002c0)='\x00\x00', 0x2}], 0x1}}], 0x1, 0x4810) 00:56:15 executing program 1: openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x4000, &(0x7f0000000940)=ANY=[@ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0xee00, @ANYBLOB="2c00e372db93772801fba65eb0a9ee36979c5caa8a1c286a9d93b62287cc65cd0271d15d08da5151700133661e148c00230a0ec67e58ee9652699af58908a1d3852b3a34a47fa84f341b756c6ec3a792184b"]) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x1}) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001a40)={0x0, ""/256, 0x0, 0x0}) openat$full(0xffffffffffffff9c, &(0x7f0000001480), 0x121401, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r3, @ANYRES32, @ANYRESOCT, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRESHEX=r1], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000540)={0x0, 0x5, {0x0, @usage=0x8, 0x0, 0x5, 0x55e, 0x8, 0x0, 0x9, 0x20, @struct={0xcb2, 0x7}, 0xffffff00, 0x7, [0x100000001, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xa45]}, {0x2, @usage, 0x0, 0xfffffffffffffbff, 0x3, 0x100000000, 0x8, 0x0, 0x448, @struct={0x3b64, 0x3}, 0x0, 0x7fff, [0x3, 0x4, 0x0, 0x2, 0xff, 0x100000000]}, {0x9, @usage=0x7e47cf27, 0x0, 0xe1, 0x5, 0x5, 0x1, 0x3, 0x67, @usage=0x7, 0x2, 0x3, [0xfff, 0x5, 0x0, 0x101, 0xe2b, 0x8]}, {0x78d, 0x40, 0x3}}) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 00:56:15 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x8002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) write(r0, &(0x7f00000000c0)="b63db85e1e8d020000000000003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c94160096aa1fae1a", 0x30) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)=0x1) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1", 0x88, 0x0, 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/77, 0x4d}], 0x1) 00:56:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/201) 00:56:15 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="8c000000ee03"], 0x8c}}, 0x0) 00:56:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x20280, 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 265.944590][T13865] PM: suspend entry (deep) [ 265.965701][T13865] Filesystems sync: 0.019 seconds [ 265.970394][T13873] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1006 sclass=netlink_audit_socket pid=13873 comm=syz-executor.2 [ 265.970484][T13865] Freezing user space processes ... (elapsed 0.004 seconds) done. [ 265.978566][T13865] OOM killer disabled. [ 265.979216][T13865] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 265.981971][T13865] printk: Suspending console(s) (use no_console_suspend to debug) 00:56:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/201) 00:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000000b40)=[{&(0x7f0000001700)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="2958bbcb93d48324a4f4529ce61e9dba89a2aceb025d50107554a5901a8e06ac9d360d372ee105a215562b5e82bd11ec16809c056dcee16423fe7816dc9a3c93039fe3ac1ccab8a10ef3088f3e688f5e93c3526037331f28adb5fa207af136e46ac4f6f8042ac4b182b169ed3927f033962b96f37377f7823e8f2ad644619dbfcb6873d2796f96dfa852bac8bc60e97429425315543b3ccd736670e71d468a45fd181e19183ca56975ac4a5009d24615a455361b04ecdb11e2c4e123209af81d", 0xc0, 0xff}, {&(0x7f0000000980)="d5f84dd1da9075936c41ab0ddfe17ffd", 0x10, 0x6}]) 00:56:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0xff, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="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", 0x0, 0x0, 0x0, 0x0, 0x0}) 00:56:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000280)=[&(0x7f00000002c0)='/s\xd0(\xb7\xc59\xea<\xb5\x1c\xb9\xd9\xd6i\xce\x8ad\xe2,\xaf\xd0\xa3\xd4U\xa3\xae\x85\xf8\xb7\xe4\xe8\x00\x00\x00\x00\x00\x00']) 00:56:16 executing program 2: r0 = syz_io_uring_setup(0x9f6, &(0x7f0000000140), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 00:56:16 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568dab9af7a4d5cc06f3eb349fd086c22e3fc56bbb0cae5170871c145045174adb56edb6b0a183dd660ef94af2121945b0d79bb5efadeaad68ae15948eb13fd714f32449bb5e2bdfe6c86cc1d507694a8d504f1144634b26cafc25714cf7fdc166f16fa0d74cd1164f949d143aa7692731ed21fb541b7a2cc83eb76be0952aea033004c341485d3135a259470f3b7daeac815daf1bc482dee541c06", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) [ 266.045482][ T4807] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 266.578997][T13865] ACPI: Preparing to enter system sleep state S3 [ 266.579172][T13865] PM: Saving platform NVS memory [ 266.579182][T13865] Disabling non-boot CPUs ... [ 266.581752][T13865] smpboot: CPU 1 is now offline [ 266.584654][T13865] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 266.584714][T13865] ACPI: Low-level resume complete [ 266.584809][T13865] PM: Restoring platform NVS memory [ 266.584819][T13865] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 266.596882][T13865] Enabling non-boot CPUs ... [ 266.597177][T13865] x86: Booting SMP configuration: [ 266.597180][T13865] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 266.597443][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 266.598402][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 266.600092][T13865] CPU1 is up [ 266.600300][T13865] ACPI: Waking up from system sleep state S3 [ 266.726601][T13865] OOM killer enabled. [ 266.727461][T13865] Restarting tasks ... [ 266.737666][ T1034] synth uevent: /devices/virtual/block/loop1: failed to send uevent [ 266.740165][ T1034] block loop1: uevent: failed to send synthetic uevent [ 266.750736][T13880] loop3: detected capacity change from 0 to 1 [ 266.756327][T13865] done. [ 266.759892][T13865] PM: suspend exit 00:56:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0xff, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="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", 0x0, 0x0, 0x0, 0x0, 0x0}) 00:56:16 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6}]}) 00:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000000b40)=[{&(0x7f0000001700)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="2958bbcb93d48324a4f4529ce61e9dba89a2aceb025d50107554a5901a8e06ac9d360d372ee105a215562b5e82bd11ec16809c056dcee16423fe7816dc9a3c93039fe3ac1ccab8a10ef3088f3e688f5e93c3526037331f28adb5fa207af136e46ac4f6f8042ac4b182b169ed3927f033962b96f37377f7823e8f2ad644619dbfcb6873d2796f96dfa852bac8bc60e97429425315543b3ccd736670e71d468a45fd181e19183ca56975ac4a5009d24615a455361b04ecdb11e2c4e123209af81d", 0xc0, 0xff}, {&(0x7f0000000980)="d5f84dd1da9075936c41ab0ddfe17ffd", 0x10, 0x6}]) 00:56:16 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="04042800c727ed9d84419ed9d5cb6c182f"], 0xfdef) [ 266.792865][ T1034] loop3: [ 266.793964][T13880] loop3: 00:56:16 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0xff, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000140)="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", 0x0, 0x0, 0x0, 0x0, 0x0}) 00:56:16 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r0) add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="fd", 0x1, r0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/4, 0x4) 00:56:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) 00:56:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000009c0)) 00:56:16 executing program 1: r0 = fsopen(&(0x7f00000000c0)='nfs\x00', 0x0) fsmount(r0, 0x0, 0x0) [ 266.830308][ T25] kauditd_printk_skb: 10 callbacks suppressed [ 266.830365][ T25] audit: type=1326 audit(1622940976.148:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13897 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 266.845830][T13909] loop3: detected capacity change from 0 to 1 [ 266.869162][ T25] audit: type=1326 audit(1622940976.178:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13897 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 [ 266.879707][ T1034] loop3: 00:56:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000000b40)=[{&(0x7f0000001700)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="2958bbcb93d48324a4f4529ce61e9dba89a2aceb025d50107554a5901a8e06ac9d360d372ee105a215562b5e82bd11ec16809c056dcee16423fe7816dc9a3c93039fe3ac1ccab8a10ef3088f3e688f5e93c3526037331f28adb5fa207af136e46ac4f6f8042ac4b182b169ed3927f033962b96f37377f7823e8f2ad644619dbfcb6873d2796f96dfa852bac8bc60e97429425315543b3ccd736670e71d468a45fd181e19183ca56975ac4a5009d24615a455361b04ecdb11e2c4e123209af81d", 0xc0, 0xff}, {&(0x7f0000000980)="d5f84dd1da9075936c41ab0ddfe17ffd", 0x10, 0x6}]) 00:56:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)={0x4c, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_TUPLE={0x30, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x8, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x14, 0x4, @mcast2}}}]}, @CTA_EXPECT_MASK={0x4}]}, 0x4c}}, 0x0) [ 266.883037][T13909] loop3: [ 266.924942][T13935] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.926650][T13935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.928297][T13935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.933062][T13937] loop3: detected capacity change from 0 to 1 [ 266.969277][T13937] loop3: [ 266.970557][ T1034] loop3: [ 267.320850][ T28] input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input6 00:56:19 executing program 5: r0 = io_uring_setup(0x123, &(0x7f0000000f00)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = syz_io_uring_setup(0x655d, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) dup3(r1, r0, 0x0) 00:56:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r1) ioctl$TCSETA(r0, 0x4b4a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "5e1a154b026d23ee"}) 00:56:19 executing program 1: r0 = io_uring_setup(0x772f, &(0x7f0000000180)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, 0x0, 0x2) 00:56:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) 00:56:19 executing program 4: r0 = syz_io_uring_setup(0x54a1, &(0x7f0000000040), &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x6, &(0x7f0000000240)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2) 00:56:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f0000000b40)=[{&(0x7f0000001700)="030005020314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}, {&(0x7f00000000c0)="2958bbcb93d48324a4f4529ce61e9dba89a2aceb025d50107554a5901a8e06ac9d360d372ee105a215562b5e82bd11ec16809c056dcee16423fe7816dc9a3c93039fe3ac1ccab8a10ef3088f3e688f5e93c3526037331f28adb5fa207af136e46ac4f6f8042ac4b182b169ed3927f033962b96f37377f7823e8f2ad644619dbfcb6873d2796f96dfa852bac8bc60e97429425315543b3ccd736670e71d468a45fd181e19183ca56975ac4a5009d24615a455361b04ecdb11e2c4e123209af81d", 0xc0, 0xff}, {&(0x7f0000000980)="d5f84dd1da9075936c41ab0ddfe17ffd", 0x10, 0x6}]) 00:56:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_io_uring_setup(0x60a, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x4a85, &(0x7f0000000080)={0x0, 0x8162, 0x6a, 0x0, 0x0, 0x0, r1}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 00:56:19 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="900000001c001f4d154a81739327050000000000000000000104030014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 00:56:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) 00:56:19 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x2c, 0x1, 0x1, 0x3, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8}}}]}]}, 0x2c}}, 0x0) 00:56:19 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f00000000c0)) ppoll(&(0x7f0000000080)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) connect$unix(r0, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 00:56:19 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmallocinfo\x00', 0x0, 0x0) lseek(r0, 0x57, 0x0) 00:56:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x28, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) [ 269.830483][T13973] loop3: detected capacity change from 0 to 1 [ 269.845262][T13985] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.0'. [ 269.870510][T13973] loop3: 00:56:19 executing program 3: timer_create(0x0, 0xfffffffffffffffc, 0x0) 00:56:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_IBSS(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001500)={0x1c, r1, 0x221, 0x0, 0x0, {{0x1a}, {@val={0x8, 0xf}, @void}}}, 0x1c}}, 0x0) 00:56:19 executing program 4: r0 = syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f00003b2000/0x1000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_uring_enter(r0, 0x4ab0, 0x0, 0x0, 0x0, 0x0) write$nbd(r4, &(0x7f0000000040), 0x10) 00:56:19 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x4040, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) read(r1, &(0x7f0000000000), 0x20002000) 00:56:19 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x0, 0x8, 0x0, 0x0, 0xfdfdffff}) 00:56:19 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5423, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "94e0e37eaefe3906"}) 00:56:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0xb, &(0x7f0000000100)=0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x1802, 0x843ce40d, 0x0, 0x0, 0x0, r0, 0x0, 0x2}]) 00:56:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:56:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'rmd160\x00'}}}]}, 0x13c}}, 0x0) 00:56:20 executing program 5: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/disk', 0x602, 0x0) pwrite64(r0, &(0x7f0000000080)='7', 0x1, 0x0) 00:56:20 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)="1c0000001200050f0c1000000049b23e9b200a00080012c0070ec000", 0xff85, 0x0, 0x0, 0x0) 00:56:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x612}], 0x0, &(0x7f0000000140)={[{@iocharset={'iocharset', 0x3d, 'cp737'}}]}) 00:56:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x4040, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) read(r1, &(0x7f0000000000), 0x20002000) 00:56:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'rmd160\x00'}}}]}, 0x13c}}, 0x0) 00:56:20 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {'port', 0x3d, 0x83f0ffff}}) 00:56:20 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') [ 270.785573][T14066] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 270.787233][T14062] 9pnet: p9_fd_create_tcp (14062): problem connecting socket to 127.0.0.1 [ 270.787783][T14063] loop0: detected capacity change from 0 to 6 00:56:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0)="f56db0fcd9860cd1f6aa78beb56689196212a999dadeaa4b12b4e235b5f76f4a7d2ff356a28305f949adc64dcc88f0debedfdc8e19e34debff89ae45a1681e961af5089709fbc63e8bc27ee1ab10cd3672868ea0cf4955f6", 0x58, 0x0, &(0x7f0000000380)={0x2, 0x0, @empty}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{&(0x7f0000000140)=@xdp, 0x80, &(0x7f0000000c00)=[{&(0x7f00000001c0)=""/129, 0x81}, {&(0x7f00000003c0)=""/186, 0xba}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000640)=""/254, 0xfe}, {&(0x7f0000000740)=""/152, 0x98}, {&(0x7f0000000800)=""/221, 0xdd}, {&(0x7f00000002c0)=""/1, 0x1}, {&(0x7f0000000900)=""/158, 0x9e}, {&(0x7f0000000480)=""/38, 0x26}, {&(0x7f00000009c0)}], 0xa, &(0x7f0000000cc0)=""/85, 0x55}, 0x7}], 0x1, 0x40, &(0x7f0000000d80)={0x77359400}) 00:56:20 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a4, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:56:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x4040, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) read(r1, &(0x7f0000000000), 0x20002000) 00:56:20 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00000005c0)='eth \x9f\xe0.\xcd\x12\xec\xc7\xbd\xa2\xfaZT[b\xaeIm\xb2\xd7\xd5\xe5&@\xdb\x9a8\x97\xdb\xc5\xa4\x00\x00\x00t\xbea\xf8R\xdeCX5\xab\x1f\xf0 \xac\x15i\xcd$m\xe8\x10\xcd$7\x84\x11U,\t\xe4Zr\xfe\xfe\xff\xff\xff\xf5\x87=\x87\xeb68\x10\xa3k\xb2 \r\xabo\x10\x89s\x1d\xee\xc0+(:\xdd\f\x11\x1b\x7f\x9d\x12\xcbG\xc1S\xf4\x9d(J\xed\xd0\xbfv\xe8z0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, 0x0, 0x0) 00:56:20 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_buf(r2, 0x1, 0x1f, &(0x7f0000000140)=""/160, &(0x7f0000000040)=0xa0) 00:56:20 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) mremap(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000006000/0x2000)=nil) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x4040, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) read(r1, &(0x7f0000000000), 0x20002000) 00:56:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) llistxattr(&(0x7f0000001340)='./file0\x00', 0x0, 0x0) [ 270.956874][T14118] loop0: detected capacity change from 0 to 7 [ 270.963277][T14118] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (3 blocks) 00:56:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read$char_usb(r0, 0x0, 0x7) 00:56:20 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=@newsa={0x13c, 0x10, 0x1, 0x0, 0x0, {{@in6=@private0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'rmd160\x00'}}}]}, 0x13c}}, 0x0) [ 270.997337][ T25] audit: type=1326 audit(1622940980.306:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.011458][ T25] audit: type=1326 audit(1622940980.306:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=133 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.016006][ T25] audit: type=1326 audit(1622940980.306:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.025335][T14118] loop0: detected capacity change from 0 to 7 [ 271.025855][ T25] audit: type=1326 audit(1622940980.316:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=195 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.030472][ T25] audit: type=1326 audit(1622940980.316:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.037391][ T25] audit: type=1326 audit(1622940980.316:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.038969][T14118] EXT4-fs (loop0): bad geometry: block count 256 exceeds size of device (3 blocks) 00:56:20 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/sync_on_suspend', 0xc0202, 0x0) write$eventfd(r0, &(0x7f0000000000), 0x8) 00:56:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000080)) 00:56:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000003b40)={0x18, 0x16, 0x68bc6305220b7d7, 0x0, 0x0, {0xa, 0x0, 0x150}, [@generic="85"]}, 0x18}}, 0x0) 00:56:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, &(0x7f0000000200)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in=@empty}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) 00:56:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) readv(r0, &(0x7f000085dff0)=[{&(0x7f0000001700)=""/67, 0x20001743}], 0x1) [ 271.044030][ T25] audit: type=1326 audit(1622940980.316:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 271.049337][ T25] audit: type=1326 audit(1622940980.316:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14126 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=133 compat=0 ip=0x4665d9 code=0x7ffc0000 00:56:20 executing program 0: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 00:56:20 executing program 5: r0 = open(&(0x7f0000000400)='.\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) flock(r0, 0x6) open(&(0x7f0000000400)='.\x00', 0x0, 0x0) 00:56:20 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, 0x0, 0x0) 00:56:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') close(r0) 00:56:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:20 executing program 1: add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f0000000100)="1080", 0x2, 0xffffffffffffffff) 00:56:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 00:56:20 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x2283, 0x400000) [ 271.202653][T14185] loop0: detected capacity change from 0 to 87 00:56:20 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\\^*(b$\'+\'\x00') 00:56:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000040)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 00:56:20 executing program 5: r0 = fsopen(&(0x7f0000000000)='ext3\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:56:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 00:56:20 executing program 1: unshare(0x20600) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) [ 271.273776][T14204] loop4: detected capacity change from 0 to 4096 [ 271.297350][T14204] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 271.315928][T14219] loop0: detected capacity change from 0 to 87 00:56:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 00:56:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, 0xe8) 00:56:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000e000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:56:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 00:56:21 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, 0x0, 0x0) 00:56:21 executing program 1: unshare(0x20600) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) [ 272.011149][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 272.011160][ T25] audit: type=1326 audit(1622940981.326:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14174 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:56:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 00:56:21 executing program 1: unshare(0x20600) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 00:56:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x2b, 0xfffffffffffffffd, &(0x7f0000000000)) 00:56:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x80082407, 0xc04a01) 00:56:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000000)='./bus\x00', 0x86000, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) [ 272.053067][T14244] loop0: detected capacity change from 0 to 87 [ 272.058188][T14248] loop4: detected capacity change from 0 to 4 [ 272.063451][T14248] EXT4-fs (loop4): quotafile must be on filesystem root [ 272.074387][ T25] audit: type=1326 audit(1622940981.386:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14246 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:56:21 executing program 1: unshare(0x20600) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 00:56:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000e000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:56:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) [ 272.123547][T14248] loop4: detected capacity change from 0 to 4 [ 272.133325][T14248] EXT4-fs (loop4): quotafile must be on filesystem root [ 272.193739][T14275] loop0: detected capacity change from 0 to 87 [ 272.206772][T14286] loop4: detected capacity change from 0 to 4 [ 272.209525][T14286] EXT4-fs (loop4): quotafile must be on filesystem root 00:56:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, 0x0, 0x0) 00:56:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev}, 0x10) 00:56:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb06131d540000000000002200"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xffffffff) read(r0, &(0x7f0000001c40)=""/242, 0xf2) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 00:56:22 executing program 0: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000100)=[{}], 0x1, 0x5000003, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x7f499eb2ae778c31}) 00:56:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}}) 00:56:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000e000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) 00:56:22 executing program 1: r0 = epoll_create(0x2) r1 = eventfd(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000000c0)) 00:56:22 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x7ffa00}], 0x1, 0x600, 0x0, 0x3) 00:56:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000e000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000340)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}]}) [ 272.941912][T14303] device lo entered promiscuous mode [ 272.944328][T14298] device lo left promiscuous mode [ 272.951391][ T25] audit: type=1326 audit(1622940982.266:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14301 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 [ 272.951656][T14303] device lo entered promiscuous mode [ 272.955928][T14298] device lo left promiscuous mode [ 272.956694][T14308] loop4: detected capacity change from 0 to 4 [ 272.968663][T14308] EXT4-fs (loop4): quotafile must be on filesystem root 00:56:22 executing program 1: r0 = gettid() clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x18) wait4(0x0, 0x0, 0x0, 0x0) clone(0x1000, 0x0, &(0x7f0000000000), 0x0, 0x0) 00:56:22 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 00:56:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb06131d540000000000002200"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xffffffff) read(r0, &(0x7f0000001c40)=""/242, 0xf2) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) [ 273.084796][T14346] loop4: detected capacity change from 0 to 4 [ 273.088860][T14346] EXT4-fs (loop4): quotafile must be on filesystem root 00:56:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getdents(r1, 0x0, 0x0) 00:56:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getrandom(0x0, 0x0, 0x0) 00:56:23 executing program 0: timer_create(0x3, 0x0, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000280)) 00:56:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) syz_open_dev$vcsn(&(0x7f0000000180), 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x5}, 0x1c) r1 = socket(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@hci={0x1f, 0x6488, 0x2}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="f254294737bb0057", 0x368}], 0x1}, 0x0) 00:56:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb06131d540000000000002200"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xffffffff) read(r0, &(0x7f0000001c40)=""/242, 0xf2) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 00:56:23 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x410000, 0x8, 0x210000, 0x8}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) read$char_usb(r1, &(0x7f0000000100)=""/69, 0x20000145) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x40}, 0x1c) 00:56:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:23 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) [ 273.843754][ T25] audit: type=1326 audit(1622940983.156:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14369 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 00:56:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb06131d540000000000002200"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000180)=0xffffffff) read(r0, &(0x7f0000001c40)=""/242, 0xf2) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 00:56:25 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') 00:56:25 executing program 2: timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = io_uring_setup(0x233d, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000280)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000200)={0xffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x1) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, 0x0, 0xe) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000400)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 00:56:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, &(0x7f0000000900)=[{0x0}, {&(0x7f0000001580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x42, 0x0) 00:56:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:25 executing program 4: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2000, @fd_index=0x4, 0x0, 0x0, 0x0, 0x1f}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 00:56:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup2(r1, r1) ioctl$KDGKBDIACR(r2, 0x4b62, &(0x7f0000000240)=""/234) 00:56:25 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) write$sndseq(r0, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0xfd, @time, {}, {}, @ext={0x0, 0x0}}], 0x1c) 00:56:25 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0xc03000) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ftruncate(r1, 0x2008002) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000180)) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 00:56:25 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x66}, @val={0xc}}}}, 0x28}}, 0x0) 00:56:25 executing program 4: r0 = fsopen(&(0x7f0000000040)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f00000000c0)='nolazytime\x00', 0x0, 0x0) 00:56:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) 00:56:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404d1f4655fd1f4655fd1f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000d908479700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000090dc20e700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731333231363534352f66696c65302f66696c65300000000000000000000000000000000000000000000009d0860300000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="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", 0x1a0, 0x2200}, {&(0x7f0000011700)="ed81000064000000d1f4655fd1f4655fd1f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616cf3954fe900000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea040734000000000028000000000000006461746100000000000000000000000000000000000000000000000000000000000000006c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffd1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) [ 276.180093][T14440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14440 comm=syz-executor.1 00:56:25 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) tkill(r1, 0x9) [ 276.252993][T14452] loop1: detected capacity change from 0 to 1024 [ 276.295922][T14452] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:56:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="4f3c0b5ef2ef69a2fab80047d317f9cf", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:25 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r0, 0x400c330d, &(0x7f0000000080)={0x0, 0x80000000}) 00:56:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404d1f4655fd1f4655fd1f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000d908479700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000090dc20e700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731333231363534352f66696c65302f66696c65300000000000000000000000000000000000000000000009d0860300000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="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", 0x1a0, 0x2200}, {&(0x7f0000011700)="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", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffd1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) 00:56:25 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x3, &(0x7f0000000340)=[{0x3d}, {0x7c}, {0x6}]}) gettid() 00:56:25 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="4f3c0b5ef2ef69a2fab80047d317f9cf", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:25 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u}, {@access_client}]}}) [ 276.450530][ T25] audit: type=1326 audit(1622940985.755:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14486 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 276.466373][T14494] loop1: detected capacity change from 0 to 1024 00:56:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404d1f4655fd1f4655fd1f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000d908479700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000090dc20e700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731333231363534352f66696c65302f66696c65300000000000000000000000000000000000000000000009d0860300000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="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", 0x1a0, 0x2200}, {&(0x7f0000011700)="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", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffd1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) [ 276.491953][T14494] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:56:25 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, './file1\x00'}, 0x6e) listen(r2, 0x0) shutdown(r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x40000000}) shutdown(r2, 0x1) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 00:56:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x2000000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) [ 276.567270][T14513] loop1: detected capacity change from 0 to 1024 00:56:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x1d, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000000000004000000000002000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d1f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37313332313635343500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f2a953140c764271ad9be301789147cf010040000c00000000000000d1f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000003100000000000000", 0x40, 0x540}, {&(0x7f0000010300)="03000000040000000500000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d1f4655fd1f4655fd1f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d1f4655fd1f4655fd1f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010e00)="20000000e85575eae85575ea00000000d1f4655f00"/32, 0x20, 0x1580}, {&(0x7f0000010f00)="8081000000300404d1f4655fd1f4655fd1f4655f00000000000001002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d1f4655f00"/160, 0xa0, 0x1a00}, {&(0x7f0000011000)="c0410000002c0000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000020000000", 0x40, 0x1e00}, {&(0x7f0000011100)="20000000000000000000000000000000d1f4655f000000000000000000000000000002ea00"/64, 0x40, 0x1e80}, {&(0x7f0000011200)="ed4100003c000000d1f4655fd1f4655fd1f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000d908479700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x1f00}, {&(0x7f0000011300)="ed8100001a040000d1f4655fd1f4655fd1f4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000005000000000000000000000000000000000000000000000000000000000000000000000000000000090dc20e700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2000}, {&(0x7f0000011400)="ffa1000026000000d1f4655fd1f4655fd1f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3731333231363534352f66696c65302f66696c65300000000000000000000000000000000000000000000009d0860300000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0xa0, 0x2100}, {&(0x7f0000011500)="ed8100000a000000d1f4655fd1f4655fd1f4655f000000000000010000000000000000100100000073797a6b616c6c6572730000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000224d02d700000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000000002ea040700000000000000000000000000006461746106015400000000000600000000000000786174747231000006014c000000000006000000000000007861747472320000000000000000000078617474723200007861747472310000ed81000028230000d1f4655fd1f4655fd1f4655f00000000000002002000000000000800010000000af3010004000000000000000000000009000000600000000000000000000000000000000000000000000000000000000000000000000000000000004076a5e500000000000000000000000000000000000000000000000020000000e85575eae85575eae85575ead1f4655fe85575ea0000000000000000", 0x1a0, 0x2200}, {&(0x7f0000011700)="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", 0x100, 0x2400}, {&(0x7f0000011800)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011900)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x8000}, {&(0x7f0000011a00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011b00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012400)="504d4d00504d4dffd1f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7033310075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x10000}, {&(0x7f0000012500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x14000}], 0x0, &(0x7f0000012a00)) [ 276.607064][T14513] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 276.657791][T14535] loop1: detected capacity change from 0 to 1024 [ 276.672906][T14535] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 277.274951][ T25] audit: type=1326 audit(1622940986.585:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=14486 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:56:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0xd2) timerfd_create(0x8, 0x0) 00:56:28 executing program 4: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x10000, 0x0) read(r3, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x10034) write$P9_RUNLINKAT(r4, &(0x7f0000000000)={0x7}, 0x7) 00:56:28 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 00:56:28 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x1ad042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1fd, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) r5 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r5, 0x1, &(0x7f0000000140)) sendfile(r0, r0, 0x0, 0x8080ffffff7e) 00:56:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="4f3c0b5ef2ef69a2fab80047d317f9cf", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$unix(r1, &(0x7f00000000c0)="b9", 0x1, 0x0, 0x0, 0x0) 00:56:28 executing program 1: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x108) set_mempolicy(0x8002, &(0x7f0000000000)=0x1f, 0x2) close(r0) 00:56:28 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) read$char_usb(r0, 0x0, 0x0) 00:56:28 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) ftruncate(r0, 0x200) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) 00:56:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000), &(0x7f0000000280)='user}eth1\x00', 0x0) 00:56:28 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/xz_dec', 0x0, 0x0) getdents(r0, &(0x7f0000000440)=""/223, 0x18) getdents64(r0, &(0x7f0000000180)=""/119, 0x77) 00:56:31 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e7b126b0918e4972be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9c6f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9", 0x40}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:31 executing program 1: prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffb000/0x1000)=nil) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffb000/0x1000)=nil) pkey_mprotect(&(0x7f000052b000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f000052a000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) 00:56:31 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x811004, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext2\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x30100ac, &(0x7f00000000c0)={[{@commit={'commit', 0x3d, 0x4321}}]}) 00:56:31 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000200)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:31 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xffffff7f, 0x0}, 0x201}], 0x102, 0x401eb94) 00:56:31 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="4f3c0b5ef2ef69a2fab80047d317f9cf", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:31 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000080)={0xff6a, 0x0, 0x0, 'queue1\x00'}) 00:56:31 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6d706f6c3d70723d408f2627c99a49f178413a302d4e0a"]) 00:56:31 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(r0, 0x10001, 0x3) 00:56:31 executing program 3: r0 = fork() process_vm_writev(r0, &(0x7f0000000580)=[{0x0}, {&(0x7f00000000c0)=""/221, 0xdd}, {&(0x7f00000001c0)=""/230, 0xe6}, {&(0x7f00000002c0)=""/96, 0x60}, {&(0x7f0000000340)=""/239, 0xef}, {&(0x7f0000000480)=""/225, 0xe1}], 0x6, &(0x7f0000000840)=[{&(0x7f0000000640)=""/169, 0xa9}, {0x0}, {&(0x7f0000000780)=""/71, 0x47}, {0x0, 0xa9}], 0x4, 0x0) 00:56:31 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000002c0)={0x7ff9}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001f00000001000002000200000800040001020000", 0x24) 00:56:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000020000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010003000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 00:56:31 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000001880)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f0000001280)=[{&(0x7f0000000040)="1a6c", 0x2}], 0x1}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="24000000000000002900000032000000ff010000000000000000000000000001c0"], 0x28}}], 0x2, 0xc000) 00:56:31 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(r0, 0x10001, 0x3) [ 282.495313][T14665] tmpfs: Bad value for 'mpol' [ 282.502495][T14670] tmpfs: Bad value for 'mpol' 00:56:31 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r0, 0x0, 0x10001) [ 282.570039][T14684] loop3: detected capacity change from 0 to 140 [ 282.582541][T14684] EXT4-fs (loop3): Unrecognized mount option "øT" or missing value [ 282.590567][T14684] EXT4-fs (loop3): failed to parse options in superblock: øT [ 282.598149][T14684] EXT4-fs (loop3): bad geometry: block count 256 exceeds size of device (70 blocks) 00:56:34 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(r0, 0x10001, 0x3) 00:56:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f2386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855ef88b9bbcea40f6c48488c8762237c7af3ebec1a3384b97d5b84e2564247dc404526435ddb1097cbe79d07897410994562e84d979e4ae0f0ef1497c0c28f825151c839e588f4b82812c177b072ab3f4a", 0xa1}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:34 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) lseek(r0, 0x10001, 0x3) 00:56:34 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffe]}, 0x0, 0x8) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x7}) r2 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xffffbffb]}, 0x8) read(r2, &(0x7f0000000740)=""/384, 0x180) 00:56:34 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f00000000c0)={{}, {0x4000000000000}, 0x0, 0x6}) 00:56:34 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r0, 0x0, 0x10001) 00:56:34 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:56:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x35}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:56:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0x4058534c, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 00:56:34 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r0, 0x0, 0x10001) 00:56:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, 0x0) 00:56:34 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/keys\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r2, r0, 0x0, 0x10001) 00:56:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000380)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x8, 0x0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x544000) 00:56:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="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", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x34}}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:34 executing program 2: r0 = socket$inet6(0xa, 0x800000003, 0xff) r1 = dup(r0) sendto$inet6(r1, &(0x7f0000000040)="241f0e14e4483379baa32e9b9630149f63d0ed0c808c03931755aad5d4e7416c2bc03a8d471f200233ce", 0x2a, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 00:56:34 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, 0x0) [ 285.601452][T14744] new mount options do not match the existing superblock, will be ignored [ 285.635340][T14744] option changes via remount are deprecated (pid=14741 comm=syz-executor.3) 00:56:35 executing program 4: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="ee03000000000000007e88"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x3a) [ 285.644837][T14744] new mount options do not match the existing superblock, will be ignored [ 285.693642][T14769] new mount options do not match the existing superblock, will be ignored 00:56:35 executing program 1: r0 = syz_io_uring_setup(0x80002de7, &(0x7f0000001600)={0x0, 0x0, 0x10}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) r3 = inotify_init() syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x2, 0x0, 0x0, 0x0, 0x0) [ 285.709296][T14769] option changes via remount are deprecated (pid=14764 comm=syz-executor.3) 00:56:35 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x2, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, 0x108) close(r0) 00:56:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') 00:56:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, 0x0) 00:56:35 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40104593, &(0x7f0000000a00)=""/4096) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x0, 0x0, 0x0}) 00:56:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x80002, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) 00:56:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) 00:56:35 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, 0x52, 0x1, 0x0, 0x0, {0xa}, [@nested={0x10, 0x2, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x24}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:56:35 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xa) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r3) socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 00:56:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2f, 0x0) 00:56:35 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='/dev/input/event#\x00') [ 286.397931][T14802] new mount options do not match the existing superblock, will be ignored [ 286.418449][T14802] option changes via remount are deprecated (pid=14798 comm=syz-executor.3) 00:56:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:35 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="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", 0x1b1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:35 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x5) dup2(r1, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r3, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x2) setsockopt$SO_TIMESTAMP(r3, 0x1, 0x3f, &(0x7f00000001c0)=0x4, 0x4) recvmmsg(r3, &(0x7f00000020c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002080)=""/1, 0x1}}], 0x2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r4], 0xc63b9e35) 00:56:35 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) pkey_mprotect(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x6, 0xffffffffffffffff) [ 286.516783][T14831] new mount options do not match the existing superblock, will be ignored [ 286.532367][T14831] option changes via remount are deprecated (pid=14827 comm=syz-executor.3) 00:56:36 executing program 1: r0 = syz_io_uring_setup(0x6c6f, &(0x7f0000000180), &(0x7f0000d58000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000240)) mmap$IORING_OFF_SQES(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x0, 0x4000013, r0, 0x10000000) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000afb000/0x2000)=nil, 0x2000, 0x4, 0x101071, 0xffffffffffffffff, 0x10000000) 00:56:36 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x102}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16, @ANYBLOB="34e131f024cf2fff003895"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x9) 00:56:36 executing program 0: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/117, 0x75}], 0x1) readv(r0, &(0x7f0000000540)=[{&(0x7f0000000180)=""/172, 0xac}], 0x1) dup2(r0, r1) 00:56:36 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigsuspend(0x0, 0x8) fork() wait4(0x0, 0x0, 0x1, 0x0) fork() socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000740)={0x0, 0x7fec, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 00:56:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="a3"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x16, r1}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) 00:56:36 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/timer_list\x00', 0x0, 0x0) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/212, 0xd4}], 0x1, 0x25, 0x0, 0x0) 00:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = dup(r0) lseek(r1, 0x101, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getdents64(r0, &(0x7f0000000140)=""/178, 0xb2) 00:56:36 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigsuspend(0x0, 0x8) fork() wait4(0x0, 0x0, 0x1, 0x0) fork() socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000740)={0x0, 0x7fec, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 00:56:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="a3"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x16, r1}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) 00:56:36 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802", 0x1a, 0xe000}], 0x0, &(0x7f0000000140)={[{@nojoliet}, {@overriderock}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}]}) 00:56:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 00:56:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="a3"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x16, r1}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) 00:56:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x0, 0x0, {0x10}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6}, @IPVS_SVC_ATTR_PORT={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6}]}]}, 0x124}}, 0x0) 00:56:36 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigsuspend(0x0, 0x8) fork() wait4(0x0, 0x0, 0x1, 0x0) fork() socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000740)={0x0, 0x7fec, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 00:56:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d8f4655fd8f4655f0100ffff53ef010001000000d8f4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {0x0, 0x0, 0x20000000002800}, {&(0x7f0000011600)='PMM', 0x3, 0x6000}], 0x0, &(0x7f0000013c00)) 00:56:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x7, 0x114031, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/50, 0x24}], 0x1) 00:56:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:36 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) unshare(0x8000400) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) accept$unix(r0, 0x0, 0x0) 00:56:36 executing program 2: syz_open_dev$vcsn(&(0x7f0000000200), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) rt_sigsuspend(0x0, 0x8) fork() wait4(0x0, 0x0, 0x1, 0x0) fork() socket$inet6_udp(0xa, 0x2, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000740)={0x0, 0x7fec, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) 00:56:36 executing program 4: r0 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r0, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="a3"], 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000000)={@remote, 0x16, r1}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000), 0x4) r3 = socket(0xa, 0x1, 0x0) ioctl(r3, 0x8916, &(0x7f0000000000)) ioctl(r3, 0x8936, &(0x7f0000000000)) 00:56:36 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="02"], 0x8, 0x0) msgsnd(r0, &(0x7f00000003c0)={0x1, "e54100fb082f6b7f2f705b8fe55e1c2a9342e8fceb2c01dae181070133316a642fc4515836a8f3a4b22b376681dea7134dbb17f129b91accf29a6b61c8ed5c3b83140d463c281f6830e26e19da4f719fcb818e8d917b964eda0f3fa4b3be4d36a2726a41db7ae053c5432afeaadef0b814fc9e1739e6de29aad9b2e4704d9af799e2f919166c9e5ccea8d46832de511f25a32581406c8a26b33b73862872c1706bddd8d89161f81a12ac0888785ce1bdb39210c1cfc9967fe00b04d5d684ddca3b59e81d5fbd20ab02eec618429ac950fa0db59d7453c828e56c803bbfdc1fd3f91b5441c7a9c5d506721393a9cff0f10969c3485b79a1bd323c1ca1c7ef937b8389a19e8d573e167a7b1e0d257ce3fd30a910f35fc7caabdaa80a9f7ff8703e54565bfe264520d9348b7bfba1ee682e3ff1c855f8222ab37a0c00d63b3e97ee176aa4708b0a78c0adeda3272d8a7011d121349854f3c23c1e1b9675d3185989e5a1ad9e9fc3cb7b1385b4ebbd7ca7eed1649373cb6031fdb3f7c1476c45b5b51acc3bbde915ad8986c75aaad75888d60d66cb0460a400df201508e9124e540d4fec91a8f8f2dfa1101f12c1d19b88a78a87333e9086c51ac8d9422256b4bc2969c5d507a786b3cb8980a236367205654d3558910fdb8ae1ed5eead0dd52ff4a1562cdef972a9dea9f7e18db5aee00ca7da820fa6cf772ce408c64ea2bf2abcdea9470b36d3c831caac3f606b3c794897ae2c929e64daf6e161d37676e745d1a892aa67574ada85de171ff81f7a6022d6496c9c86e4af33773bbe02436f61c59cc790c22822479530d48dc9f50059c4eb5090424e59efdd2da545be818a3de5653d11d3dc8c072f2ac7aaa7cd3f042ecccce9d99caa09eadfd1a86e81d28e1d6b322bcc91cbf04e329ea5d42251359027131bd647704e1a023f229229834940beb1bac072c800c31c28f2ee23884ee1f8ede7a22238e40bab050c3c67f1fd12a19f4c90fb871d98b5ef2d8ed00466dd12507dc0fee85b05ea43b651383d1699f47464e6efdad385889c1c61cae2e7225ed3ae30d5c215151261204404e1b5f6ba75680b15c6512847b4915dd470db05f60fb563f7c04bb6328ae99cd8a9091d0e2630028e607f9b15cdd36790137c458273ec81bc83dd58dca62acbf5d177afc49b8d890723420faa9864f8af326e726c290c2689b23e1ac8f2aeaa38ee4801fd856a7927c24b4784df9628065fca00fff63c57c04936b4d9ab7192a74442e974227ccc3dfeb7ad238781628d7855621c87c78b5ec46727fef29c19981bd02716d16a2496fefc48e8ec71a57ac0845652d20b401faefbc2b4c590402fb910ed3c13c7c1ae6ef0a543f653b8142270ea28eac68946fe96f8c831f394433b5fc879e61c5c6249b0f3625fee63d6c0ca87705"}, 0x3f9, 0x0) msgrcv(r0, &(0x7f00000007c0)={0x0, ""/102400}, 0x19008, 0x0, 0x0) [ 287.509004][T14927] loop0: detected capacity change from 0 to 131112 00:56:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:36 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40000004}) epoll_wait(r1, &(0x7f0000000140)=[{}], 0x1, 0x0) 00:56:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0xfc01, 0x6, 0x20c200a2}) 00:56:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x35, 0x0, &(0x7f0000000080)) 00:56:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) syz_io_uring_setup(0x0, &(0x7f0000000080), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000340)) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="05040202c3"], 0xfdef) 00:56:37 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r1 = socket$inet(0x2, 0x3, 0x80000000002) setsockopt$inet_int(r1, 0x0, 0xc8, &(0x7f0000000080), 0x4) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x0) 00:56:37 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000280)={0x1, &(0x7f00000001c0)=[{}]}) [ 288.324866][T14927] EXT4-fs warning (device loop0): ext4_multi_mount_protect:324: MMP startup interrupted, failing mount [ 288.324866][T14927] 00:56:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 00:56:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000000)) 00:56:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004c40)={0x0, 0x0, &(0x7f0000004b80)=[{&(0x7f0000000000)={0x28, 0x2c, 0xd81, 0x0, 0x0, "", [@nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private2}]}]}, 0x28}], 0x1}, 0x0) 00:56:37 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDMKTONE(r0, 0x4b45, 0x10001) 00:56:37 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 00:56:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, 0x0) 00:56:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0xb000000d}) close_range(r1, 0xffffffffffffffff, 0x0) 00:56:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@hci={0x1f, 0x5865, 0x2}, 0x80) [ 288.529943][T15014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 288.531595][T15016] Process accounting resumed 00:56:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 00:56:37 executing program 3: process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 288.579564][T15022] Process accounting resumed [ 288.668579][T15046] Process accounting resumed 00:56:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:38 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2284, &(0x7f0000000300)={0x4, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:56:38 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000440)=0x1e) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 00:56:38 executing program 3: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @rand_addr=' \x01\x00'}}) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000000)=@dstopts={0x0, 0x9, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1, 0x0]}}, @enc_lim, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x58) 00:56:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) 00:56:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) open$dir(&(0x7f0000000340)='./file0/bus\x00', 0xc840, 0x0) acct(&(0x7f0000000000)='./file0/bus\x00') openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7efbb, 0x0) [ 289.404848][T15067] Process accounting resumed 00:56:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000200)=0x8f4, 0x4) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x34000}, "ee06", ['\x00']}, 0x122) 00:56:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\r2x\xc5\x9b\x8c\x9dr\a\x051\xff\x9ci\x88\xae\xee\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0xffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x1000000, 0x4) fcntl$addseals(r1, 0x409, 0x0) 00:56:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) [ 289.468294][T15082] Process accounting resumed 00:56:38 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000200)=0x8f4, 0x4) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x34000}, "ee06", ['\x00']}, 0x122) 00:56:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) 00:56:39 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x7c}, {0x74}, {0x6}]}) pipe(0x0) 00:56:39 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000200)=0x8f4, 0x4) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x34000}, "ee06", ['\x00']}, 0x122) 00:56:39 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\r2x\xc5\x9b\x8c\x9dr\a\x051\xff\x9ci\x88\xae\xee\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0xffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x1000000, 0x4) fcntl$addseals(r1, 0x409, 0x0) 00:56:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@local, 0x0, 0x0, 0x33}}, 0x28}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0xf1, 0x0) 00:56:39 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000200)=0x8f4, 0x4) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f00000003c0)={{0x102, 0x0, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x5865, 0x34000}, "ee06", ['\x00']}, 0x122) 00:56:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/188}, 0xc4, 0x1, 0x1000) msgsnd(0x0, &(0x7f00000003c0)={0x2, "4e5cbf903ab34f75babb38c417be35e14ab6327b493c3eecfbac4c1af68358b0e1700fdf5af63cc645d992c73361609f3b1be38f33fd61501bdeeaf5404b9bad60c29f21832a481c"}, 0x50, 0x800) msgrcv(0x0, &(0x7f0000000540)={0x0, ""/3}, 0xb, 0x1, 0x1000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x5}) [ 290.284605][ T25] audit: type=1326 audit(1622940999.594:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15127 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:56:39 executing program 4: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) capset(&(0x7f0000002ffa)={0x20071026}, 0x0) 00:56:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x3c, 0x0, &(0x7f00000014c0)) 00:56:39 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_test', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x4) 00:56:39 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='security.']) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 290.371936][T15158] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 00:56:40 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='security.']) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 00:56:40 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_test', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x4) [ 291.118795][ T25] audit: type=1326 audit(1622941000.424:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15127 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:56:40 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x272) write(r0, &(0x7f0000000100)="1400000022001f0700e81d08b7142d73419b00ae", 0x14) 00:56:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\r2x\xc5\x9b\x8c\x9dr\a\x051\xff\x9ci\x88\xae\xee\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0xffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x1000000, 0x4) fcntl$addseals(r1, 0x409, 0x0) 00:56:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), r1) mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0) 00:56:40 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_test', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x4) 00:56:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db", 0x22}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x3) 00:56:40 executing program 5: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000140)='system_u:object_r:ifconfig_exec_t:s0\x00', 0x25) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 00:56:40 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000100)='./file0/file1\x00') rmdir(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') 00:56:40 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_test', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f0000000080)={'c', ' *:* ', 'w\x00'}, 0x4) 00:56:40 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="5500000018007f7000fe01b282a280930a60000248a84302910000003900090023001000020000000d0005005071c110aa2ebc37fb696bfe80000720000000000000149b1100b1df13000000fb0000400000000040", 0x55}], 0x1}, 0x0) 00:56:40 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db", 0x22}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x3) 00:56:43 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='security.']) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 00:56:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="38010000100013050000000000000200ac1e0001000000000000000000000000ffffffff00000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa00000000320000002001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xe169a455) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:56:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc65c9ca91e9a868377ce2189dceecd7c7676264c5ea6dc445a7ac14a8c83013eecc66639515db6c2d581af1c0bc19048ff20040b3f7488662896bab845f04dfd21035b90af5e5bca0d19b964302ab249e667705303292adf7a6a4ae5cc704794ce714c1115253f7b54cb22250bf473585cefb6920cd4e261d06c6baf013f3f0a19295178d20c2708d717aafc32fc677e93ed4aad6fa5d695f94d27cc77213d119fa7c", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x36) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:56:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000200)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\r2x\xc5\x9b\x8c\x9dr\a\x051\xff\x9ci\x88\xae\xee\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2', 0x3) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f00000001c0), 0xffff) fcntl$addseals(r1, 0x409, 0x8) lseek(r1, 0x1000000, 0x4) fcntl$addseals(r1, 0x409, 0x0) 00:56:43 executing program 1: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) 00:56:43 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000400)={r5, 0x3, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x2, &(0x7f00000003c0)={r5, 0x3, 0x6, @broadcast}, 0x10) 00:56:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x8) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 00:56:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="000019000000fb"], 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x36, 0x0, 0x0) [ 294.201166][T15267] device lo entered promiscuous mode [ 294.207019][T15264] device lo left promiscuous mode [ 294.218811][T15268] device lo entered promiscuous mode [ 294.224561][T15264] device lo left promiscuous mode 00:56:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x101910b00, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x16b3c18f) 00:56:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db", 0x22}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x3) 00:56:43 executing program 1: r0 = socket(0x10, 0x2, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@updpolicy={0xb8, 0x19, 0x201, 0x0, 0x0, {{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 00:56:43 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d", 0x74}], 0x4, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 294.301044][T15286] EXT4-fs warning (device sda1): ext4_group_extend:1817: will only finish group (524288 blocks, 256 new) [ 294.313264][T15286] EXT4-fs warning (device sda1): ext4_group_extend:1822: can't read last block, resize aborted 00:56:46 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='security.']) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 00:56:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x2010050, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x1, 0x0, 0x0, 0xffffffffffffffff}) 00:56:46 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4008fd, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, "6518dd935c805e25f50b8a77d7f6046f216d5c9d4253e7da122aba86d606e6a262a745ad3916fe3529320a83f8823a53c6720593f62ded7368916af9d4152eeb3daf53fdfece555b263cdbe45bd8964b"}, 0xd8) 00:56:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="38010000100013050000000000000200ac1e0001000000000000000000000000ffffffff00000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa00000000320000002001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xe169a455) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:56:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setresgid(0xee00, 0x0, 0x0) r1 = getpid() r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r0, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r3}}}], 0x20}], 0x1, 0x0) 00:56:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) 00:56:46 executing program 5: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000200)='.\x00', 0x4000304) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x81000200) r2 = inotify_init() r3 = inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x81000200) inotify_rm_watch(r2, r3) 00:56:46 executing program 1: set_mempolicy(0x1, &(0x7f0000000040)=0x3, 0x8) r0 = getpgrp(0x0) clone3(&(0x7f0000000300)={0x28200000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0], 0x1}, 0x58) 00:56:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r1, 0x2, 0x0) 00:56:46 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db", 0x22}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x3) 00:56:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @broadcast}}]}, 0x110) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x3, [{}, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}]}, 0x210) close_range(r1, r2, 0x0) 00:56:46 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') r1 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fchmod(r1, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 00:56:49 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$setstatus(r0, 0xa, 0x0) 00:56:49 executing program 5: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x80000024) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 00:56:49 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000180)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 00:56:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="38010000100013050000000000000200ac1e0001000000000000000000000000ffffffff00000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa00000000320000002001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xe169a455) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:56:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x100000001000}], 0x8010, &(0x7f0000010d00)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) unlink(&(0x7f00000000c0)='./bus\x00') 00:56:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="8a", 0x1}], 0x1, &(0x7f0000000380)=ANY=[], 0x2120}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2004c075) 00:56:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b0918e4972be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7ddc6f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d64415761534dae491de7642a7d78974b7f4d74b318489a614e94675ddf3baa13f06f56f447122955907412c99a75d5cad96de1927b4110783ddf335c84cf628d94714dbce9cca1e056d3c07942d648062f5757664379d9fc2279c4db471dc2f40e9b5c30eb9a1962a53a0fa2584a3928aaae7a4c6fadebf309165430d196e349f75", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 300.225762][ T884] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 300.236989][T15377] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 [ 300.251797][ T884] blk_update_request: I/O error, dev loop3, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 300.263731][T15383] isofs_fill_super: bread failed, dev=loop3, iso_blknum=16, block=32 00:56:49 executing program 5: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000740)=""/4096, 0x1000}], 0x1, 0x0, 0x0) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000700)="5c86c5cd77") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="be9ff483111ec7c05a6e35766a9c5cd98ed812fee8ee677c468e2d01bb01fd560342c1891c9b259ef048c5ac173518e9cd261fa6cbe6a89b00bbcac9c7a8fc13d6d5661f30c63f72be485d2065e695187bb1482dff9c9d341184640629dc64bb37212a404898297b90eb535ba521052c06a3f59c8a96155e941ed41bc723c4062d6dc6418cd0808ff3") ptrace$getregset(0x4204, r0, 0x2, &(0x7f00000005c0)={0x0}) 00:56:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="8a", 0x1}], 0x1, &(0x7f0000000380)=ANY=[], 0x2120}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2004c075) [ 300.268645][T15386] loop2: detected capacity change from 0 to 264192 00:56:49 executing program 5: clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4202, r0, 0x0, 0x0) 00:56:49 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = socket(0x10, 0x80002, 0x0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r2) fchown(r0, 0x0, 0x0) 00:56:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="8a", 0x1}], 0x1, &(0x7f0000000380)=ANY=[], 0x2120}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2004c075) 00:56:49 executing program 0: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) set_mempolicy(0x1, 0x0, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 00:56:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b0918e4972be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7ddc6f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d64415761534dae491de7642a7d78974b7f4d74b318489a614e94675ddf3baa13f06f56f447122955907412c99a75d5cad96de1927b4110783ddf335c84cf628d94714dbce9cca1e056d3c07942d648062f5757664379d9fc2279c4db471dc2f40e9b5c30eb9a1962a53a0fa2584a3928aaae7a4c6fadebf309165430d196e349f75", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="8a", 0x1}], 0x1, &(0x7f0000000380)=ANY=[], 0x2120}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2004c075) [ 300.430740][ T25] audit: type=1400 audit(1622941009.734:183): avc: denied { setattr } for pid=15421 comm="syz-executor.2" name="fscreate" dev="proc" ino=36272 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 00:56:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="38010000100013050000000000000200ac1e0001000000000000000000000000ffffffff00000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000aa00000000320000002001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29"], 0x138}, 0x1, 0x1400000000000000}, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xe169a455) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:56:50 executing program 5: pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, 0x0, 0x4) fcntl$setpipe(r0, 0x407, 0x20ffffd) 00:56:50 executing program 2: r0 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x10) 00:56:50 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu&\n\n00\n\x00\x00\xc8 \xf4\xb3\xca\f\x90|\x1ff\xf0\xd2\x9ba\xdd\xba\x93\xf3\xa2\x97e\xd7\xa37\xc0\xae$\xef\x1f\x1feq*\xeb\x00\xffx\x7fV-W\xeb\x9c\xf5\xe5!d\x99]\x17~\x9e\\\xac\x1f\x93\x00\x00\x00\x80T\"\x00\x00\x00\x00\x05\x00'/89) 00:56:50 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@rand_addr=0x64010102, @empty}, 0xc) 00:56:50 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) setrlimit(0x0, &(0x7f00000001c0)) 00:56:50 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getpgid(0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) sendmmsg$unix(r0, &(0x7f000000ca80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x40}], 0x1, 0x0) 00:56:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38ee5197d561710fb7fef8c44f7b7d9ce423c26f45953cd5303ea9034019a38dc387cf4c2e1fea4b7a3d15134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9268103b66e1d49d31d3220bd2d4ed96a074eb04a348a666bf58b23ac452b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f40bd9e94611", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:56:50 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='asymmetric\x00', 0x0, &(0x7f0000000180)="9b", 0x1, 0xfffffffffffffffc) 00:56:50 executing program 3: select(0x5b, 0x0, &(0x7f0000000480)={0x10}, &(0x7f00000004c0), &(0x7f0000000540)) 00:56:52 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b0918e4972be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7ddc6f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d64415761534dae491de7642a7d78974b7f4d74b318489a614e94675ddf3baa13f06f56f447122955907412c99a75d5cad96de1927b4110783ddf335c84cf628d94714dbce9cca1e056d3c07942d648062f5757664379d9fc2279c4db471dc2f40e9b5c30eb9a1962a53a0fa2584a3928aaae7a4c6fadebf309165430d196e349f75", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:52 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:devlog_t:s0\x00', 0x1e) socket$packet(0x10, 0x0, 0x300) 00:56:52 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 00:56:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) exit(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r1, 0x0, 0x40, &(0x7f0000000040), 0x0) 00:56:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[], 0x44) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 00:56:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x3a, 0x0, 0x0, 0x0) 00:56:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000840)='net/rt6_stats\x00') readv(r0, &(0x7f0000000380)=[{0x0, 0x10000000000000}, {&(0x7f0000000040)=""/32, 0x20}], 0x2) 00:56:52 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:devlog_t:s0\x00', 0x1e) socket$packet(0x10, 0x0, 0x300) 00:56:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') r1 = creat(&(0x7f0000000280)='./file1\x00', 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r2, &(0x7f0000000880)='./file0\x00', 0x4) creat(&(0x7f0000000840)='./file0\x00', 0x101) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[], 0x191) close(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x2af64546, 0x7, &(0x7f0000000680)=[{&(0x7f00000002c0)="e01bdacf368537fd7aca5cc3a0e43afccfcff6affa72b1c4525782edc2716d50dcf6b4c6e5dc777fe0f17579b34ff78264d342e73ec125cf9d162b675f5a3e322e97ff211dedd926d7495ecf931ecea07752301c4d4fa446f0f3a4815cf1b7b5bbce9485de685bdb0ce1d842fab6259b3e8df6218bdc34998284914faeb647fc566a7370f2aa116633814c34c2d53b19dc1f71e1787d8d85795cc084c9d8fd3caeab909f4e5fd120f88f01f3f8670d619cdd98c848b83222caac8add529060f8b74f1ccee9784b", 0xc7, 0x2a0cfb5a}, {&(0x7f00000001c0)="59ebd5cbd2b68ba89a0b833e15c630355247d102a9649d3cd1e7e4381f426bf46018b6051215751def27f71f1f5c", 0x2e, 0x6}, {&(0x7f0000000200)="93f8a52d2353c7ba38e6b136a655f74941d250251a7549af1387bed0fecd97269cf659da71729b594242ffe2b5d1d220e3ebf13e1756031d9a934fe317f08fce", 0x40, 0x6}, {&(0x7f0000000240)="88", 0x1, 0x1}, {&(0x7f00000003c0)="1ff89a33c80c396585bbef58f115c9a89ea3d3dbc918d6aea7060ef17a5a228572489440a98637f2c7cb7bb89802130cf2fadfd9c939805226eb9e9224a8835ce616e651e4fc90b66db4b52c3970918955f6bcdd32575dc4afbd3078c80eb950aa752bea925be03636c24d31b94dd2085631427510a288dfe9f4da9c706d9a506d112853aad86c8ed3e97bfc939412daae36c45f74e7feebf6bee27cc033ff0e9abafb92899e4196dedc5c673f71ccf09a3c6144c910b2e4c072015cb20b4e60e6f5188be0ed2eb359", 0xc9, 0x6}, {&(0x7f00000004c0)="ed70c04cb367324b0919528f2ffc8bacf9e313cb01c9e024f003a1df3a1befcafb1f95bb91897cc12295a1c4bedfa4fd21639f3d003b4002c969bfe4eb0b630dc799c3f7f668f07462558ae607ec877a6cf0fa55c98c8a44fe83fcc3b75f379a05523909b95cd52e742c9ebda0d6c338dc90100b412993bf8554829eb442955d82be5f4520781a5e57e406e64886bf36d046ea615f8e49157a6a8bc4fda776152cb756032d8c1106d2744f4452452a06a2d9b5d4c5bf59d0dc405e4e0c6218abb6a19375876daea7a7b008ecde0c129f5f279385e33ebffb27a56a721c0e92", 0xdf}, {&(0x7f00000005c0)="064ff87bbaf4308829ff1264e8eb211ba012dc78c21e2a9c839a25f8f3806709f0edd54b062ab934ce3b9578195b5736a64711394fa4d700ff3510971fe5b2e601ff675bf702f8f02101df703d84e289a89b1e06d1f57b1b4ce4911908cd615303fb3bb01af58b4002ac4f99e9e8126cb2a087e9135be4d583ae17634ad4c73b27", 0x81, 0x3}], 0x21, &(0x7f00000008c0)={[{@nodots}], [{@dont_hash}, {@obj_user={'obj_user', 0x3d, '\x14`\x00\x01\x17L\xeb_\x02\x935\x1c\xe0\xe0\xcfL\xa3\xafGaf\x8a\x90\x8c\xca\x9e\x90\t7\x94\xf3\xc8\xb1\xbc\xec~\xa6_r?\x99\x9d\xbf<\x8b?q\xad!`.\xe2\xfd\xdd@|u\xbf`\rX\xf7\x904\xb9\xf3\xaa\xe0j\xc7\x84\x945\xa2\xd8..\xba\x0f\xcb\t\xc6\xb0%x\x8cE\x9c@\xab\xcd\x01\xe0[I\x04\a\x91\x9d\a!g\xbd6\x13\xd1\x9d\xb0\x14\xec+\b\xee\xb1c{\'8\x9e\xa3\x81\xe1\x13\x1f\xb6\x01a\'\xe7H\xc7\xcf\xa3\x9e\xde\x18\xcb\xc3\xb2\xc6\x92\x82\xc9\xd42\r\xe8\xbc\x8bI\xd9\td\xbb\x81\xab-\xe5dU\x9a:(\x8b\xc2'}}, {@dont_measure}, {@smackfshat={'smackfshat', 0x3d, '#}@@#'}}, {@fsmagic={'fsmagic', 0x3d, 0x401}}, {@appraise_type}]}) renameat(r3, &(0x7f0000000140)='./file1\x00', r1, &(0x7f0000000180)='./file0\x00') [ 303.471288][ T25] audit: type=1400 audit(1622941012.775:184): avc: denied { create } for pid=15487 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:devlog_t:s0 tclass=netlink_socket permissive=1 00:56:52 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x2}, 0x10) write(r0, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a00000000000000000000000800040000000000", 0x24) 00:56:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000a00)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=0x80, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000380)={0x2, 0x0, @empty}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) 00:56:52 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:devlog_t:s0\x00', 0x1e) socket$packet(0x10, 0x0, 0x300) [ 303.581424][T15513] loop3: detected capacity change from 0 to 264192 [ 303.617053][T15525] PM: suspend entry (deep) [ 303.640713][T15525] Filesystems sync: 0.019 seconds [ 303.652399][T15525] Freezing user space processes ... (elapsed 0.004 seconds) done. [ 303.665479][T15525] OOM killer disabled. [ 303.669602][T15525] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 303.681071][T15525] printk: Suspending console(s) (use no_console_suspend to debug) [ 303.731350][ T1781] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 304.269004][T15525] ACPI: Preparing to enter system sleep state S3 [ 304.269472][T15525] PM: Saving platform NVS memory [ 304.269487][T15525] Disabling non-boot CPUs ... [ 304.273062][T15525] smpboot: CPU 1 is now offline [ 304.278082][T15525] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 304.278145][T15525] ACPI: Low-level resume complete [ 304.278244][T15525] PM: Restoring platform NVS memory [ 304.278252][T15525] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 304.291143][T15525] Enabling non-boot CPUs ... [ 304.291528][T15525] x86: Booting SMP configuration: [ 304.291561][T15525] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 304.291889][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 304.293009][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 304.294740][T15525] CPU1 is up [ 304.294950][T15525] ACPI: Waking up from system sleep state S3 [ 304.410690][T15525] OOM killer enabled. [ 304.411274][T15525] Restarting tasks ... [ 304.421790][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 304.423436][T15525] done. [ 304.423879][ T1034] block loop3: uevent: failed to send synthetic uevent [ 304.428902][T15525] PM: suspend exit [ 304.443798][T15536] PM: suspend entry (deep) [ 304.449596][T15536] Filesystems sync: 0.005 seconds [ 304.451377][T15536] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 304.454011][T15536] OOM killer disabled. [ 304.454656][T15536] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 304.456858][T15536] printk: Suspending console(s) (use no_console_suspend to debug) [ 304.635304][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 305.163990][T15536] ACPI: Preparing to enter system sleep state S3 [ 305.164049][T15536] PM: Saving platform NVS memory [ 305.164052][T15536] Disabling non-boot CPUs ... [ 305.166777][T15536] smpboot: CPU 1 is now offline [ 305.169510][T15536] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 305.169571][T15536] ACPI: Low-level resume complete [ 305.169746][T15536] PM: Restoring platform NVS memory [ 305.169774][T15536] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 305.180569][T15536] Enabling non-boot CPUs ... [ 305.180753][T15536] x86: Booting SMP configuration: [ 305.180756][T15536] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 305.180992][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 305.182095][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 305.183698][T15536] CPU1 is up [ 305.184048][T15536] ACPI: Waking up from system sleep state S3 [ 305.393771][T15536] OOM killer enabled. [ 305.394395][T15536] Restarting tasks ... [ 305.402202][ T1034] synth uevent: /devices/virtual/block/loop2: failed to send uevent [ 305.404478][ T1034] block loop2: uevent: failed to send synthetic uevent [ 305.409157][T15536] done. [ 305.410607][T15536] PM: suspend exit 00:56:55 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e7b126b0918e4972be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7ddc6f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d64415761534dae491de7642a7d78974b7f4d74b318489a614e94675ddf3baa13f06f56f447122955907412c99a75d5cad96de1927b4110783ddf335c84cf628d94714dbce9cca1e056d3c07942d648062f5757664379d9fc2279c4db471dc2f40e9b5c30eb9a1962a53a0fa2584a3928aaae7a4c6fadebf309165430d196e349f75", 0xd1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:56:55 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:devlog_t:s0\x00', 0x1e) socket$packet(0x10, 0x0, 0x300) 00:56:55 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:55 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:56:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003380)={0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000000000)={0x20, 0x68, 0x205, 0x0, 0x0, "", [@nested={0x5, 0x0, 0x0, 0x1, [@generic='e']}, @typed={0x8, 0x9, 0x0, 0x0, @ipv4=@broadcast}]}, 0x20}], 0x1}, 0x0) 00:56:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000a00)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=0x80, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000380)={0x2, 0x0, @empty}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 306.526738][T15551] new mount options do not match the existing superblock, will be ignored [ 306.529552][T15559] PM: suspend entry (deep) [ 306.534139][T15562] new mount options do not match the existing superblock, will be ignored [ 306.541470][T15559] Filesystems sync: 0.010 seconds [ 306.544815][T15559] Freezing user space processes ... (elapsed 0.011 seconds) done. [ 306.557902][T15559] OOM killer disabled. [ 306.558968][T15559] Freezing remaining freezable tasks ... (elapsed 0.002 seconds) done. [ 306.563483][T15559] printk: Suspending console(s) (use no_console_suspend to debug) 00:56:56 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:56 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:56 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative'}}, 0x30}]}) 00:56:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) [ 306.628427][ T4389] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 307.167470][T15559] ACPI: Preparing to enter system sleep state S3 [ 307.167939][T15559] PM: Saving platform NVS memory [ 307.167942][T15559] Disabling non-boot CPUs ... [ 307.171549][T15559] smpboot: CPU 1 is now offline [ 307.175581][T15559] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 307.175642][T15559] ACPI: Low-level resume complete [ 307.175718][T15559] PM: Restoring platform NVS memory [ 307.175726][T15559] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 307.187343][T15559] Enabling non-boot CPUs ... [ 307.188164][T15559] x86: Booting SMP configuration: [ 307.188210][T15559] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 307.188586][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 307.189756][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 307.191367][T15559] CPU1 is up [ 307.191777][T15559] ACPI: Waking up from system sleep state S3 [ 307.331054][T15559] OOM killer enabled. [ 307.331752][T15559] Restarting tasks ... done. [ 307.356072][T15559] PM: suspend exit 00:56:56 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000a00)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=0x80, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000380)={0x2, 0x0, @empty}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 307.365353][T15574] new mount options do not match the existing superblock, will be ignored [ 307.375155][T15576] new mount options do not match the existing superblock, will be ignored [ 307.424549][T15587] new mount options do not match the existing superblock, will be ignored [ 307.428102][T15588] PM: suspend entry (deep) [ 307.442063][T15588] Filesystems sync: 0.013 seconds [ 307.446389][T15588] Freezing user space processes ... (elapsed 0.002 seconds) done. [ 307.450734][T15588] OOM killer disabled. [ 307.451300][T15588] Freezing remaining freezable tasks ... (elapsed 0.002 seconds) done. [ 307.455704][T15588] printk: Suspending console(s) (use no_console_suspend to debug) [ 307.511824][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 308.051969][T15588] ACPI: Preparing to enter system sleep state S3 [ 308.052281][T15588] PM: Saving platform NVS memory [ 308.052285][T15588] Disabling non-boot CPUs ... [ 308.054727][T15588] smpboot: CPU 1 is now offline [ 308.059072][T15588] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 308.059134][T15588] ACPI: Low-level resume complete [ 308.059217][T15588] PM: Restoring platform NVS memory [ 308.059226][T15588] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 308.070495][T15588] Enabling non-boot CPUs ... [ 308.071335][T15588] x86: Booting SMP configuration: [ 308.071348][T15588] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 308.071675][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 308.072812][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 308.074766][T15588] CPU1 is up [ 308.074898][T15588] ACPI: Waking up from system sleep state S3 [ 308.215648][T15588] OOM killer enabled. [ 308.216540][T15588] Restarting tasks ... [ 308.229215][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 308.229563][T15588] done. [ 308.230112][ T1034] block loop3: uevent: failed to send synthetic uevent [ 308.240133][T15588] PM: suspend exit 00:56:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000a00)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=0x80, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) sendto$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, &(0x7f0000000380)={0x2, 0x0, @empty}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz0\x00', 0x200002, 0x0) 00:56:58 executing program 0: clone3(&(0x7f0000000280)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:56:58 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:58 executing program 3: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) 00:56:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000040)='4\xacXrcO\b\xc4ut/e\x00'/28, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c46"], 0x44) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = gettid() tkill(r2, 0x3c) 00:56:58 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000200)='.\x00', 0x2) [ 309.564857][T15600] new mount options do not match the existing superblock, will be ignored [ 309.578003][T15603] PM: suspend entry (deep) [ 309.587878][T15607] new mount options do not match the existing superblock, will be ignored [ 309.592358][T15603] Filesystems sync: 0.012 seconds [ 309.596886][T15603] Freezing user space processes ... (elapsed 0.011 seconds) done. [ 309.609684][T15603] OOM killer disabled. [ 309.610433][T15603] Freezing remaining freezable tasks ... (elapsed 0.002 seconds) done. [ 309.614768][T15603] printk: Suspending console(s) (use no_console_suspend to debug) 00:56:59 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x3, &(0x7f0000000000)=[{0x4c}, {0x44}, {0x6}]}) gettid() [ 309.654600][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 310.203555][T15603] ACPI: Preparing to enter system sleep state S3 [ 310.204166][T15603] PM: Saving platform NVS memory [ 310.204181][T15603] Disabling non-boot CPUs ... [ 310.207841][T15603] smpboot: CPU 1 is now offline [ 310.211664][T15603] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 310.211802][T15603] ACPI: Low-level resume complete [ 310.211884][T15603] PM: Restoring platform NVS memory [ 310.211892][T15603] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 310.223478][T15603] Enabling non-boot CPUs ... [ 310.224290][T15603] x86: Booting SMP configuration: [ 310.224294][T15603] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 310.224505][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 310.225778][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 310.227915][T15603] CPU1 is up [ 310.228115][T15603] ACPI: Waking up from system sleep state S3 [ 310.354206][T15603] OOM killer enabled. [ 310.354791][T15603] Restarting tasks ... done. [ 310.363590][T15603] PM: suspend exit 00:56:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:56:59 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x9d9, 0x40) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001380)={&(0x7f00000001c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, 0x0, 0x0, &(0x7f0000001340)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 00:56:59 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x49, &(0x7f0000000280)="08ac20080dd966953b67480f3a62007c4fab98a907010100d6eca02cdc108ce69ae431c026d5190eb8a104ce5f19cd2ed75fcd792d92ad8696ca0688b72e34c4504ebda20000000000"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:56:59 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f00000002c0)={"668304aae117079f5e767d2761d3be41", 0x0, 0x0, {}, {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1f]}) preadv(0xffffffffffffffff, &(0x7f0000001700)=[{0x0}, {&(0x7f0000001480)=""/177, 0xb1}], 0x2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x1}}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) [ 310.391034][T15615] new mount options do not match the existing superblock, will be ignored [ 310.402060][ T25] audit: type=1326 audit(1622941019.718:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15622 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:56:59 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000140)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000440)={0x0, 0x20000006, 0x0, 0x0, 0xd}) r1 = syz_io_uring_setup(0x6ad5, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x2b66, 0x0, 0x0, 0x0, 0x5e) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/172, 0xac}], 0x1) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:56:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x12, &(0x7f0000000280)={{{@in6=@private0, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@local}, 0x0, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0xe8) 00:56:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1d3, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r3+60000000}}, 0x0) tkill(r1, 0x1004000000016) 00:56:59 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x0, 0x3000000, '\x00', [{0x801, 0x0, 0x3017}, {0x801, 0x0, 0x80000001}]}) 00:56:59 executing program 5: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) close(r0) perf_event_open(&(0x7f00000000c0)={0x1000000002, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_unlink(&(0x7f0000000340)='eth0\x00') 00:56:59 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000440)=""/253, 0xfd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0x40505331, &(0x7f0000000100)) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40a85321, &(0x7f0000000080)) tkill(r0, 0x7) 00:56:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100), 0x2, 0x0) preadv(r1, &(0x7f0000000340)=[{&(0x7f0000000080)=""/35, 0x23}], 0x1, 0x3, 0x0) [ 311.218312][ T25] audit: type=1326 audit(1622941020.538:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15622 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:57:00 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b624e0010020e752a8a041"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 00:57:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d", 0x4e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:57:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000200), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x6c, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x4, 0x7, 'system_u:object_r:logrotate_var_lib_t:s0\x00'}]}, 0x6c}}, 0x0) 00:57:02 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1d3, @time}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc0bc5310, &(0x7f00000003c0)={0x80}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r2+60000000}}, 0x0) tkill(r0, 0x1004000000016) 00:57:02 executing program 0: r0 = socket$inet(0x2, 0x3, 0x9) setsockopt$inet_mreqn(r0, 0x0, 0x22, 0x0, 0x0) 00:57:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@mcast2, 0x3, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 00:57:02 executing program 5: r0 = epoll_create(0xb643) close_range(r0, 0xffffffffffffffff, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000002900)) 00:57:02 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001"], 0x38}, 0x0) 00:57:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x129}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x38, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0x4, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}]}]}, 0x38}}, 0x0) 00:57:02 executing program 5: io_setup(0x7ff, &(0x7f0000000000)=0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) io_submit(r0, 0x2, &(0x7f0000001780)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:57:02 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') syz_io_uring_setup(0x3c6d, &(0x7f0000000100)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, r1}, &(0x7f000004c000/0x2000)=nil, &(0x7f000016e000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000180)) 00:57:05 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a005f0000000024000904000a", 0x11) splice(r0, 0x0, r1, 0x0, 0x1000, 0x0) 00:57:05 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mkdir(&(0x7f0000000040)='./bus\x00', 0x0) symlink(&(0x7f0000000380)='./file1\x00', &(0x7f0000000500)='./bus/file0\x00') mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f0000000000)='./bus\x00') 00:57:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') syz_io_uring_setup(0x3c6d, &(0x7f0000000100)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, r1}, &(0x7f000004c000/0x2000)=nil, &(0x7f000016e000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000180)) 00:57:05 executing program 5: r0 = syz_io_uring_setup(0x533, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f00001f7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x800266f, 0x0, 0x0, 0x0, 0x0) 00:57:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="4f3c0b5ef2ef69a2fab80047d317f9cf3dd3cbcc651d1d3da9a2aec253fcc7d21176c666d0dccd4efa21e11ac6bf56162035eb56713f06d0259454ee08ad56a33c5df2f811e0a6ef50f03bf103c382aadb5fb8c2abe9dacc1399ddda62fc7e04b341c5b0c523e900e403849354113c6eef10189dcd3637ac41509648f38fcb04a9bbae202a251c0befa7", 0x8a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:57:05 executing program 2: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000040)='\x00', 0x0) 00:57:05 executing program 1: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000000000010000040c0002b05500000000000000080003400000000808000340000000000c000200fffffffc0000008100"/60], 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x8000) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x6b, 0x3f, 0x5, 0x0, 0x0, 0x1200, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x5}, 0x4c410, 0x10000, 0x9, 0x0, 0xfffffffffffffffb, 0x7, 0xb7, 0x0, 0xfff, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) ptrace$getenv(0x4201, r1, 0x100000000, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x28, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc", 0x21}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r0, 0x0, 0x24002da8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0xb3b, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x3]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x7, 0x14, "1a56e16451b1e241bff1e21f2b0367a94e8ea9754dfaf1513acf9b6915b92e1c243de31bd38426265a5eb61ccc059d3ea8da4f06978af55734ad98c45e16f59b", "7bbd4db53f675df030fc478e3768e26712c477244bade7d9505b5f2264eb6513", [0x3ff, 0x7db2]}) 00:57:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') syz_io_uring_setup(0x3c6d, &(0x7f0000000100)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, r1}, &(0x7f000004c000/0x2000)=nil, &(0x7f000016e000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000180)) 00:57:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43fc14b460e4", 0x2e}, {&(0x7f00000000c0)="53000900000000000000000000003e0010004d2000000000000040320000000010000000", 0x24}], 0x2) 00:57:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) 00:57:05 executing program 5: r0 = syz_io_uring_setup(0x533, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f00001f7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x800266f, 0x0, 0x0, 0x0, 0x0) 00:57:05 executing program 0: ustat(0x1, &(0x7f0000000080)) 00:57:05 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') syz_io_uring_setup(0x3c6d, &(0x7f0000000100)={0x0, 0x0, 0x26, 0x0, 0x0, 0x0, r1}, &(0x7f000004c000/0x2000)=nil, &(0x7f000016e000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000180)) 00:57:05 executing program 5: r0 = syz_io_uring_setup(0x533, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f00001f7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x800266f, 0x0, 0x0, 0x0, 0x0) 00:57:05 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x4, 0x1, 0x401}, 0x14}}, 0x0) 00:57:05 executing program 0: timer_create(0x2, 0x0, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_gettime(0x0, &(0x7f0000000080)) 00:57:05 executing program 5: r0 = syz_io_uring_setup(0x533, &(0x7f0000000040), &(0x7f0000ffc000/0x1000)=nil, &(0x7f00001f7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) setuid(0x0) io_uring_enter(r0, 0x800266f, 0x0, 0x0, 0x0, 0x0) 00:57:05 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0x40485404, 0x0) [ 316.656837][T15793] loop7: detected capacity change from 0 to 1036 [ 316.678858][T15793] loop_set_status: loop7 () has still dirty pages (nrpages=64) 00:57:06 executing program 1: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000000000010000040c0002b05500000000000000080003400000000808000340000000000c000200fffffffc0000008100"/60], 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x8000) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x6b, 0x3f, 0x5, 0x0, 0x0, 0x1200, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x5}, 0x4c410, 0x10000, 0x9, 0x0, 0xfffffffffffffffb, 0x7, 0xb7, 0x0, 0xfff, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) ptrace$getenv(0x4201, r1, 0x100000000, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x28, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc", 0x21}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r0, 0x0, 0x24002da8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0xb3b, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x3]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x7, 0x14, "1a56e16451b1e241bff1e21f2b0367a94e8ea9754dfaf1513acf9b6915b92e1c243de31bd38426265a5eb61ccc059d3ea8da4f06978af55734ad98c45e16f59b", "7bbd4db53f675df030fc478e3768e26712c477244bade7d9505b5f2264eb6513", [0x3ff, 0x7db2]}) 00:57:06 executing program 2: keyctl$restrict_keyring(0x1d, 0xffffffffffffffff, 0x0, 0x0) 00:57:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000040)={0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCL_SETSEL(r0, 0x5609, &(0x7f0000000000)={0x2, {0x3, 0x7}}) 00:57:06 executing program 4: io_setup(0x7702, &(0x7f0000000000)=0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x3ff, r1, 0x0, 0x0, 0x0, 0x0, 0x2}]) 00:57:06 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000440)=""/253, 0xfd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0xa9}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f00000001c0)={{0x1f}, 'port0\x00'}) close(r1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x7) 00:57:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f00000000c0)) [ 316.719483][T15770] blk_update_request: I/O error, dev loop7, sector 512 op 0x0:(READ) flags 0x80700 phys_seg 10 prio class 0 00:57:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 316.774900][T15823] loop7: detected capacity change from 0 to 1036 00:57:06 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000200)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='sit0\x00', 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) 00:57:06 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000400)='L', 0x1) tee(r3, r2, 0x3, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:57:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/pm_freeze_timeout', 0x3001, 0x0) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x1a) 00:57:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="395b07000000946843321a"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0xe) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 00:57:06 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x2, 0x80802, 0x0) shutdown(r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x40002000}) ppoll(&(0x7f0000000580)=[{r0}], 0x1, &(0x7f00000005c0), 0x0, 0x0) 00:57:06 executing program 1: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000000000010000040c0002b05500000000000000080003400000000808000340000000000c000200fffffffc0000008100"/60], 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x8000) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x6b, 0x3f, 0x5, 0x0, 0x0, 0x1200, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x5}, 0x4c410, 0x10000, 0x9, 0x0, 0xfffffffffffffffb, 0x7, 0xb7, 0x0, 0xfff, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) ptrace$getenv(0x4201, r1, 0x100000000, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x28, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc", 0x21}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r0, 0x0, 0x24002da8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0xb3b, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x3]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x7, 0x14, "1a56e16451b1e241bff1e21f2b0367a94e8ea9754dfaf1513acf9b6915b92e1c243de31bd38426265a5eb61ccc059d3ea8da4f06978af55734ad98c45e16f59b", "7bbd4db53f675df030fc478e3768e26712c477244bade7d9505b5f2264eb6513", [0x3ff, 0x7db2]}) 00:57:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="6d706f6c3d70723d408f2627c99a49f178413a4e2d35"]) [ 316.860248][T15823] loop7: detected capacity change from 1036 to 1030 00:57:06 executing program 2: r0 = epoll_create1(0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x1a3142) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x80000004}) epoll_wait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0) 00:57:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x14, 0x0, 0x0, 0x100000}, {0x2d}, {0x6}]}) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000940)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, 0x0}, 0x20008000) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x7ffffff7) [ 316.902217][T15854] tmpfs: Bad value for 'mpol' [ 316.906940][T15863] tmpfs: Bad value for 'mpol' [ 316.945998][T15856] loop7: detected capacity change from 0 to 1036 00:57:06 executing program 2: rt_sigprocmask(0x2, &(0x7f0000000000), &(0x7f0000000040), 0x8) 00:57:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000c40)={0x14, 0x12, 0x1, 0x0, 0x0, "", [@generic='!']}, 0x14}], 0x1}, 0x0) 00:57:06 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="c563b94cb9b85b133ad775"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 316.969120][ T25] audit: type=1326 audit(1622941026.287:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15874 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 317.033781][T15856] loop7: detected capacity change from 1036 to 1030 00:57:06 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb39", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:57:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_cred(r0, 0x1, 0x2f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff}, 0xc) 00:57:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x2061dff5) 00:57:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = signalfd4(r0, &(0x7f0000000180)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={0x0}, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xd, r2, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x1f4) socket$inet_icmp(0x2, 0x2, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x200004) sendfile(0xffffffffffffffff, r3, 0x0, 0x80001d00c0d0) setsockopt$inet6_int(r3, 0x29, 0x3, &(0x7f00000001c0)=0x7, 0x4) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) munlock(&(0x7f0000b53000/0x4000)=nil, 0x4000) r4 = syz_mount_image$msdos(&(0x7f0000000480), &(0x7f0000000000)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000180)=[{&(0x7f0000000040)="040800010000ff01e66174000410090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000540)=ANY=[]) creat(0x0, 0x0) fstatfs(r4, &(0x7f0000000200)=""/131) 00:57:06 executing program 1: sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x20000000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) sendmsg$NFQNL_MSG_VERDICT_BATCH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="3c0000000000010000040c0002b05500000000000000080003400000000808000340000000000c000200fffffffc0000008100"/60], 0x3c}, 0x1, 0x0, 0x0, 0x41}, 0x8000) ptrace$cont(0x18, 0x0, 0x0, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x6b, 0x3f, 0x5, 0x0, 0x0, 0x1200, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x31, 0x0, @perf_config_ext={0x5}, 0x4c410, 0x10000, 0x9, 0x0, 0xfffffffffffffffb, 0x7, 0xb7, 0x0, 0xfff, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x3) ptrace$getenv(0x4201, r1, 0x100000000, &(0x7f00000000c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x28, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000840)="16884896426f2eead5b120e784fbc47c08d686b142c814c72f0edace1bafc2d7cc", 0x21}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(r0, r0, 0x0, 0x24002da8) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000940)={0x0, {}, 0x0, {}, 0xb3b, 0x0, 0x0, 0x1, "1dcc79dc871c727f5161ac2a8e4cc9840bf9758bd451be073ffc9a88295eb61f59ed7b505b740380e9e52408f09a3a51eb40921a93b564681049851448ebb8ba", "3ffc41dee2559d50df9129b097ffb6a24732ffe375f19b9d3e5ca6831952a1c9", [0x0, 0x3]}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000380)={0x0, {}, 0x0, {}, 0x3, 0xa, 0x7, 0x14, "1a56e16451b1e241bff1e21f2b0367a94e8ea9754dfaf1513acf9b6915b92e1c243de31bd38426265a5eb61ccc059d3ea8da4f06978af55734ad98c45e16f59b", "7bbd4db53f675df030fc478e3768e26712c477244bade7d9505b5f2264eb6513", [0x3ff, 0x7db2]}) 00:57:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x2061dff5) 00:57:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) shutdown(r0, 0x0) [ 317.158511][T15911] loop7: detected capacity change from 0 to 1036 [ 317.228750][T15911] loop7: detected capacity change from 1036 to 1030 [ 317.801588][ T25] audit: type=1326 audit(1622941027.117:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=15874 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:57:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 00:57:07 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f00000005c0)=@ethtool_per_queue_op={0x4b, 0x1}}) 00:57:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x2061dff5) 00:57:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb39", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:57:07 executing program 3: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) ftruncate(r0, 0x1000000) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000500)=""/24, 0x18}], 0x1, 0x8000000, 0x0) 00:57:07 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0x0) getdents(r0, &(0x7f0000000400)=""/216, 0xd8) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) dup3(r1, r0, 0x0) 00:57:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0xe59, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f000051c000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f00000ad000/0x4000)=nil, 0x4000}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:57:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in=@loopback, 0x0, 0x32}, @in6=@mcast2}, 0x2}}, 0xf8}}, 0x0) 00:57:07 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCFLSH(r0, 0x5405, 0x2061dff5) 00:57:07 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000000)={0x0, 0x8, 0x4}) 00:57:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={@remote, @local, @private1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20c200a2}) 00:57:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000001c0)={0x2, {0x2, 0x0, 0x404}}) [ 317.903360][T15952] new mount options do not match the existing superblock, will be ignored [ 317.919686][T15952] new mount options do not match the existing superblock, will be ignored 00:57:07 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x2000, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0xffffffffffffffff}) msgsnd(r0, &(0x7f0000000080)={0x2}, 0x8, 0x0) msgctl$IPC_RMID(r0, 0x0) 00:57:07 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x80, 0x8, 0x6}) 00:57:07 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="0201a5ffffbf0a000000ff45ac0000ffffffbf000800000000000000024000ffffff82ffffffe10000008877007200300700630007bb070000000000000055aa", 0x40, 0x1c0}]) [ 318.039449][T15987] loop3: detected capacity change from 0 to 1 [ 318.089069][T15987] loop3: p1 p2 p3 [ 318.090019][T15987] loop3: p1 start 10 is beyond EOD, truncated [ 318.091304][T15987] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 318.094125][T15987] loop3: p3 start 225 is beyond EOD, truncated [ 318.165353][T15987] loop3: detected capacity change from 0 to 1 [ 318.219122][ T1034] loop3: p1 p2 p3 [ 318.219908][ T1034] loop3: p1 start 10 is beyond EOD, truncated [ 318.220923][ T1034] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 318.222594][ T1034] loop3: p3 start 225 is beyond EOD, truncated [ 318.224072][T15987] loop3: p1 p2 p3 [ 318.224714][T15987] loop3: p1 start 10 is beyond EOD, truncated [ 318.225584][T15987] loop3: p2 size 1073872896 extends beyond EOD, truncated [ 318.226973][T15987] loop3: p3 start 225 is beyond EOD, truncated 00:57:10 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb39", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:57:10 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000140)='h', 0x1, 0x100000001}, {&(0x7f0000000300)='D', 0x1}], 0x0, 0x0) 00:57:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/244, 0xf4}], 0x1) 00:57:10 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x21, 0x0, &(0x7f0000ffc000/0x4000)=nil) 00:57:10 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='comm\x00') ftruncate(r0, 0x4) ftruncate(r0, 0x10000) 00:57:10 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x6, 0xe, &(0x7f00000000c0)={@local}, 0x14) 00:57:10 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x1b4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x4a}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000200)='./file0\x00') 00:57:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/244, 0xf4}], 0x1) 00:57:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 00:57:10 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{0x20, 0x0, 0x0, 0x200}, {0x6}]}) [ 320.923000][T16018] loop2: detected capacity change from 0 to 264192 00:57:10 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/244, 0xf4}], 0x1) 00:57:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f00000000c0)={0x14, 0x1b, 0x1, 0x0, 0x0, "", [@nested={0x4}]}, 0x14}], 0x1}, 0x0) 00:57:13 executing program 3: signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$vcsn(&(0x7f00000015c0), 0x5, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) eventfd(0x0) unshare(0x400) select(0x40, &(0x7f0000002180), 0x0, &(0x7f0000002200)={0x1cf}, 0x0) 00:57:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000080)="390000001300034700bb25e1c3e4ffff06000000010000004500000025000000190010c00500000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 00:57:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000200)='./file0\x00') 00:57:13 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb39", 0x44}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:57:13 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sysvipc/shm\x00', 0x0, 0x0) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000040)=""/244, 0xf4}], 0x1) 00:57:13 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b6253df21b33eb5b4de112"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:57:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000200)='./file0\x00') 00:57:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000200)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f00000001c0)=0x8, 0x4) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) 00:57:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(0x0, 0x0) 00:57:13 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000200)='./file0\x00') 00:57:13 executing program 2: clone3(&(0x7f0000000580)={0x140000500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8941, 0x0) [ 323.973226][T16064] netlink: 'syz-executor.2': attribute type 16 has an invalid length. 00:57:16 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) 00:57:16 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b6253df21b33eb5b4de112"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:57:16 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) io_setup(0xffff, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001800)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 00:57:16 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000280)={'\x00', 0x0, 0x8d3, 0xffff}) 00:57:16 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) set_mempolicy(0x1, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 00:57:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x8000000022105, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) setreuid(0xee01, 0x0) 00:57:16 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) 00:57:16 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="a24b000200cca763ca7972"], 0xe8}}, 0x0) clone(0x80900500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102381, 0x18fed}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:16 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) 00:57:16 executing program 4: r0 = syz_io_uring_setup(0x2519, &(0x7f0000000480), &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000500), &(0x7f0000000540)) syz_io_uring_setup(0xc98, &(0x7f0000000600)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000feb000/0x13000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) [ 327.012845][T16119] blktrace: Concurrent blktraces are not allowed on sg0 00:57:16 executing program 0: msgsnd(0x0, 0x0, 0x8, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1, "e54100fb082f6b7f2f705b8fe55e1c2a9342e8fceb2c01dae181070133316a642fc4515836a8f3a4b22b376681dea7134dbb17f129b91accf29a6b61c8ed5c3b83140d463c281f6830e26e19da4f719fcb818e8d917b964eda0f3fa4b3be4d36a2726a41db7ae053c5432afeaadef0b814fc9e1739e6de29aad9b2e4704d9af799e2f919166c9e5ccea8d46832de511f25a32581406c8a26b33b73862872c1706bddd8d89161f81a12ac0888785ce1bdb39210c1cfc9967fe00b04d5d684ddca3b59e81d5fbd20ab02eec618429ac950fa0db59d7453c828e56c803bbfdc1fd3f91b5441c7a9c5d506721393a9cff0f10969c3485b79a1bd323c1ca1c7ef937b8389a19e8d573e167a7b1e0d257ce3fd30a910f35fc7caabdaa80a9f7ff8703e54565bfe264520d9348b7bfba1ee682e3ff1c855f8222ab37a0c00d63b3e97ee176aa4708b0a78c0adeda3272d8a7011d121349854f3c23c1e1b9675d3185989e5a1ad9e9fc3cb7b1385b4ebbd7ca7eed1649373cb6031fdb3f7c1476c45b5b51acc3bbde915ad8986c75aaad75888d60d66cb0460a400df201508e9124e540d4fec91a8f8f2dfa1101f12c1d19b88a78a87333e9086c51ac8d9422256b4bc2969c5d507a786b3cb8980a236367205654d3558910fdb8ae1ed5eead0dd52ff4a1562cdef972a9dea9f7e18db5aee00ca7da820fa6cf772ce408c64ea2bf2abcdea9470b36d3c831caac3f606b3c794897ae2c929e64daf6e161d37676e745d1a892aa67574ada85de171ff81f7a6022d6496c9c86e4af33773bbe02436f61c59cc790c22822479530d48dc9f50059c4eb5090424e59efdd2da545be818a3de5653d11d3dc8c072f2ac7aaa7cd3f042ecccce9d99caa09eadfd1a86e81d28e1d6b322bcc91cbf04e329ea5d42251359027131bd647704e1a023f229229834940beb1bac072c800c31c28f2ee23884ee1f8ede7a22238e40bab050c3c67f1fd12a19f4c90fb871d98b5ef2d8ed00466dd12507dc0fee85b05ea43b651383d1699f47464e6efdad385889c1c61cae2e7225ed3ae30d5c215151261204404e1b5f6ba75680b15c6512847b4915dd470db05f60fb563f7c04bb6328ae99cd8a9091d0e2630028e607f9b15cdd36790137c458273ec81bc83dd58dca62acbf5d177afc49b8d890723420faa9864f8af326e726c290c2689b23e1ac8f2aeaa38ee4801fd856a7927c24b4784df9628065fca00fff63c57c04936b4d9ab7192a74442e974227ccc3dfeb7ad238781628d7855621c87c78b5ec46727fef29c19981bd02716d16a2496fefc48e8ec71a57ac0845652d20b401faefbc2b4c590402fb910ed3c13c7c1ae6ef0a543f653b8142270ea28eac68946fe96f8c831f394433b5fc879e61c5c6249b0f3625fee63d6c0ca87705"}, 0x3f9, 0x0) msgrcv(0x0, &(0x7f00000007c0)={0x0, ""/102400}, 0x19008, 0x0, 0x0) 00:57:16 executing program 2: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/pm_test', 0x0, 0x0) finit_module(r0, 0x0, 0x0) 00:57:16 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) [ 327.130653][ T25] audit: type=1400 audit(1622941036.446:189): avc: denied { module_load } for pid=16140 comm="syz-executor.2" path="/sys/power/pm_test" dev="sysfs" ino=108 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=system permissive=1 00:57:19 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b6253df21b33eb5b4de112"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:57:19 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000000)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) dup2(r0, r1) 00:57:19 executing program 0: msgsnd(0x0, 0x0, 0x8, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1, "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"}, 0x3f9, 0x0) msgrcv(0x0, &(0x7f00000007c0)={0x0, ""/102400}, 0x19008, 0x0, 0x0) 00:57:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@delsa={0x34, 0x11, 0x3, 0x0, 0x0, {@in6=@remote, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 00:57:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, [{}]}, 0x78) 00:57:19 executing program 0: msgsnd(0x0, 0x0, 0x8, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1, "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"}, 0x3f9, 0x0) msgrcv(0x0, &(0x7f00000007c0)={0x0, ""/102400}, 0x19008, 0x0, 0x0) 00:57:19 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0), 0x7a4, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 00:57:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x7, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) 00:57:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x56, &(0x7f0000000200)="8d31ca171569b4621a56e28c5b78376e18cd3d3dfcb946cf885a2153c6309a0c4a000000004ac13870b2beaa344dc69190f8f2802fab69347b9a915308c4829b4b43353c485f8bb2967c539e2e7bb785bf47c79a75cc"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:57:19 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1d3}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x2, {0xffffffffffffffff}}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r3+60000000}}, 0x0) tkill(r0, 0x1004000000016) 00:57:19 executing program 0: msgsnd(0x0, 0x0, 0x8, 0x0) msgsnd(0x0, &(0x7f00000003c0)={0x1, "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"}, 0x3f9, 0x0) msgrcv(0x0, &(0x7f00000007c0)={0x0, ""/102400}, 0x19008, 0x0, 0x0) 00:57:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x7, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) 00:57:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) [ 330.120763][ T25] audit: type=1326 audit(1622941039.436:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.184826][ T25] audit: type=1326 audit(1622941039.436:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=85 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.218059][ T25] audit: type=1326 audit(1622941039.436:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.244514][ T25] audit: type=1326 audit(1622941039.436:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=86 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.269151][ T25] audit: type=1326 audit(1622941039.436:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.269663][ T25] audit: type=1326 audit(1622941039.436:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=189 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.318082][ T25] audit: type=1326 audit(1622941039.436:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.318181][ T25] audit: type=1326 audit(1622941039.436:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 330.318205][ T25] audit: type=1326 audit(1622941039.436:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16172 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:57:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x26ba, &(0x7f0000000180)={0x0, 0x80000000, 0x18}, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000000200), &(0x7f0000000340)) 00:57:22 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1d3}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x2, {0xffffffffffffffff}}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r3+60000000}}, 0x0) tkill(r0, 0x1004000000016) 00:57:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x7, &(0x7f0000001380)) 00:57:22 executing program 1: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="b6253df21b33eb5b4de112"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:57:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) 00:57:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x7, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) 00:57:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) 00:57:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x7, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) creat(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) 00:57:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000043001f000307f4f9002304000204f55f08000100020100020800038005000000", 0x24) 00:57:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000440), 0x3, 0x0) fcntl$setstatus(r2, 0x4, 0x2400) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000004c0)) [ 333.063025][ T25] kauditd_printk_skb: 11 callbacks suppressed [ 333.063035][ T25] audit: type=1326 audit(1622941042.376:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:57:22 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='system_u:object_r:gpg_helper_exec_t:s0\x00', 0x27) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) 00:57:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 333.177294][ T25] audit: type=1326 audit(1622941042.376:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.208207][ T25] audit: type=1326 audit(1622941042.376:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=85 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.250989][ T25] audit: type=1326 audit(1622941042.376:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.282458][ T25] audit: type=1326 audit(1622941042.376:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.306838][ T25] audit: type=1326 audit(1622941042.376:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=86 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.331089][ T25] audit: type=1326 audit(1622941042.376:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.355414][ T25] audit: type=1326 audit(1622941042.376:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.379868][ T25] audit: type=1326 audit(1622941042.376:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=189 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 333.404619][ T25] audit: type=1326 audit(1622941042.376:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16215 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:57:25 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:57:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x31]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r2, r3, 0x0, 0x800000080004105) 00:57:25 executing program 5: r0 = socket(0x1, 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 00:57:25 executing program 0: unshare(0x44000200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="24000000200007041dfffd946f610500020000001f00000000000800050016000400ff7e", 0x24}], 0x1}, 0x0) 00:57:25 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1d3}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x2, {0xffffffffffffffff}}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r3+60000000}}, 0x0) tkill(r0, 0x1004000000016) 00:57:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004300)=[{&(0x7f0000000140)={0xe88, 0x0, 0x0, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @nested={0x1b9, 0x0, 0x0, 0x1, [@generic="1adffd83992f7c454f8ce925e80125506642a8d34130365d54c2140013ae591428b9a9729952d1935097125c4f8ccdbce865e5ecb10c8606a5199ac1320e4a44bff218dd4105de96b317400320d76c842b52490ab824b5f3eee3561705b13ac368a4ab396f027b028551a3c8906d2d401ae660", @generic="30a49c866d94a3fc685a2e5d0b942bcf161e259b7c2c116ff81886cbfcc8d4f98dffd8e22ea53d931e91f52133a2082ce78054deb5798c95ff38f6ebbace1c254e4f5db6111510cec6d4334668e9c07e1b442481699e534cd1aa0172cf9b", @generic="926628bf41e5a3d9090b3b4eed86fcc0a76cb88dc9d11e70c83f012755f48d203a2f5536b55674129b613d19a7f7c6a95dbc6c38a56d96eb011d", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private}, @generic="16e994b5c5b2075c128c8e77023f06c661566c030e01b6f794f55b5b2812ee8dac8002a2dac5c4f14c0216e6643631e0a265afa3651495ffddaca304b9553fc46fc6bc510df6c8f0cba0b37966417ce808796981723605616c99cc857a7088bcc7dffe7b7ba069b649483b7776303d1bf2d3f546cf3672ab4933aefb42eef1270fb22b47aec22275036a1423950c7eb913277485cb2deb37b5db98bcff2237b2299e"]}, @typed={0x8, 0x0, 0x0, 0x0, @uid}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @nested={0xc9d, 0x0, 0x0, 0x1, [@generic="bb0b9859e247533f719858a528f0fb4b9a3a78c5d34963f667d4b640581c809949c65d2918b96db46b64c9cf677560869d1e39bda2093b414ab75bec0a77e7c368828b352a32b36cb6eb75bbd0a5b7edb113867d9cedfa498f126cf367336eb90bbdca710d73bdfcb76aa8f54f849cbbe4d45a31b29e8198e4c9c2d493dc433132aa325497", @generic="fdd5db66c5d6c60b3ff1c2a02122312b65f5d7e1e1b993aec9b7f4487f5e3f8067afb4d3147a8bd5cb92abdb775f2e3ee698ad8473fc8f73cceca20ba4e9a6851d05d5da37a81efd50bc21f61693e4b6b2872a389d6fba5be9fb6c83c3aa33df7561f249d4c592823b5960a4fe3a1b635118992a5e3b00ade42d70b33ab22e9f7cfa2a7099fc46b74d0abc600f5d1ffbf05f6c93bdd1f2d4bb74a623e8f3cbfd34a0db013aea317cfe11bcac583724b40db63dd550", @generic="0faf2bfe7d02650a68d4f7b1f9edcd43b95c503d898df6a8c0a2be26f2ad79361469f008f0c7b51b86682a0b8bf803ca95c39f7e7d554555400c6195990f43bc7926d6fab6aaa0fd7b5ba4fba06572d176989ff25cba68a32f76b790f6a3d5ae4b0ecc8d2568472f74c3508d96879edbf36f967ccec63a116d5cdc02bea6c05af8d27ba6ecc1f9eddd0d808fb78ddab5de32e7d131a842923af3c590e8a956c813fe8e3f5e9ca2acbf5f18de38811e28c6e52adbaa27", @generic="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"]}]}, 0xe88}, {&(0x7f0000003c00)={0x28, 0x2e, 0x1, 0x0, 0x0, "", [@generic="b1884c7bbfa4390e963cf4adaf8747ad5dd62ed31f"]}, 0x28}, {&(0x7f0000003f00)={0x14, 0x17, 0x1, 0x0, 0x0, "", [@typed={0x4, 0x0, 0x0, 0x0, @binary}]}, 0x14}], 0x3}, 0x0) 00:57:25 executing program 5: futex(&(0x7f0000000000), 0x8b, 0x1, &(0x7f00000000c0), 0x0, 0x0) 00:57:25 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)={[{@fat=@time_offset={'time_offset', 0x3d, 0x80000000000023}}]}) 00:57:25 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d40)={0x3c, r3, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x10, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0x9, 0xe150}]}]}]}, 0x3c}}, 0x0) 00:57:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)={0x14, r1}, 0x14}, 0x8}, 0x0) [ 336.094352][T16275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16275 comm=syz-executor.1 [ 336.107187][T16275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=16275 comm=syz-executor.1 [ 336.120068][T16275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:57:25 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x38, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x25}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x38}}, 0x0) 00:57:25 executing program 3: unshare(0x60400) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCMBIS(r0, 0x5416, 0x0) 00:57:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:57:26 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x803, &(0x7f0000000040)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fallocate(r0, 0x3, 0x0, 0x3ff800) 00:57:26 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) writev(r0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000140)="11", 0x1}], 0x2) 00:57:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:26 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x1d3}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x0, 0x2, {0xffffffffffffffff}}) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, r3+60000000}}, 0x0) tkill(r0, 0x1004000000016) 00:57:26 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 00:57:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:26 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f000001a000/0x4000)=nil, 0x4000, 0x600fb01, 0x2012, r0, 0x0) 00:57:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:26 executing program 5: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x82082, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/tty/drivers\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x14) 00:57:26 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="7d2090d195508be35b471eff6c4c098619b5b0", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:26 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000003a40)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f00000001c0), 0x4) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[], 0xfffffecc) setsockopt$inet_int(r2, 0x0, 0xb, &(0x7f0000000180)=0x6, 0x4) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 00:57:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:57:27 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)='rpc_pipefs\x00', 0x10001, 0x0) faccessat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) 00:57:27 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:27 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:27 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:29 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 00:57:29 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000685000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) 00:57:29 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:29 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:57:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000d, 0x12, r1, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000000480)) 00:57:29 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000685000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) 00:57:29 executing program 2: r0 = epoll_create1(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 00:57:29 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) [ 340.013913][T16417] 9pnet: Insufficient options for proto=fd 00:57:29 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42441) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x96ebc11762d40057}) 00:57:29 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000002c80)='/sys/devices/system', 0x0, 0x0) fremovexattr(r0, &(0x7f0000002cc0)=@known='user.incfs.id\x00') 00:57:29 executing program 3: r0 = socket(0x1, 0x2, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)={0x40000013}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x40000004}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x40000013}) [ 340.098102][T16433] 9pnet: Insufficient options for proto=fd 00:57:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000007440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f00000055c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 00:57:32 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000002000000ffffffff00000000000000000000000000000000000000a76afcc7e7105176000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bea00000000f1fffffffffff7ff0000000000000002000000020000007f000001000000000000000000000000000000000000000000000000000000000000000020870000000000001d000000000000000000000000cc15000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000002"], 0x190) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8918, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 00:57:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "8c23ba0362e888bb"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0xffffffff, 0x0, 0x0, 0xffffffff, 0x0, "f655605e1ad466dc8100000000000000cebf73"}) 00:57:32 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000685000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) 00:57:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 00:57:32 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x40000000) 00:57:32 executing program 3: r0 = eventfd2(0x0, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) shmget(0x1, 0x4000, 0x1362, &(0x7f0000ff9000/0x4000)=nil) 00:57:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = dup(r0) sendmmsg(r2, &(0x7f0000008f40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000280)="1139212b33a8e9528c83df962412eb1d5668a1c27978c86f9156fa50220bc509324dc5f0da3628f2d599b2ef34f9e60cf0ba2ef75bd077aa659b8ba71cc125d081efe394a27ec2482953d1820e145eeacbdafe8098836c2cc4d02d4f2eae334ddaec395d17a3a6a72887977b0b8ce71da1a49ced1c497e9d4c31d27b393b220cddea354401716a00171f2725ef74bca9ebf25c9d700306a1cd6c398ea7fc6e97b24115bb241a7a265c2c0b5143c3c062afd5a40e654dc322773b", 0xba}, {&(0x7f0000000340)="2b36d8831305cdbe35af063c596ecccb45598393f39e8a9d6d8966fe016ae649a4055ab41ce52bbfe4f55e86a58dcd3cb83ad0d41cb8f2c76c1bb084b416906eaf8fd5431795c725b6ea2faf58486bd0186ecfef1cbebb87dd3e6f27e2c34b3f21e5058adff2e16b628f113c5e85fc1ed2f00283950d686725060b0b5a407595f97e81aed5def5638b333354f568de51624c8fa72ed8d433a6", 0x99}, {&(0x7f0000000400)="35ffd6f2879a89b6ac4827f151946200f7d2897ba92c71f2331bb02cfc7cdb2e40c44a67e594781b33ea218b15e131bc9d5da3d64eab3d78f061a0bb919ac4e669ca12a727806e2cff556e74c8ae18e8ce4f61e6899e0cf6b10edadaa9785f5a4fed6dbb22cdb76875d84464bb381950e66094130f124ed8801ea2d560c0c64aa6ad641d15e72c023196fcbff8c32c78ab33647356e07acd5b4f4ad09ff3272267c93d02000b61dff1f3cbbd5fa7760392e08d1e40b4aaaa214e0eeed89c06c6c546f7dff4f79470b653dc51c9c2c891d7f03dfc3cacd25bf6a0f0e7aaf456717b4ba29f7b395edc49225c1e9a5849c2a3dc1fe61f21dd07c4dcbbdf8025551f40c792c53d1c5dc9c9590c7d1cf8b19044cc23e9dda5f1f2586fc19fbac026b9fb48f49541b25ebfb723f6e654ef5275e030f8444ef284324a2b46f202bf47cd47457965fc1e2c2c5c84041f7ddac317b7ecd92706124b492a7fedf2e0f573e9161e7d1019d779f8300e257d8151a0e6f2cbf9faa3406e5c0563f48de259844a22629ad0361bf0380dc520143f61d7e672cc9dd8d9bed31f5fce06ffc6999098b239da61e2ee93bce21674644ac54f542eb90d01c363bb3783ff581980811eb2eb787ab9551838bdafee0c449eded85f3492123d38778b870e41f049da2fc0cafcbe3ae1029760ee40215fd5dd097afcff49875ada4b0e7b943ce9c9394addfdd9334acf75f464f49c8b0272caafd4ad67ab98aa330d0c798784e1e9bc8b209454900b45cfe22fd0e539da242fcbfd843ef766c7854335f4cc1f8b1bec5ffaacb555c6f2c2d0a05a10408fd22636143c362597dbb18bc55a0531b7aa438a3ff9178ede61c190c8f89151713e8643f66abb9f99263c8bc9ac13e03b22f95d7fe1ab3c32df8e1b5ba24626ee0a6f141522a7c638e87b7394e09aae80b1ae044740b18474c45848ead275ce42cfaedf815fe7131f64ffeee445cabcf11edda9209f429b7530ce7acb310fc76414519ad10512808c89cca3f1b9dc52c46d0464297f0d98b02725657abc1d0a00e80c07a86cfd603291c27c64bc3e8bf2ffc8042ce2c53c4c88663b2bff6e60f94970b04e70de66528b831f9e8643ab7adb0ed1759af35e8a8ca2c87dc2cc63d5aaac851df885918d48f2a13d2570d5218518853c79d0e197e100e41f7f16293d257436229e89d53ce514a0d76436cc200ff87b555404c8ebd4f70e558fb311aed3a2f51b83c53a77bb06b383206753f02bffacfdf1b3b035dad99b4a80cf0ac790114cd26012a48181d1134da6cd8d19f1cab6e25d67212b3507a7a0f0649ecdfe8c721cff2c8aab7bd7a492155262c023c521c8977d6524393b78e61554f03a736f7d90126a3c9618703dd6d0940455476ed6e5f468ad50c2a5bcdcff7efc6604cedb4b9b4caa7189e5f885da8b240ac7829d9f5aa5d7c1147f563946d3b3f03cc517595a9bd33e0feb2172afffc7797aca8f6239e85920a7a4bcdd4e7550ef18b9e731aa2d059bc3042d4f8b04bdadb0d96d4f19b6bf728fdf53907e47d0aafe8e92813cc2573c712d0e60b4bc00f2766f5233fbd2d4a4b1da789474ef393eebbecc28bc009c731fe20388dc1394fa6b5fc28a6f13d080469d3683685a427720f7fc313be91977bb1d0e9017a05a26b4ef0cf888b5d8974351726d5ee65c5f3f28def31882fffcdcc0cd02a5211c481189cb6b338d0beb6d0b9f9c2466c4a14767bc8c8337168b61c50525faf58f1234d0ef5e3b4f9c1b2533cbdf1df7820ec45b84f88dbba095cc36399d76adffae1408151cfc20c16fc9d1d0cbfaa8cef3b9a604fc876ec53cc102649b0303c4d2cde6e5b69cf610030c8ab653817763dbcb159c9574ba75e2ec4a9576baa039bdf37ce2663e43dd2dc0287eea6c9604a6bab782d94d79e850350c430fce0a39cf7203ba7447780ee0a3ac590dce15b6496326bec21262245f27d179ffd8206a144cbc34671c1b8a2915e75fc65440e93fa6f07cbb0f00a01972e8db5cf43d7bc790a53375011d80fb78a03d8ea641de809aea12aa825df2beabe329d7a42a066b57ba7d33f7e06ed4f4eb155cb6b6d0efeb06a44e316e04c6f1208fc0047757efa0f364ae3f336df164fd0f85f404bd1f2480a34f71e0d01dec388172adab1174d97a3de160aee7d59d74d62a02157afe3a8724144987cc3c466e63e51e5d68f1b9db6f9b7aed93ff773ae879eff33e37414b77f821d88c2873496187e786ccaa49a1fa91fd220a3788a92694f4b6063e8bcfc87eb3e9b46612b9ae587590a1cb285757dd7f253bfcd08b458ae282fb76958a5c15101ab61ecbc51f080c958e3014f389f8ab6b82cb03e4afc774280f82ce33eddf9422b64e2d4336eaca12ed9a18143f9571cf732ff8c57859a3c5e8795622277037595af2298600f24aa63455f0ed1e0e7c5601a49824789ec7dd69f22a24e33a3394548db6f873f2704bb13b4eae90136201ee4b6428a4f71a46ef77e69d25a09859ab280f738d27264f2a710f30792b054977146f5fa6df580a0b509cb86d56645fabc4966a767b4c1e5d8b8705f357a154723a48e60b874be2ffaf597568f2d39179f4c47c5fe26f7f05730830aab247bef3b25c3f297f7f69959106cd9a874c9eb7d76dc2469d42f3651b46a1ebc49e74597e38e284a80143845b722d54df4b4461fcfe3426488ea754c95c7a41f80b201dc3a88218a18070715a45b089fdb2204e6f16995a6968ade603feb09a2c22714f7677ac2da381cfb8a7529bed8c0f591fa83b3cd54764dd955b7c11976fe84639fd9f8294cf0701ef977caeaf3070a0b52975112351be31f2b5ae5f8b0055bebd6a7415bec832598a582ccb69a014021a60333f849935960e7f1d1a1226bd195523c84d02336804cfc55b22dafb89f70722f898364a0a5f76630a1aeb6537d2339fafacc72c321d0e48922c5424c5a61b645bd7a60fffa3d29fa3bd24a8264082ddf1d40253e72c9e2af4ab801b9318dce0eaddb1d62a90de6e0b43affa363374554b44ec48b2bcf19fa36bb6354b6bb1a0ec9cc7a20669353e36e1c8ceccdf43d936e7ad163cccdf9514d37262d19849910d0a0aff274c1bbbfb4042871fbd58d6183d2d4f206fec71d2c72f4e16d7d8622f2505a333229be1ffaa786cb24a56f03381c6b8c95f532ae6d926a7899f6505c3be8ba1649631038b05a65a9cf36cb90d25d99779cdb3c0e99b3f1f220c0cebadaa0089da20f4a36c6c60da6f87321326ac99285f1e1065a2458a4a80170b7eaac83f4cda9d59bfb2793056518a9ba0467136fd287351a087ee541ff98b5fe997229e3778e3595df72340b625b4f27f8c00cfc156ee1bb93cc85ebc02d26891517efb29a3119dae5a6dd785650a2d4b3f91bd09e035e17a26799a135ae1f80bbfc2c03966104879a596c35789bea5f986f724138505198fb39fd49c6045d3075596ca1d95423fe7c6bf86ba21c44aa5d036898a69bddd218996c7", 0x9ae}], 0x3}}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f00000029c0)="bb", 0x1}], 0x1}}], 0x2, 0x1) 00:57:32 executing program 4: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0xc) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000685000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) 00:57:32 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = dup(r0) sendmmsg(r2, &(0x7f0000008f40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000280)="1139212b33a8e9528c83df962412eb1d5668a1c27978c86f9156fa50220bc509324dc5f0da3628f2d599b2ef34f9e60cf0ba2ef75bd077aa659b8ba71cc125d081efe394a27ec2482953d1820e145eeacbdafe8098836c2cc4d02d4f2eae334ddaec395d17a3a6a72887977b0b8ce71da1a49ced1c497e9d4c31d27b393b220cddea354401716a00171f2725ef74bca9ebf25c9d700306a1cd6c398ea7fc6e97b24115bb241a7a265c2c0b5143c3c062afd5a40e654dc322773b", 0xba}, {&(0x7f0000000340)="2b36d8831305cdbe35af063c596ecccb45598393f39e8a9d6d8966fe016ae649a4055ab41ce52bbfe4f55e86a58dcd3cb83ad0d41cb8f2c76c1bb084b416906eaf8fd5431795c725b6ea2faf58486bd0186ecfef1cbebb87dd3e6f27e2c34b3f21e5058adff2e16b628f113c5e85fc1ed2f00283950d686725060b0b5a407595f97e81aed5def5638b333354f568de51624c8fa72ed8d433a6", 0x99}, {&(0x7f0000000400)="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", 0x9ae}], 0x3}}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f00000029c0)="bb", 0x1}], 0x1}}], 0x2, 0x1) [ 343.059929][T16473] 9pnet: Insufficient options for proto=fd 00:57:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) open_by_handle_at(r0, &(0x7f00000004c0)=@fuse_with_parent={0x18}, 0x0) 00:57:32 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x6042, 0x4) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x0) [ 343.149632][T16493] 9pnet: Insufficient options for proto=fd 00:57:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 00:57:35 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0xfffffffffffffff9, 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x9b) close(r0) 00:57:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = dup(r0) sendmmsg(r2, &(0x7f0000008f40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000280)="1139212b33a8e9528c83df962412eb1d5668a1c27978c86f9156fa50220bc509324dc5f0da3628f2d599b2ef34f9e60cf0ba2ef75bd077aa659b8ba71cc125d081efe394a27ec2482953d1820e145eeacbdafe8098836c2cc4d02d4f2eae334ddaec395d17a3a6a72887977b0b8ce71da1a49ced1c497e9d4c31d27b393b220cddea354401716a00171f2725ef74bca9ebf25c9d700306a1cd6c398ea7fc6e97b24115bb241a7a265c2c0b5143c3c062afd5a40e654dc322773b", 0xba}, {&(0x7f0000000340)="2b36d8831305cdbe35af063c596ecccb45598393f39e8a9d6d8966fe016ae649a4055ab41ce52bbfe4f55e86a58dcd3cb83ad0d41cb8f2c76c1bb084b416906eaf8fd5431795c725b6ea2faf58486bd0186ecfef1cbebb87dd3e6f27e2c34b3f21e5058adff2e16b628f113c5e85fc1ed2f00283950d686725060b0b5a407595f97e81aed5def5638b333354f568de51624c8fa72ed8d433a6", 0x99}, {&(0x7f0000000400)="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", 0x9ae}], 0x3}}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f00000029c0)="bb", 0x1}], 0x1}}], 0x2, 0x1) 00:57:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x24, 0x0, &(0x7f0000000040)) 00:57:35 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd, &(0x7f0000000140)="c4c691019919daffffff7fc5d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:57:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0xfffffffffffffffc) 00:57:35 executing program 3: clone(0x3117804dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:57:35 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000001c0)=0xfc, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = dup(r0) sendmmsg(r2, &(0x7f0000008f40)=[{{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000280)="1139212b33a8e9528c83df962412eb1d5668a1c27978c86f9156fa50220bc509324dc5f0da3628f2d599b2ef34f9e60cf0ba2ef75bd077aa659b8ba71cc125d081efe394a27ec2482953d1820e145eeacbdafe8098836c2cc4d02d4f2eae334ddaec395d17a3a6a72887977b0b8ce71da1a49ced1c497e9d4c31d27b393b220cddea354401716a00171f2725ef74bca9ebf25c9d700306a1cd6c398ea7fc6e97b24115bb241a7a265c2c0b5143c3c062afd5a40e654dc322773b", 0xba}, {&(0x7f0000000340)="2b36d8831305cdbe35af063c596ecccb45598393f39e8a9d6d8966fe016ae649a4055ab41ce52bbfe4f55e86a58dcd3cb83ad0d41cb8f2c76c1bb084b416906eaf8fd5431795c725b6ea2faf58486bd0186ecfef1cbebb87dd3e6f27e2c34b3f21e5058adff2e16b628f113c5e85fc1ed2f00283950d686725060b0b5a407595f97e81aed5def5638b333354f568de51624c8fa72ed8d433a6", 0x99}, {&(0x7f0000000400)="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", 0x9ae}], 0x3}}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f00000029c0)="bb", 0x1}], 0x1}}], 0x2, 0x1) 00:57:35 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000007240)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000002f40)=[{0x10, 0x1, 0x24}], 0x10}}], 0x2, 0x0) 00:57:35 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd, &(0x7f0000000140)="c4c691019919daffffff7fc5d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:57:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:35 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd, &(0x7f0000000140)="c4c691019919daffffff7fc5d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:57:35 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae8e752a897094e7b126b097eaa769be6d28c41bd34e677d114b655ef5f0166391c68f72e44e260f82e8a9bfc92b1055f69a37237647e947e4df739526ecbb3987b178b1ead5a678216d5d3568da", 0x52}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) [ 346.196534][T16554] loop4: detected capacity change from 0 to 6 [ 346.206429][T16554] FAT-fs (loop4): Directory bread(block 6) failed [ 346.213608][T16554] FAT-fs (loop4): Directory bread(block 6) failed [ 346.220424][T16554] FAT-fs (loop4): Directory bread(block 6) failed 00:57:38 executing program 3: clone(0x3117804dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:57:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000068c0)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=[@tclass={{0x14}}], 0x18}}, {{&(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hoplimit={{0x14, 0x29, 0x34, 0x14c}}], 0x18}}], 0x2, 0x0) 00:57:38 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd, &(0x7f0000000140)="c4c691019919daffffff7fc5d6"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:57:38 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:38 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:38 executing program 5: process_madvise(0xffffffffffffffff, &(0x7f00000013c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 00:57:38 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000200)) timer_create(0x2, 0x0, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, &(0x7f0000000280)) timer_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, r1+60000000}}, 0x0) [ 349.135625][T16589] loop4: detected capacity change from 0 to 6 [ 349.148601][T16589] FAT-fs (loop4): Directory bread(block 6) failed [ 349.157311][T16598] loop0: detected capacity change from 0 to 6 [ 349.173929][T16598] FAT-fs (loop0): Directory bread(block 6) failed 00:57:38 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fcntl$F_SET_RW_HINT(r0, 0x409, &(0x7f0000000000)) 00:57:38 executing program 5: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="5500000018007f1100fe15b282a380930a6000d4a8a0bfc388a5c000390009002300ff6c020000000b000500ff020000000b566881b18432009b1100b1df13000000fb200040000000004097fde3b3000000000900", 0x55}], 0x1}, 0x0) 00:57:38 executing program 2: clone(0x40001f00, 0x0, &(0x7f0000000080), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8940, &(0x7f0000000000)={'wpan4\x00'}) [ 349.181585][T16598] FAT-fs (loop0): Directory bread(block 6) failed [ 349.188265][T16598] FAT-fs (loop0): Directory bread(block 6) failed [ 349.193116][T16589] FAT-fs (loop4): Directory bread(block 6) failed [ 349.223596][T16589] FAT-fs (loop4): Directory bread(block 6) failed 00:57:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x28, &(0x7f0000002f00)=""/238, &(0x7f0000003000)=0xee) 00:57:38 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x39, &(0x7f00000002c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d38ff122a776e"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') fcntl$notify(r0, 0x402, 0x4) fcntl$notify(r0, 0x402, 0x0) 00:57:39 executing program 3: clone(0x3117804dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:57:39 executing program 2: clone(0x40001f00, 0x0, &(0x7f0000000080), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8940, &(0x7f0000000000)={'wpan4\x00'}) 00:57:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:39 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:39 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4b, &(0x7f0000000100)=0xfffffff7, 0x4) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x4000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 00:57:39 executing program 2: clone(0x40001f00, 0x0, &(0x7f0000000080), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8940, &(0x7f0000000000)={'wpan4\x00'}) [ 350.002593][T16656] loop4: detected capacity change from 0 to 6 [ 350.009161][T16663] loop0: detected capacity change from 0 to 6 [ 350.019692][T16663] FAT-fs (loop0): Directory bread(block 6) failed [ 350.033028][T16656] FAT-fs (loop4): Directory bread(block 6) failed [ 350.043744][T16656] FAT-fs (loop4): Directory bread(block 6) failed 00:57:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={0x0, r1+60000000}, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:57:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') fcntl$notify(r0, 0x402, 0x4) fcntl$notify(r0, 0x402, 0x0) 00:57:39 executing program 2: clone(0x40001f00, 0x0, &(0x7f0000000080), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8940, &(0x7f0000000000)={'wpan4\x00'}) [ 350.054479][T16656] FAT-fs (loop4): Directory bread(block 6) failed [ 350.061385][T16663] FAT-fs (loop0): Directory bread(block 6) failed [ 350.070668][T16663] FAT-fs (loop0): Directory bread(block 6) failed 00:57:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') fcntl$notify(r0, 0x402, 0x4) fcntl$notify(r0, 0x402, 0x0) 00:57:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @dev={0xac, 0x14, 0x14, 0xf}, @empty}, 0xc) 00:57:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x9, &(0x7f0000000100)={0x961}, 0x14) getsockopt$inet_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 00:57:40 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:40 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000400)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f00000001c0)={[{@fat=@flush}]}) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) dup3(r0, r1, 0x0) 00:57:40 executing program 3: clone(0x3117804dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet6(0x10, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:57:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') fcntl$notify(r0, 0x402, 0x4) fcntl$notify(r0, 0x402, 0x0) 00:57:40 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r2) 00:57:40 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020200e8fe0208010001080008000d000400ff7e", 0x24}], 0x1}, 0x0) [ 350.905708][T16733] loop4: detected capacity change from 0 to 6 [ 350.905984][T16734] loop0: detected capacity change from 0 to 6 [ 350.916057][T16733] FAT-fs (loop4): Directory bread(block 6) failed [ 350.943258][T16733] FAT-fs (loop4): Directory bread(block 6) failed [ 350.950539][T16734] FAT-fs (loop0): Directory bread(block 6) failed [ 350.958489][T16734] FAT-fs (loop0): Directory bread(block 6) failed [ 350.970391][T16733] FAT-fs (loop4): Directory bread(block 6) failed [ 350.974231][T16734] FAT-fs (loop0): Directory bread(block 6) failed 00:57:40 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000400)={r2, 0x3, 0x6, @broadcast}, 0x10) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000180)={r4, 0x1, 0x6, @link_local}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x2, &(0x7f0000000140)={r2, 0x3, 0x6, @dev}, 0x10) 00:57:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={0x0, r1+60000000}, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:57:40 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e1", 0xb}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:57:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) 00:57:40 executing program 4: select(0xf4240, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x28000000000000}, &(0x7f0000000080), &(0x7f00000000c0)) [ 351.537586][T16766] device lo entered promiscuous mode [ 351.545366][T16762] device lo left promiscuous mode [ 351.567002][T16774] device lo entered promiscuous mode [ 351.576702][T16762] device lo left promiscuous mode 00:57:41 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x2}, 0x10) write(r0, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a03000000ffffff800000000800010000000000", 0x24) 00:57:41 executing program 4: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r3, 0x0, &(0x7f0000000380)="cd31d5a01616fa3a66ae1ca395a482d63730899529c67818094d53335d683905792ec43898bf1a69fff1a900e13cfde849bb003f793d807e8df5f3def1415876ef21c26ed92271aa49646f635864ae026f9024b17327b7ce6190d1b01db9d0de399866fde4b1e1e9e06c68fe4ed210e0633f6624f73768820c688f8c891d0c46455a3f0d36dba75370fcc2bd81453697b0b4dad5329b1dc2a738358a5f214fe200f8a639b9aca7cd25a27217f1784778f1bc6b36c9ff", 0xb6, 0x40080, 0x0, {0x0, r4}}, 0xd201) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000780)="dbaf17f8fd34069bcf8df1dc83329048433ec36b6cbcf15dc69e3d19d60fa5eaf81b12cfe410ab9a91d8f6b1fea6066aafde2ed91ae187e576393d60f5d397bb8032bdbbb86f433db6eae819e151f8d8fa16ea376c3a2808513f37432056339b1675b26f9f319b04f16eca2a025df4a83e885c721f149a", 0x77}, {&(0x7f0000000840)}, {&(0x7f00000008c0)}, {&(0x7f00000009c0)}], 0x4, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, {0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001200)}], 0x1}, {&(0x7f0000001340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008001}, {&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f0000001700)="f4cbbb31bb1d899d8c4aa235d44ec7970ce328b2866945ec8457a11d2659864f18bba18a6aa7b1617a2b47feecb99839d7b0fb710c6e517bc3c05918c3e8f5ba84c1", 0x42}, {&(0x7f0000001780)="fac42d30e0", 0x5}, {&(0x7f00000017c0)}, {&(0x7f00000027c0)="2941a449f4be42dbed09c4a40bea988c5072eb8b7bb292530cd12ce1d002ef99c204fec7a5d43f62aec5ac79549254634ada7823532acc588384801661e31f25c152896e42e992e1002a7e8dcafe570428d4ad15b79bc3ca7ceb396a64a457e5e4216bae8b96dc31fb8e4f0ca503514ec7a94c0f9916b725288137f68a8cca50ae7989a5f728bcacdf37e5e643bc356beaf86481e83e1ea77753303f1c43de4744685f8546", 0xa5}], 0x5}], 0x5, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f00000002c0)='./file1\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:57:41 executing program 0: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) preadv(r0, &(0x7f0000001140)=[{0x0, 0x2}, {&(0x7f0000000140)=""/4096, 0x1000}], 0x2, 0x0, 0x0) 00:57:41 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0) 00:57:41 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x29, 0x0, &(0x7f0000ffc000/0x4000)=nil) 00:57:41 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setlease(r0, 0x402, 0x0) 00:57:41 executing program 2: unshare(0x24040400) r0 = socket(0x11, 0x3, 0x0) setsockopt$inet_pktinfo(r0, 0x107, 0x9, 0x0, 0x4) 00:57:41 executing program 3: set_mempolicy(0x1, 0x0, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) 00:57:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={0x0, r1+60000000}, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:57:42 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x1, 0x0) 00:57:42 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x148, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:42 executing program 3: r0 = socket(0x1, 0x2, 0x0) select(0x40, &(0x7f0000000000)={0x8}, &(0x7f00000010c0), 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) shutdown(r0, 0x0) 00:57:42 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x3b, &(0x7f0000000280)="08ac20080dd966953b67480f3a62007c4fab98a907010100d6eca02cdc108ce69ae431c026d5190eb8a104ce5f19cd2ed75fcd792d92ad8696ca06"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:42 executing program 4: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r3, 0x0, &(0x7f0000000380)="cd31d5a01616fa3a66ae1ca395a482d63730899529c67818094d53335d683905792ec43898bf1a69fff1a900e13cfde849bb003f793d807e8df5f3def1415876ef21c26ed92271aa49646f635864ae026f9024b17327b7ce6190d1b01db9d0de399866fde4b1e1e9e06c68fe4ed210e0633f6624f73768820c688f8c891d0c46455a3f0d36dba75370fcc2bd81453697b0b4dad5329b1dc2a738358a5f214fe200f8a639b9aca7cd25a27217f1784778f1bc6b36c9ff", 0xb6, 0x40080, 0x0, {0x0, r4}}, 0xd201) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000780)="dbaf17f8fd34069bcf8df1dc83329048433ec36b6cbcf15dc69e3d19d60fa5eaf81b12cfe410ab9a91d8f6b1fea6066aafde2ed91ae187e576393d60f5d397bb8032bdbbb86f433db6eae819e151f8d8fa16ea376c3a2808513f37432056339b1675b26f9f319b04f16eca2a025df4a83e885c721f149a", 0x77}, {&(0x7f0000000840)}, {&(0x7f00000008c0)}, {&(0x7f00000009c0)}], 0x4, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, {0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001200)}], 0x1}, {&(0x7f0000001340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008001}, {&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f0000001700)="f4cbbb31bb1d899d8c4aa235d44ec7970ce328b2866945ec8457a11d2659864f18bba18a6aa7b1617a2b47feecb99839d7b0fb710c6e517bc3c05918c3e8f5ba84c1", 0x42}, {&(0x7f0000001780)="fac42d30e0", 0x5}, {&(0x7f00000017c0)}, {&(0x7f00000027c0)="2941a449f4be42dbed09c4a40bea988c5072eb8b7bb292530cd12ce1d002ef99c204fec7a5d43f62aec5ac79549254634ada7823532acc588384801661e31f25c152896e42e992e1002a7e8dcafe570428d4ad15b79bc3ca7ceb396a64a457e5e4216bae8b96dc31fb8e4f0ca503514ec7a94c0f9916b725288137f68a8cca50ae7989a5f728bcacdf37e5e643bc356beaf86481e83e1ea77753303f1c43de4744685f8546", 0xa5}], 0x5}], 0x5, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f00000002c0)='./file1\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:57:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:42 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x4d}, {0x6}]}) [ 353.650103][ T25] kauditd_printk_skb: 15 callbacks suppressed [ 353.650186][ T25] audit: type=1326 audit(1622941062.969:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16847 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 00:57:43 executing program 3: setgroups(0x2, &(0x7f0000000180)=[0x0, 0x0]) getgroups(0x1, &(0x7f00000006c0)=[0x0]) 00:57:43 executing program 4: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r3, 0x0, &(0x7f0000000380)="cd31d5a01616fa3a66ae1ca395a482d63730899529c67818094d53335d683905792ec43898bf1a69fff1a900e13cfde849bb003f793d807e8df5f3def1415876ef21c26ed92271aa49646f635864ae026f9024b17327b7ce6190d1b01db9d0de399866fde4b1e1e9e06c68fe4ed210e0633f6624f73768820c688f8c891d0c46455a3f0d36dba75370fcc2bd81453697b0b4dad5329b1dc2a738358a5f214fe200f8a639b9aca7cd25a27217f1784778f1bc6b36c9ff", 0xb6, 0x40080, 0x0, {0x0, r4}}, 0xd201) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000780)="dbaf17f8fd34069bcf8df1dc83329048433ec36b6cbcf15dc69e3d19d60fa5eaf81b12cfe410ab9a91d8f6b1fea6066aafde2ed91ae187e576393d60f5d397bb8032bdbbb86f433db6eae819e151f8d8fa16ea376c3a2808513f37432056339b1675b26f9f319b04f16eca2a025df4a83e885c721f149a", 0x77}, {&(0x7f0000000840)}, {&(0x7f00000008c0)}, {&(0x7f00000009c0)}], 0x4, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, {0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001200)}], 0x1}, {&(0x7f0000001340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008001}, {&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f0000001700)="f4cbbb31bb1d899d8c4aa235d44ec7970ce328b2866945ec8457a11d2659864f18bba18a6aa7b1617a2b47feecb99839d7b0fb710c6e517bc3c05918c3e8f5ba84c1", 0x42}, {&(0x7f0000001780)="fac42d30e0", 0x5}, {&(0x7f00000017c0)}, {&(0x7f00000027c0)="2941a449f4be42dbed09c4a40bea988c5072eb8b7bb292530cd12ce1d002ef99c204fec7a5d43f62aec5ac79549254634ada7823532acc588384801661e31f25c152896e42e992e1002a7e8dcafe570428d4ad15b79bc3ca7ceb396a64a457e5e4216bae8b96dc31fb8e4f0ca503514ec7a94c0f9916b725288137f68a8cca50ae7989a5f728bcacdf37e5e643bc356beaf86481e83e1ea77753303f1c43de4744685f8546", 0xa5}], 0x5}], 0x5, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f00000002c0)='./file1\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:57:43 executing program 3: r0 = syz_io_uring_setup(0x189, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000190000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) dup3(r3, r0, 0x0) 00:57:43 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="b8000000150001000000000000000000ac1e0001000000000000000000000001"], 0xb8}}, 0x0) [ 353.879120][T16870] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. 00:57:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000001280)={0x10, 0x10, 0x1}, 0x10}], 0x1}, 0x0) 00:57:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) nanosleep(&(0x7f0000000140)={0x0, r1+60000000}, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:57:45 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000000)={{0x100}, {}, 0x0, 0x4}) 00:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b9", 0x1}, {&(0x7f0000000280)='H', 0x1}], 0x2}}, {{&(0x7f0000000200)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000001c80)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 00:57:45 executing program 4: r0 = syz_io_uring_setup(0x15a3, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r3, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_SEND={0x1a, 0x4, 0x0, r3, 0x0, &(0x7f0000000380)="cd31d5a01616fa3a66ae1ca395a482d63730899529c67818094d53335d683905792ec43898bf1a69fff1a900e13cfde849bb003f793d807e8df5f3def1415876ef21c26ed92271aa49646f635864ae026f9024b17327b7ce6190d1b01db9d0de399866fde4b1e1e9e06c68fe4ed210e0633f6624f73768820c688f8c891d0c46455a3f0d36dba75370fcc2bd81453697b0b4dad5329b1dc2a738358a5f214fe200f8a639b9aca7cd25a27217f1784778f1bc6b36c9ff", 0xb6, 0x40080, 0x0, {0x0, r4}}, 0xd201) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = getpid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003080)=[{&(0x7f0000000180)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000000c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0x20}, {&(0x7f0000000680)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000780)="dbaf17f8fd34069bcf8df1dc83329048433ec36b6cbcf15dc69e3d19d60fa5eaf81b12cfe410ab9a91d8f6b1fea6066aafde2ed91ae187e576393d60f5d397bb8032bdbbb86f433db6eae819e151f8d8fa16ea376c3a2808513f37432056339b1675b26f9f319b04f16eca2a025df4a83e885c721f149a", 0x77}, {&(0x7f0000000840)}, {&(0x7f00000008c0)}, {&(0x7f00000009c0)}], 0x4, &(0x7f0000000d40)=[@cred={{0x1c, 0x1, 0x2, {r5, 0xee01}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, {0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001200)}], 0x1}, {&(0x7f0000001340)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4008001}, {&(0x7f0000001580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002880)=[{0x0}, {&(0x7f0000001700)="f4cbbb31bb1d899d8c4aa235d44ec7970ce328b2866945ec8457a11d2659864f18bba18a6aa7b1617a2b47feecb99839d7b0fb710c6e517bc3c05918c3e8f5ba84c1", 0x42}, {&(0x7f0000001780)="fac42d30e0", 0x5}, {&(0x7f00000017c0)}, {&(0x7f00000027c0)="2941a449f4be42dbed09c4a40bea988c5072eb8b7bb292530cd12ce1d002ef99c204fec7a5d43f62aec5ac79549254634ada7823532acc588384801661e31f25c152896e42e992e1002a7e8dcafe570428d4ad15b79bc3ca7ceb396a64a457e5e4216bae8b96dc31fb8e4f0ca503514ec7a94c0f9916b725288137f68a8cca50ae7989a5f728bcacdf37e5e643bc356beaf86481e83e1ea77753303f1c43de4744685f8546", 0xa5}], 0x5}], 0x5, 0x40) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READ_FIXED, 0x0) renameat(r3, &(0x7f0000000240)='./file0\x00', r3, &(0x7f00000002c0)='./file1\x00') syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x4}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:57:45 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:45 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:45 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:45 executing program 3: r0 = creat(&(0x7f0000000280)='./file1\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000000c0)='.\x00', 0x20000051) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7}, 0x7) 00:57:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b9", 0x1}, {&(0x7f0000000280)='H', 0x1}], 0x2}}, {{&(0x7f0000000200)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000001c80)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 00:57:45 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000080)=0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x0, 0x0) io_submit(r0, 0x0, 0x0) 00:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b9", 0x1}, {&(0x7f0000000280)='H', 0x1}], 0x2}}, {{&(0x7f0000000200)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000001c80)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 00:57:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f0000000080)=@l2tp={0x2, 0x0, @loopback}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)="b9", 0x1}, {&(0x7f0000000280)='H', 0x1}], 0x2}}, {{&(0x7f0000000200)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000001c80)=[{0x10, 0x0, 0x7}], 0x10}}], 0x2, 0x0) 00:57:46 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001680)={0xffffffffffffffff}) r1 = getpgrp(0xffffffffffffffff) sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001280)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000001500)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x10}}], 0x30}, 0x0) 00:57:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/keycreate\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 00:57:46 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mknod$loop(&(0x7f0000000940)='./file0/bus\x00', 0x6210, 0x0) open$dir(&(0x7f0000000040)='./file0/bus\x00', 0x824371c259f7d42, 0x0) 00:57:46 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f00000cc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002500)=[{0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000640)="a073fc9edbf8abb235", 0x9}], 0x1, 0x0, 0xb0}], 0x1, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:57:46 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:46 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:46 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe7, &(0x7f0000000200)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc3854bdf06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad5915768941dd53b18b3927d816a98ebc001f000000000000eba5c9c6a47312334c2a97a4837714ca22569255344e22045dffbcd48a70502172d6efa56b60f48ced043d68d5d87c6f7639c8f8f0c1d0989ecbbfc2202b0232ab399c493ce2824b53cad3867cd3897173a56c042d47db002b19b743ad3c2e87d35edaf4bae8efd63f05fd3f2e7fa67dcef54006b807ae79684a4bf8ed9abeb7e0abb74f7ac1534e9978fb08435ac1942ddd8f3051"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:57:46 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000080)={0x420}, 0x420}}, 0x0) 00:57:46 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = fsopen(&(0x7f0000000040)='tracefs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='silent\x00', 0x0, 0x0) 00:57:46 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:46 executing program 3: syz_io_uring_setup(0x631f, &(0x7f0000000000), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f0000000180)) 00:57:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) unshare(0x40000000) r0 = socket(0x400000000000010, 0x2, 0x0) write(r0, &(0x7f0000000140)="240000001a0099f0003be90000ed190e020008160000000000001880080002007f196be0", 0x24) 00:57:46 executing program 4: move_pages(0x0, 0x1, &(0x7f00000011c0)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, 0x0, 0x0) 00:57:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='init_itable=0']) 00:57:46 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 00:57:46 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/238, 0xee}, {0x0}], 0x2) [ 357.607148][T17004] loop4: detected capacity change from 0 to 4 [ 357.618113][T17004] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 357.668210][T17009] loop4: detected capacity change from 0 to 4 [ 357.675259][T17009] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 00:57:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:47 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12d, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, 0x0, 0x0) 00:57:47 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 00:57:47 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c46, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:57:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x21, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r4}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r5, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0}}, 0x5) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:57:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="d2", 0x1}], 0x1, 0x0) read(r0, &(0x7f0000000040)=""/12, 0xc) 00:57:47 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2b}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x2b}, 0x0, @in6=@private1}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) [ 358.476935][T17047] syz-executor.3 (17047) used greatest stack depth: 8600 bytes left 00:57:47 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xde28}]}]}]}, 0x40}}, 0x0) 00:57:47 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 00:57:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.procs\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ceph_nfs_confh={0x7}, 0x0) 00:57:48 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80000001) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [], 0x0, "8bebeb894f74c3"}) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 00:57:48 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'sit0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}]}, 0x50}}, 0x0) 00:57:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12d, &(0x7f0000000140)="e7db232bcd7f6f98c0587be8f93b38ef5ecb684cdca4a09962d6f4683f1f87dbef24a23daadab647cd32c404ed38ab109c458d26b6d260ff202e608f91699ac4b381efae1516db8506f04d5efeb98473f80d83b7da62b0ad1322771e70f1f6f2b76323f399f2046eca490c3286002e69cbdf930101fa94f4523423d6dd8fc04e076d6b5b635c75c56c71b00e63bfba36869d61f5b343ac73e860df73d427a3658a24534d47d54ed9f8342768e9ec6e109901b293c78b2e35f90a8ca95de0835c37018744ab5b03857489b8750a6ce69b2e7e2c9860ae562e2835ee9298178108b024b664d8d8232d2a1afc6e2d81935b815cfb3c23ded0656d69322f3ebd8b3d0db959f2a55e2e27ff00019ad62c2c6525bf1b99603fce99cec4b6c3e7c357460a004993df83e254c63c214563"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000080), 0x4) 00:57:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x10, 0x0, &(0x7f0000000080)) 00:57:50 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/config', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x0) 00:57:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'sit0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}]}, 0x50}}, 0x0) 00:57:50 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd=r3, 0x0, &(0x7f0000000380)=""/209, 0xd1}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:57:50 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80001000000ffb, 0x83) unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selancx\xa5\x00\x00\x00nu\\\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:57:50 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x4b, &(0x7f0000000140)=ANY=[@ANYBLOB='P'], 0x78) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b76795008000537287bb000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmmsg$inet6(r1, &(0x7f0000000040)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@pktinfo={{0x24, 0x29, 0x2, {@local, r3}}}], 0x28}}], 0x1, 0x0) 00:57:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'sit0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}]}, 0x50}}, 0x0) 00:57:50 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) 00:57:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000080), 0x4) 00:57:50 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80001000000ffb, 0x83) unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selancx\xa5\x00\x00\x00nu\\\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:57:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000001c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x34}}, 0x0) 00:57:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12d, &(0x7f0000000140)="e7db232bcd7f6f98c0587be8f93b38ef5ecb684cdca4a09962d6f4683f1f87dbef24a23daadab647cd32c404ed38ab109c458d26b6d260ff202e608f91699ac4b381efae1516db8506f04d5efeb98473f80d83b7da62b0ad1322771e70f1f6f2b76323f399f2046eca490c3286002e69cbdf930101fa94f4523423d6dd8fc04e076d6b5b635c75c56c71b00e63bfba36869d61f5b343ac73e860df73d427a3658a24534d47d54ed9f8342768e9ec6e109901b293c78b2e35f90a8ca95de0835c37018744ab5b03857489b8750a6ce69b2e7e2c9860ae562e2835ee9298178108b024b664d8d8232d2a1afc6e2d81935b815cfb3c23ded0656d69322f3ebd8b3d0db959f2a55e2e27ff00019ad62c2c6525bf1b99603fce99cec4b6c3e7c357460a004993df83e254c63c214563"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300054700bb65e1c3e4ffff0600000002000000450000002500000019000d400400ad000200000000000006040000000000000000", 0x39}], 0x1) 00:57:53 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80001000000ffb, 0x83) unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selancx\xa5\x00\x00\x00nu\\\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:57:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000080), 0x4) 00:57:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r1) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'sit0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}]}, 0x50}}, 0x0) 00:57:53 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x80001000000ffb, 0x83) unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selancx\xa5\x00\x00\x00nu\\\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x3}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:57:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c3549b4c2f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3147", 0xff7c}], 0x1) 00:57:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="000000000000fc370800140000000c000600080001000000000018000200080001df000000000800010000000000040004006c00140054000600080004000000000008000100000000000800020000000000080001000000a5000800030000000000080002002600000008000200000000000800040018000000080003000020000008000200f571ff070000000000006f61646361f3762d6c696f6b0000580005005400388a8e44a20ce41d08000800efff200000000800020000000000088004000000000008000300000000000800030000000000080101a4000400becf000400010000000800020800000000080002000000001e1400060008000100000500000800010000000000ff7f0100080003000000000010000100756470d9027d7a3000000000380004001400010002000000bbc3ffff000000040d78d2002000026e1a00000000000000209ff2c6d22851b4b84ea2e743c1ef660000000008aeede4b4548c98e2184300009e00141f042d297700010002000000ac14140000000000000000e61301020002000000ac14140000000009c4f4f6776297ee00080002000000008008000302000100002c0004000c00010002000000ac14140000000000000000001400020002000000ac144d3d8dac06e58c9c1600440001003808040020"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280004020100fec0ffff0000000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 00:57:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000080), 0x4) 00:57:53 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000000000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) [ 364.450488][T17148] netlink: 'syz-executor.5': attribute type 13 has an invalid length. 00:57:53 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)='S', 0x1}], 0x1) 00:57:53 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @private0}, 0x1c) [ 364.556153][T17166] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 364.556189][T17166] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. [ 364.571976][T17171] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 364.571991][T17171] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. [ 364.613892][T17179] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 00:57:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="000000000000fc370800140000000c000600080001000000000018000200080001df000000000800010000000000040004006c00140054000600080004000000000008000100000000000800020000000000080001000000a5000800030000000000080002002600000008000200000000000800040018000000080003000020000008000200f571ff070000000000006f61646361f3762d6c696f6b0000580005005400388a8e44a20ce41d08000800efff200000000800020000000000088004000000000008000300000000000800030000000000080101a4000400becf000400010000000800020800000000080002000000001e1400060008000100000500000800010000000000ff7f0100080003000000000010000100756470d9027d7a3000000000380004001400010002000000bbc3ffff000000040d78d2002000026e1a00000000000000209ff2c6d22851b4b84ea2e743c1ef660000000008aeede4b4548c98e2184300009e00141f042d297700010002000000ac14140000000000000000e61301020002000000ac14140000000009c4f4f6776297ee00080002000000008008000302000100002c0004000c00010002000000ac14140000000000000000001400020002000000ac144d3d8dac06e58c9c1600440001003808040020"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280004020100fec0ffff0000000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 00:57:56 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000480007041dfffd946f6105000a020300fe0208010001080008000a000400ff7e", 0x24}], 0x1}, 0x0) 00:57:56 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0xfffe}, {0x0, 0x9b4}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x7fff]) 00:57:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x12d, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0xffffff12}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:57:56 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="0107000000000000000020000000080008"], 0x1c}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB="48040000", @ANYRES16=r4, @ANYBLOB="0100009e807d38b817747e"], 0x448}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 00:57:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newae={0x1c, 0x1e, 0x15, 0x0, 0x0, {{@in=@empty=0xa000000}, @in6=@ipv4}}, 0x40}}, 0x0) 00:57:56 executing program 0: io_setup(0x6, &(0x7f0000000240)=0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000000080)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, r3, 0x0}, 0x0]) 00:57:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="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"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280004020100fec0ffff0000000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 00:57:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2c326, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000034) [ 367.477026][T17194] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 367.485311][T17194] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. 00:57:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid(0x10, 0x0, 0x0, 0x4, 0x0) 00:57:56 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYRES16, @ANYBLOB="000000000000fc370800140000000c000600080001000000000018000200080001df000000000800010000000000040004006c00140054000600080004000000000008000100000000000800020000000000080001000000a5000800030000000000080002002600000008000200000000000800040018000000080003000020000008000200f571ff070000000000006f61646361f3762d6c696f6b0000580005005400388a8e44a20ce41d08000800efff200000000800020000000000088004000000000008000300000000000800030000000000080101a4000400becf000400010000000800020800000000080002000000001e1400060008000100000500000800010000000000ff7f0100080003000000000010000100756470d9027d7a3000000000380004001400010002000000bbc3ffff000000040d78d2002000026e1a00000000000000209ff2c6d22851b4b84ea2e743c1ef660000000008aeede4b4548c98e2184300009e00141f042d297700010002000000ac14140000000000000000e61301020002000000ac14140000000009c4f4f6776297ee00080002000000008008000302000100002c0004000c00010002000000ac14140000000000000000001400020002000000ac144d3d8dac06e58c9c1600440001003808040020"], 0x2}}, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280004020100fec0ffff0000000036ede498534108e58342fa94a235a2a441f9", 0xfcae) 00:57:56 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f000023d000/0x2000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 367.562870][T17211] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 367.571006][T17211] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. [ 367.581002][T17195] netlink: 'syz-executor.4': attribute type 8 has an invalid length. [ 367.652472][T17222] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 367.660678][T17222] netlink: 2508 bytes leftover after parsing attributes in process `syz-executor.3'. 00:57:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffe8c, &(0x7f0000000080)=[{&(0x7f0000000ac0)={0x67, 0x24, 0x1}, 0x10}, {&(0x7f0000000000)={0x70, 0x2, 0x0, 0x0, 0xfffffff1, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="ccef6db02bc75df8dd0bec32da46b0cdf9b33ac05208c98f8d5b7f85331efa432204f8ed3429243788b5f9dd3e880b281a3766e6cd9dc5c2901cb7f13f2309d45a61dfc137dd2d94e5156057de2d7d2d1b9569c252"]}, 0x70}], 0x2}, 0x0) 00:57:59 executing program 1: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffd28) fallocate(r0, 0x3, 0x8, 0x4) 00:57:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f000023d000/0x2000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:57:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBDIACR(r1, 0x4b52, &(0x7f0000000040)=""/51) 00:57:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 00:57:59 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f0000000100)='N', 0x1) getsockopt$inet_opts(r0, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/15, &(0x7f00000000c0)=0xf) 00:57:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) [ 370.472614][T17239] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.4'. 00:57:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) 00:57:59 executing program 2: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='timerslack_ns\x00') exit(0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000001200)=[{&(0x7f0000000080)=""/2, 0x2}, {&(0x7f00000000c0)=""/4096, 0x1000}], 0x2, 0x0, 0x0) 00:57:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffe8c, &(0x7f0000000080)=[{&(0x7f0000000ac0)={0x67, 0x24, 0x1}, 0x10}, {&(0x7f0000000000)={0x70, 0x2, 0x0, 0x0, 0xfffffff1, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="ccef6db02bc75df8dd0bec32da46b0cdf9b33ac05208c98f8d5b7f85331efa432204f8ed3429243788b5f9dd3e880b281a3766e6cd9dc5c2901cb7f13f2309d45a61dfc137dd2d94e5156057de2d7d2d1b9569c252"]}, 0x70}], 0x2}, 0x0) 00:57:59 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f000023d000/0x2000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:57:59 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) [ 370.568217][T17264] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.4'. [ 370.582471][ T25] audit: type=1400 audit(1622941079.902:236): avc: denied { sys_nice } for pid=17256 comm="syz-executor.2" capability=23 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 00:57:59 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x36b, 0x4) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 370.633208][T17263] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 370.663640][T17281] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 00:58:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffe8c, &(0x7f0000000080)=[{&(0x7f0000000ac0)={0x67, 0x24, 0x1}, 0x10}, {&(0x7f0000000000)={0x70, 0x2, 0x0, 0x0, 0xfffffff1, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="ccef6db02bc75df8dd0bec32da46b0cdf9b33ac05208c98f8d5b7f85331efa432204f8ed3429243788b5f9dd3e880b281a3766e6cd9dc5c2901cb7f13f2309d45a61dfc137dd2d94e5156057de2d7d2d1b9569c252"]}, 0x70}], 0x2}, 0x0) 00:58:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f000023d000/0x2000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index=0x5}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:58:00 executing program 1: unshare(0x4000400) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000000c0)={{}, 0x0, 0x0, 'id1\x00', 'timer1\x00'}) 00:58:00 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$sock(r0, &(0x7f0000000fc0)=[{{&(0x7f0000000bc0)=@hci={0x1f, 0x0, 0x2}, 0x80, 0x0}}, {{&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, 0x0}}], 0x2, 0x20004050) 00:58:00 executing program 5: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000440)=""/253, 0xfd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0x80045301, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0xc08c5332, &(0x7f00000001c0)) tkill(r0, 0x7) 00:58:00 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 00:58:00 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 00:58:00 executing program 1: r0 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x5000}], 0x1, 0x600, 0x0, 0x3) fallocate(r0, 0x10, 0x0, 0x2) 00:58:00 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 00:58:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)={0x20, r1, 0x401, 0x0, 0x0, {0xd}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x0) 00:58:00 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x101042, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x40000006) fallocate(r0, 0x20, 0x0, 0x10000) fallocate(r0, 0x0, 0x3f000000, 0x10000101) [ 370.843307][T17301] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.4'. 00:58:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000200)={0x0, 0xfffffffffffffe8c, &(0x7f0000000080)=[{&(0x7f0000000ac0)={0x67, 0x24, 0x1}, 0x10}, {&(0x7f0000000000)={0x70, 0x2, 0x0, 0x0, 0xfffffff1, "", [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="ccef6db02bc75df8dd0bec32da46b0cdf9b33ac05208c98f8d5b7f85331efa432204f8ed3429243788b5f9dd3e880b281a3766e6cd9dc5c2901cb7f13f2309d45a61dfc137dd2d94e5156057de2d7d2d1b9569c252"]}, 0x70}], 0x2}, 0x0) 00:58:00 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 00:58:00 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa, 0x0, 0x2800}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\x10\x00'}]}, 0x1c}}, 0x0) 00:58:00 executing program 0: setresuid(0xee01, 0x0, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000080)) setresuid(0x0, r0, 0x0) r1 = add_key$keyring(&(0x7f0000001240), &(0x7f0000001280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r1, 0x0) 00:58:00 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) [ 370.929544][T17323] netlink: 67 bytes leftover after parsing attributes in process `syz-executor.4'. 00:58:00 executing program 4: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) unshare(0x48000000) 00:58:00 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x101042, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x40000006) fallocate(r0, 0x20, 0x0, 0x10000) fallocate(r0, 0x0, 0x3f000000, 0x10000101) 00:58:00 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10a, &(0x7f00000005c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:58:00 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/config', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 00:58:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() waitid(0x2, 0x0, 0x0, 0x2, 0x0) tkill(r1, 0x13) 00:58:00 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 00:58:00 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0, 0x0) lgetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='user.incfs.size\x00', 0x0, 0x0) 00:58:00 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000700)={[{@block}]}) 00:58:00 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 00:58:00 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x101042, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x40000006) fallocate(r0, 0x20, 0x0, 0x10000) fallocate(r0, 0x0, 0x3f000000, 0x10000101) 00:58:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x11, &(0x7f0000000140)="a0a5111171be735ee46ed39472b43dc9ce"}) 00:58:00 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80b6, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socket(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 00:58:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000040)=0x8, 0x4) 00:58:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() waitid(0x2, 0x0, 0x0, 0x2, 0x0) tkill(r1, 0x13) 00:58:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000100)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') 00:58:03 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x0, 0x0, 0x7ff, 0x4, 0x96, 0x7}) 00:58:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() waitid(0x2, 0x0, 0x0, 0x2, 0x0) tkill(r1, 0x13) 00:58:03 executing program 1: setreuid(0xee01, 0xee01) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x17b8c1, 0x0) 00:58:03 executing program 5: r0 = open(&(0x7f0000000100)='./bus\x00', 0x101042, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="ed", 0x1}], 0x1, 0x0, 0x0) fallocate(r1, 0x20, 0x0, 0xfffffeff000) fallocate(r0, 0x0, 0x0, 0x40000006) fallocate(r0, 0x20, 0x0, 0x10000) fallocate(r0, 0x0, 0x3f000000, 0x10000101) 00:58:03 executing program 4: r0 = syz_io_uring_setup(0x48f, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) ppoll(&(0x7f0000000240)=[{r0}], 0x1, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x3f3, 0x0, 0x0, 0x0, 0x0) 00:58:03 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801, 0x0, 0x97260000}]}) 00:58:03 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x6a}, @val={0xc}}}}, 0x28}}, 0x0) [ 374.074007][T17423] loop2: detected capacity change from 0 to 4096 [ 374.104496][T17437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17437 comm=syz-executor.1 00:58:03 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x134, r1, 0x601, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0x106, 0x1, '\x02\x80\x03l\x14\x10\xbc\x90;\xa8F\xcd3\xb86e_qS\r\xbc\x88;\x14afZa7-\xbf\xf4\xd2\n\x8a\xcdB\xd2\xa61\x1a\t{\xa5#|1@2FMr\xf6=\xa7\x88\x1a<\xf5\x93\xb6\xaf\xd0 L\xba\x95H\xf9\xe4\xb7[)\x19#\xb4\x83\xb7D\x1c\x02CR\xf6)bs\xc3\xa4\xb0\xe0l\x95\x7f\xa3\x18\xf7\x04\xd2)\xe6@\xaa\xe0\xcet\x99\x1d\x17\xe5&\xe7h#\xbc9\xd2u.h%\xbf\".aD\xf8)5\xf47\x87p\x18\xf4\x95\x0e\xa1SY\n\xfbn\xbe\xb1\xbef\xfe\xae\x14\xb2\x13\x88\x06\xbd\a\xb4\x90\xf2\xc5\x04+\x86l\x1e\x83\x1aA\x95\xd0\x0e\x03/\xde\x1a\xccNT\xf4\xad\x99\x83\xaf\x81Nz\xb2@\x1e\x82>:\xc9n\xe8\x16,\xccu\a(h>\x015\xadd\xce\x99k{\x91\xd9[B\xd3\x1f>{\xf6.\xa3d\xce\x7f\xb0\xaa\xe6~\xf45\xd4v7z\xffJ\xdeN\xd5\xb1\xa2t\xacj\xb8h\xe5\x98\xb6\xf3\xa0\xe0\xbc\x1d\x00\x0f\xf7'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback=0x7f000005}, @NLBL_MGMT_A_IPV4ADDR={0x4, 0x7, @multicast1}]}, 0x134}}, 0x0) 00:58:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() waitid(0x2, 0x0, 0x0, 0x2, 0x0) tkill(r1, 0x13) [ 374.110154][T17423] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 00:58:03 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 00:58:03 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801, 0x0, 0x97260000}]}) [ 374.164536][T17445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 374.175099][T17450] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:58:03 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='nr_inodes=1']) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 00:58:03 executing program 1: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}], 0x22}) 00:58:03 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801, 0x0, 0x97260000}]}) 00:58:03 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0x0, "0818078a7bbeedecc84bc25ced1ebb8ba326a8cbf0f99becbb3fd76ddf3f208a8b54ccc68dbcd7acd3c310fa5aebe80371f462b2a2f46c5048e96316ceb278c2"}, 0x48, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0xb, r0, 0xfffffffffffffffd, 0x0, 0x0) 00:58:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x3, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@hci={0x1f, 0x0, 0x2}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)="f254294737bb0057", 0x5c8}], 0x1}, 0x0) [ 374.244274][T17463] tmpfs: Unknown parameter '"' [ 374.267714][T17463] tmpfs: Unknown parameter '"' 00:58:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=@newsa={0x10c, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in=@loopback}, {@in=@dev, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x10c}}, 0x0) 00:58:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x24, r1, 0x17e7c6c974a05bd9, 0x0, 0x0, {{}, {@val={0x8, 0x11a}, @val={0x8}, @void}}}, 0x24}}, 0x0) 00:58:04 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x252a, 0x8ad6, 0x3000000, '\x00', [{}, {0x801, 0x0, 0x97260000}]}) 00:58:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f0000001600)=[{0x0}, {&(0x7f0000000240)="84", 0x1}], 0x2, 0x0, 0x0) 00:58:04 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000000) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') preadv(r1, &(0x7f0000000180)=[{&(0x7f0000027040)=""/102395, 0x18ffb}], 0x1, 0x0, 0x0) 00:58:04 executing program 5: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x1d8000) 00:58:04 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0c80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 00:58:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0xa0}}, 0xe8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 00:58:04 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x20) lseek(r0, 0x0, 0x4) [ 374.921633][T17490] netlink: 'syz-executor.2': attribute type 282 has an invalid length. 00:58:04 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x158) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:58:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080), 0x8) 00:58:04 executing program 2: creat(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@md0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0) 00:58:04 executing program 5: add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) [ 374.981575][T17502] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.1'. 00:58:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)={0x120, 0x32, 0x1, 0x0, 0x0, "", [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0x8, 0x1, 0x0, 0x0, @ipv4=@multicast1}, @nested={0xfd, 0x0, 0x0, 0x1, [@generic="f3df8a30245bcffb1a87999f5514ba89766d2481515bce79aca8d87343f936cd5dbb664ab8d42a8f63504e1a11fecd1e6c7c547274ed7d027c4c51bab75555cb91b636623867a41ddcbf942988195b91", @typed={0x8, 0x0, 0x0, 0x0, @pid}, @generic="3a98f661e0e1", @typed={0x69, 0x0, 0x0, 0x0, @binary="50432e5df83565ca721ef580fc37394b3c7e6628bad4f09c6684c9860f3234a0dedf8b11a9f14d0b13bca306f1e997462e78fabceadf50605e17cef98488dc06c9768fe3e1be41e956d9b771942d9fd6ff770da414dcc72b299d70dbd3f9b4e189b9886df4"}, @generic="1bb52abfb6053e9856cd87dced50f665e253aea18384ffa905a4cae825000000", @generic="88182229a2c73d97c19b07574bdf2d"]}]}, 0x120}], 0x1}, 0x0) 00:58:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$RTC_PIE_ON(r1, 0x7005) read$eventfd(r1, &(0x7f00000000c0), 0x8) 00:58:04 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)=@updsa={0xfc, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0xa}, [@offload={0xc}]}, 0xfc}}, 0x0) 00:58:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) link(0x0, 0x0) 00:58:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000840)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245deacb1f630e4052b9d6c20a45c772242f63a6bf41a08f4951d60a70381691f296d588ee40d58160fa80f4e9461103fa13cdce25381a61500f763b300ac9c3b764a21eae193e82bb2368", 0xed}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:58:04 executing program 5: r0 = fork() ioprio_set$pid(0x1, r0, 0x0) 00:58:04 executing program 4: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(0x0, &(0x7f0000000380)=[{0x1, 0xffff}], 0x1) semop(r0, &(0x7f0000000040)=[{0x4, 0xde}, {0x4}], 0x2) semop(r0, &(0x7f0000000380), 0x1d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) semop(r0, &(0x7f0000000080)=[{0x1, 0x8ce}], 0x1) 00:58:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000010000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="ed41000000040000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800030000000af30100040000000000000000000000010000005000000000000000000000000000000000000000000000000000000000000000000000000000000011c938eb000000000000000000000000000000000000000000000000ed8100001a040000d8f4655fd8f4655fd8f4655f00000000000001002000000000000800010000000af3010004000000000000000000000002000000600000000000000000000000000000000000000000000000000000000000000000000000000000006718be5a000000000000000000000000000000000000000000000000ffa1000026000000d8f4655fd8f4655fd8f4655f0000000000fe98000000000000000000010000002f746d702f73797a2d696d61676567656e3234353030333038362f66696c65302f66696c65300000000000000000000000000000000000000000000069f94ae3000000000000000000000000000000000000000000000000ed8100000a000000d8f4655fd8f4655fd8f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000700000000000000000000000000000000000000000000000000000000000000000000000000000009ea5744c800000000000000000000000000000000000000000000000ed81000028230000d8f4655fd8f4655fd8f4655f00000000000002002000000000000800010000000af3", 0x22a, 0x1980}, {&(0x7f0000000500)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 00:58:04 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x17) [ 375.102493][T17531] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 00:58:04 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) 00:58:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) link(0x0, 0x0) 00:58:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x40, &(0x7f0000000000)=@dstopts={0x0, 0x9, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0]}}, @enc_lim, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x58) 00:58:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, 0x1c) 00:58:04 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fd215f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a5528", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 375.179185][T17558] loop2: detected capacity change from 0 to 24576 00:58:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 00:58:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) link(0x0, 0x0) 00:58:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) write(r3, &(0x7f0000000280)="92", 0x1) write$binfmt_misc(r3, 0x0, 0x4) read(r2, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) [ 375.263665][T17558] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #16: comm syz-executor.2: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 375.281493][T17558] EXT4-fs error (device loop2): ext4_orphan_get:1392: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 375.293919][T17558] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:58:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) link(0x0, 0x0) [ 375.306320][T17558] ext4 filesystem being mounted at /root/syzkaller-testdir240656572/syzkaller.C3tSSJ/433/file0 supports timestamps until 2038 (0x7fffffff) 00:58:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 00:58:05 executing program 3: openat2(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)={0x4041, 0x0, 0x24}, 0x18) 00:58:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000010000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x22a, 0x1980}, {&(0x7f0000000500)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 00:58:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="43530700ae89709404000000000000565a17cef58ae74833b0", 0x19}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:58:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 00:58:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) write(r3, &(0x7f0000000280)="92", 0x1) write$binfmt_misc(r3, 0x0, 0x4) read(r2, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 00:58:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x2a6e, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x1) [ 376.099418][T17631] loop2: detected capacity change from 0 to 24576 [ 376.130517][T17631] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #16: comm syz-executor.2: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) 00:58:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x2a6e, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x1) 00:58:05 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="43530700ae89709404000000000000565a17cef58ae74833b0", 0x19}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:58:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 376.148066][T17631] EXT4-fs error (device loop2): ext4_orphan_get:1392: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 376.160256][T17631] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:58:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 00:58:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x2a6e, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x1) 00:58:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000010000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x22a, 0x1980}, {&(0x7f0000000500)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 376.210951][T17631] ext4 filesystem being mounted at /root/syzkaller-testdir240656572/syzkaller.C3tSSJ/434/file0 supports timestamps until 2038 (0x7fffffff) 00:58:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x2a6e, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r4, 0x1) 00:58:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) [ 376.286793][T17674] loop2: detected capacity change from 0 to 24576 00:58:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0775570000000012833c9596f5590900aba62d0000070000000000000013"], 0x41) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) read(r0, &(0x7f0000001c40)=""/238, 0xee) r1 = syz_open_pts(r0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 00:58:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) write(r3, &(0x7f0000000280)="92", 0x1) write$binfmt_misc(r3, 0x0, 0x4) read(r2, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 00:58:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x2000c10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x5) [ 376.334868][T17674] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #16: comm syz-executor.2: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 376.352539][T17674] EXT4-fs error (device loop2): ext4_orphan_get:1392: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 376.364783][T17674] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 376.375531][T17674] ext4 filesystem being mounted at /root/syzkaller-testdir240656572/syzkaller.C3tSSJ/435/file0 supports timestamps until 2038 (0x7fffffff) 00:58:05 executing program 4: rt_sigaction(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) 00:58:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000010000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x22a, 0x1980}, {&(0x7f0000000500)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) [ 376.426664][T17697] loop3: detected capacity change from 0 to 87 [ 376.450658][T17697] attempt to access beyond end of device [ 376.450658][T17697] loop3: rw=0, want=94, limit=87 [ 376.475058][T17709] attempt to access beyond end of device [ 376.475058][T17709] loop3: rw=2049, want=98, limit=87 [ 376.486572][T17711] loop2: detected capacity change from 0 to 24576 [ 376.487578][T17697] attempt to access beyond end of device [ 376.487578][T17697] loop3: rw=2049, want=108, limit=87 [ 376.508934][T17711] EXT4-fs error (device loop2): ext4_ext_check_inode:459: inode #16: comm syz-executor.2: pblk 0 bad header/extent: invalid eh_max - magic f30a, entries 0, max 0(0), depth 0(0) [ 376.526735][T17711] EXT4-fs error (device loop2): ext4_orphan_get:1392: comm syz-executor.2: couldn't read orphan inode 16 (err -117) [ 376.538942][T17711] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 376.549711][ T4389] attempt to access beyond end of device [ 376.549711][ T4389] loop3: rw=1, want=100, limit=87 [ 376.550178][T17711] ext4 filesystem being mounted at /root/syzkaller-testdir240656572/syzkaller.C3tSSJ/436/file0 supports timestamps until 2038 (0x7fffffff) [ 376.560257][ T4389] Buffer I/O error on dev loop3, logical block 49, lost async page write [ 376.590845][ T4389] attempt to access beyond end of device [ 376.590845][ T4389] loop3: rw=1, want=102, limit=87 [ 376.601396][ T4389] Buffer I/O error on dev loop3, logical block 50, lost async page write 00:58:08 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="43530700ae89709404000000000000565a17cef58ae74833b0", 0x19}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:58:08 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 00:58:08 executing program 4: sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000140), 0xc, 0x0}, 0x8c0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000240)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c007f137fafe4c9bd626617331b87dd9f261d3f0128b77642f8884bd0329f9f3e10a9456170302787a6850172f32dc47c8816ad63a17c45ca97ad9f3c5226e60d0b549b74b4d8bec4bc452ca843f21f97a83f4dacef5b98cc44c71c46d91a216959cc48b8d9972021d6a01d15132a66de69cddfe7841cf0cbab1b1c356150fb16096d887c81b17b5208359f48df2f9cd9ba1db286f40ca3434fb080539bb19922f6b9a068d4fc0fd2dc51ac"]) 00:58:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x2000c10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x5) 00:58:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 00:58:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x10000, 0x0) write(r3, &(0x7f0000000280)="92", 0x1) write$binfmt_misc(r3, 0x0, 0x4) read(r2, &(0x7f0000000180)=""/185, 0xfffffdef) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0x10034) 00:58:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x16, 0x0, 0x0) [ 379.246679][T17736] loop4: detected capacity change from 0 to 1051 [ 379.249555][T17740] loop3: detected capacity change from 0 to 87 [ 379.259363][T17739] loop2: detected capacity change from 0 to 16 [ 379.262453][T17736] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 00:58:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000480), &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001840), 0x8cffffff, &(0x7f0000001900)) [ 379.293555][T17739] attempt to access beyond end of device [ 379.293555][T17739] loop2: rw=34817, want=184, limit=16 [ 379.314203][T17740] attempt to access beyond end of device [ 379.314203][T17740] loop3: rw=0, want=94, limit=87 [ 379.324895][T17736] EXT4-fs (loop4): orphan cleanup on readonly fs [ 379.325003][T17736] EXT4-fs error (device loop4): ext4_free_inode:282: comm syz-executor.4: reserved or nonexistent inode 3 00:58:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x2000c10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x5) 00:58:08 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0x2405, 0x0) 00:58:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x101280, 0x2) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) creat(&(0x7f0000000280)='./file1\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/13, 0xd}], 0x1, 0x7fff, 0xa7) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$DEVLINK_CMD_SB_POOL_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6}}]}, 0x33fe0}}, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000000)=0x6, 0x4) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8}]}]}, 0x28}}, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000140), 0x24, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000200), 0x24, 0x0) [ 379.356596][T17736] EXT4-fs (loop4): Remounting filesystem read-only [ 379.363250][T17736] EXT4-fs warning (device loop4): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 379.377508][T17736] EXT4-fs (loop4): Cannot turn on quotas: error -22 [ 379.384131][T17736] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 00:58:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 379.461654][T17780] loop3: detected capacity change from 0 to 87 [ 379.500186][T17780] attempt to access beyond end of device [ 379.500186][T17780] loop3: rw=0, want=94, limit=87 [ 379.529645][T17793] loop2: detected capacity change from 0 to 16 [ 379.549616][T17793] attempt to access beyond end of device [ 379.549616][T17793] loop2: rw=34817, want=184, limit=16 [ 379.662570][ T1786] attempt to access beyond end of device [ 379.662570][ T1786] loop2: rw=1, want=256, limit=16 00:58:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="43530700ae89709404000000000000565a17cef58ae74833b0", 0x19}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:58:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000ace670325132510000e670325104", 0x7b, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000040)='./file0\x00') truncate(&(0x7f0000000280)='./file0/file0\x00', 0x60) 00:58:11 executing program 5: shmctl$SHM_LOCK(0x0, 0xb) 00:58:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f00000000c0)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)=';', 0x1) sendfile(r0, r1, 0x0, 0x10000) 00:58:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x2000c10, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4100) ftruncate(r0, 0x800) lseek(r0, 0x1200, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) ftruncate(r2, 0x5) 00:58:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 382.288618][T17809] loop3: detected capacity change from 0 to 87 [ 382.291656][T17814] loop2: detected capacity change from 0 to 16 [ 382.300334][T17817] loop4: detected capacity change from 0 to 512 [ 382.301149][T17815] loop1: detected capacity change from 0 to 16 00:58:11 executing program 5: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}], [], 0x6b}}) [ 382.338965][T17815] FAT-fs (loop1): error, clusters badly computed (1 != 0) [ 382.346242][T17815] FAT-fs (loop1): Filesystem has been set read-only [ 382.358894][T17809] attempt to access beyond end of device [ 382.358894][T17809] loop3: rw=0, want=94, limit=87 [ 382.363797][T17814] attempt to access beyond end of device [ 382.363797][T17814] loop2: rw=34817, want=184, limit=16 00:58:11 executing program 3: r0 = fsopen(&(0x7f0000000100)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x0) 00:58:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000ace670325132510000e670325104", 0x7b, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000040)='./file0\x00') truncate(&(0x7f0000000280)='./file0/file0\x00', 0x60) 00:58:11 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x0, r2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000080)={0x40000015}) epoll_wait(r4, &(0x7f0000000040)=[{}], 0x1, 0x1000) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) [ 382.394704][T17817] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:58:11 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 00:58:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = open(&(0x7f0000000180)='./bus\x00', 0x100000169042, 0x0) ftruncate(r2, 0x10099b8) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) [ 382.483095][ T1786] attempt to access beyond end of device [ 382.483095][ T1786] loop2: rw=1, want=256, limit=16 [ 382.495648][T17861] loop1: detected capacity change from 0 to 16 [ 382.518599][T17861] FAT-fs (loop1): error, clusters badly computed (1 != 0) [ 382.525860][T17861] FAT-fs (loop1): Filesystem has been set read-only [ 382.560163][T17877] loop2: detected capacity change from 0 to 16 [ 382.579888][T17877] attempt to access beyond end of device [ 382.579888][T17877] loop2: rw=34817, want=184, limit=16 [ 382.658112][ T1786] attempt to access beyond end of device [ 382.658112][ T1786] loop2: rw=1, want=256, limit=16 00:58:14 executing program 2: setregid(0x0, 0xee00) r0 = getegid() setfsgid(r0) 00:58:14 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 00:58:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000ace670325132510000e670325104", 0x7b, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000040)='./file0\x00') truncate(&(0x7f0000000280)='./file0/file0\x00', 0x60) 00:58:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') lseek(r0, 0x20, 0x0) 00:58:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1b}]}, 0x1c}}, 0x0) 00:58:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000080)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000780)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020202b202020201000ace670324132510000e670325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020202000ace670325132510000e670325104", 0x7b, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000040)='./file0\x00') truncate(&(0x7f0000000280)='./file0/file0\x00', 0x60) 00:58:14 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x0, 0xffffffa1}, {0x15, 0x0, 0x0, 0x7}, {0x6, 0x0, 0x0, 0x7ffffdbf}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 00:58:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 00:58:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') lseek(r0, 0x20, 0x0) [ 385.324957][T17902] loop1: detected capacity change from 0 to 16 [ 385.337118][T17902] FAT-fs (loop1): error, clusters badly computed (1 != 0) [ 385.344555][T17902] FAT-fs (loop1): Filesystem has been set read-only 00:58:14 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x0, r2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000080)={0x40000015}) epoll_wait(r4, &(0x7f0000000040)=[{}], 0x1, 0x1000) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 00:58:14 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 00:58:14 executing program 1: syz_io_uring_setup(0x17a7, &(0x7f0000000600)={0x0, 0xfffffffe, 0x8}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000680), &(0x7f00000006c0)) 00:58:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') lseek(r0, 0x20, 0x0) 00:58:14 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setitimer(0x0, 0x0, 0x0) [ 385.408313][T17919] loop1: detected capacity change from 0 to 16 [ 385.425055][T17919] FAT-fs (loop1): error, clusters badly computed (1 != 0) [ 385.432222][T17919] FAT-fs (loop1): Filesystem has been set read-only [ 385.443251][T17920] loop0: detected capacity change from 0 to 3480 00:58:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') lseek(r0, 0x20, 0x0) 00:58:14 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigsuspend(&(0x7f0000000180), 0x8) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x4240a2a0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) [ 385.549057][ T25] audit: type=1326 audit(1622941094.873:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 385.575460][T17945] syz-executor.3 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 00:58:14 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 00:58:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) [ 385.580011][ T25] audit: type=1326 audit(1622941094.903:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=38 compat=0 ip=0x4665d9 code=0x7ffc0000 00:58:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 00:58:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setitimer(0x0, 0x0, 0x0) [ 385.628914][ T25] audit: type=1326 audit(1622941094.953:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:58:15 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x0, r2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000080)={0x40000015}) epoll_wait(r4, &(0x7f0000000040)=[{}], 0x1, 0x1000) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 00:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 385.720707][ T25] audit: type=1326 audit(1622941094.993:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665d9 code=0x7ffc0000 00:58:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setitimer(0x0, 0x0, 0x0) 00:58:15 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setitimer(0x0, 0x0, 0x0) 00:58:15 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) [ 385.764429][T17968] loop4: detected capacity change from 0 to 3480 00:58:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7d, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a59320ff79b040f762910016775a8454cc16dc38f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689bce0e2db60713a3a7eeba5c9c6a47312334c2a97a4837714569255344e22045dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b149"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) [ 385.819607][T17980] loop0: detected capacity change from 0 to 3480 [ 385.872490][ T25] audit: type=1326 audit(1622941094.993:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17937 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 00:58:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c0009cf2be6fc837414a48f987277c20e9f230310e73e8bcba391e5c94ca29c4c1cbe28917b5f9848069fe20e09ff4be98bc720a05c91ea704f7ddddd6d9ae00e15930f117a87fa82e030095f4bb348650a0eba6d974ce385fbc82e408e0bebff2f3ddd3100bec175abb37a08bcf7e4d631a18574c4f3824ed8b346b0bd365901591539664dc40784d42d9d454ae224f67879e8b741b5c3d69a752647038d9463a0a47bbadb46b64ff44b088652764832a707e60a6753b1ab6d3f353a790a95742732d232b5ae978cf7dee2a84d25ed2fb7772052664fedcf3affbe696e13393713b25db0c319defe32000000000000000000f1043144fa62ebd06fe0538b275079fee3f3f23ed394ea9a609eaee953d631c6449c58075d0c34eb7c3681db057671cec32e26163f50f7824a8476eaa4a7f289220bbfdeb7946c00c8e016a2abee2a3f70659654031cb0f17da3c070b10be3fd54870c4122fdfc42323f000000b00f8346b2b7c99a96b326c0c82fb338e70ad3e8e8de383b5377aed24d57188b0188f97217a64bd5e0df20b1b2a3"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) [ 385.901155][ T25] audit: type=1326 audit(1622941095.043:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 385.935250][ T25] audit: type=1326 audit(1622941095.043:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 385.970244][ T25] audit: type=1326 audit(1622941095.073:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=38 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 385.997446][ T25] audit: type=1326 audit(1622941095.073:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 386.022375][ T25] audit: type=1326 audit(1622941095.073:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=17963 comm="syz-executor.3" exe="/root/syz-executor.3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x7ffc0000 [ 386.079478][T18011] loop4: detected capacity change from 0 to 3480 00:58:15 executing program 1: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000005c40)=[{{&(0x7f0000000040)=@l2={0x1f, 0x0, @fixed}, 0x80, 0x0}}, {{&(0x7f0000000040)=@caif=@rfm={0x25, 0x2, "72bbdf73e8fef8ccecc67905dd7100"}, 0x80, 0x0}}], 0x2, 0x0) 00:58:15 executing program 5: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffc]}, 0x8, 0x0) r4 = epoll_create1(0x0) r5 = fcntl$dupfd(r4, 0x0, r2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r3, &(0x7f0000000080)={0x40000015}) epoll_wait(r4, &(0x7f0000000040)=[{}], 0x1, 0x1000) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 00:58:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x84, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast1}, @CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MAX={0x10}]}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x84}}, 0x0) 00:58:15 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 00:58:15 executing program 2: io_cancel(0x0, 0xfffffffffffffffd, 0x0) 00:58:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d303030303030303030302c757466383d302c666d61736b3d30303030303030303030303030303030303030303030302c0009cf2be6fc837414a48f987277c20e9f230310e73e8bcba391e5c94ca29c4c1cbe28917b5f9848069fe20e09ff4be98bc720a05c91ea704f7ddddd6d9ae00e15930f117a87fa82e030095f4bb348650a0eba6d974ce385fbc82e408e0bebff2f3ddd3100bec175abb37a08bcf7e4d631a18574c4f3824ed8b346b0bd365901591539664dc40784d42d9d454ae224f67879e8b741b5c3d69a752647038d9463a0a47bbadb46b64ff44b088652764832a707e60a6753b1ab6d3f353a790a95742732d232b5ae978cf7dee2a84d25ed2fb7772052664fedcf3affbe696e13393713b25db0c319defe32000000000000000000f1043144fa62ebd06fe0538b275079fee3f3f23ed394ea9a609eaee953d631c6449c58075d0c34eb7c3681db057671cec32e26163f50f7824a8476eaa4a7f289220bbfdeb7946c00c8e016a2abee2a3f70659654031cb0f17da3c070b10be3fd54870c4122fdfc42323f000000b00f8346b2b7c99a96b326c0c82fb338e70ad3e8e8de383b5377aed24d57188b0188f97217a64bd5e0df20b1b2a3"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 00:58:15 executing program 1: io_setup(0x8, &(0x7f00000000c0)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000340)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x3, 0x0, r3, 0x0, 0x0, 0x1}]) 00:58:15 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmctl$IPC_SET(0x0, 0xf, &(0x7f0000000280)={{0x0}}) 00:58:15 executing program 2: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0xffc00807, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000180)={[{}]}) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 386.511550][T18029] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 386.532741][T18027] loop0: detected capacity change from 0 to 3480 [ 386.550267][T18031] loop4: detected capacity change from 0 to 3480 00:58:15 executing program 3: r0 = getpid() unshare(0x6c060680) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1000000000015) [ 386.592178][T18046] loop2: detected capacity change from 0 to 264192 00:58:15 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81ff, 0x0) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x11) fcntl$setlease(r2, 0x400, 0x1) creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) close(r2) 00:58:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1000000000022, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) write$binfmt_misc(r1, 0x0, 0xfb) 00:58:16 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f0000000180), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x31}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) [ 386.649713][T18046] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:58:16 executing program 2: unshare(0x400) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000640)={{0x77359400}, {0x77359400}}, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 00:58:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240040000f801", 0xffffffffffffffbc}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x5) utime(&(0x7f00000000c0)='./file1\x00', 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x294, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x50, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ID={0xe1, 0x3, "2adf4d173c66e7bfd454b69e2ea32b4ab865def364ae8d27d0a982c132ff99ef8e98987af9f013e6dee69435d9f3cee24eb9c6f403c86eb45e0124abe4651eed873e845dbd9e8481ebc3743b4e069f3c5b45cd8a7b9f8fba519ae50ef8faa54511a970ccfb63c03338390b21398669680541b4994254bc9be2346f50dc719bf6ec6319e6afc18063199d6230ac49d8a675a33e658c6e8f1a0597feef8d2094ac309b8ff43b3be04eb40121d3209f3e22ef65ab29024734d7f28da82dddba803fe927d0106735197e660e6ec93ac473879e676d9aad113d9b7f038092c8"}, @TIPC_NLA_NODE_ID={0x59, 0x3, "f0f7de2e8e363b8476edd4f5703111455fcf7674a7470419cfe2a6af8f412be787c5984e9f3cd1b2086de5d189b2f32a3b8aa2b58debaac9f3c620e94c6108c0e7715021007f430b4ee1395a95a1a5a62f931a7aa4"}, @TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_ID={0x7, 0x3, "898160"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "b563551b0d4ed3f9d9f75fad0bd8865e5b6ee1c0118057827159775954d827522d00b2"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x38, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x34, 0x3, "dc37ff827983eac8eba48cce2420ba5c359c137df0b52f1b2f9d0c614412f18b83b57a0a9db186437a17dcbc641a56dd"}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x4044015}, 0x8040) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20044000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000280)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) r5 = add_key$fscrypt_provisioning(&(0x7f0000000500), &(0x7f0000000540)={'syz', 0x0}, &(0x7f0000000980)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffff9) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000a00)={@desc={0x1, 0x0, @desc4}, 0x21, r5, '\x00', @c}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) 00:58:16 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x6, r1, 0x0, 0x0) [ 386.721942][ T1786] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:58:16 executing program 4: rt_sigaction(0x2e, 0x0, 0x0, 0x8, &(0x7f0000000200)) 00:58:16 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x2287, 0x7fffffffefff) [ 386.804620][T18081] loop0: detected capacity change from 0 to 3480 00:58:16 executing program 2: r0 = fsopen(&(0x7f0000000040)='sockfs\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x14812, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 00:58:16 executing program 4: shmat(0x0, &(0x7f0000ff9000/0x3000)=nil, 0xbe204265bb6d6200) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) 00:58:16 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x165, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:58:16 executing program 3: r0 = getpid() unshare(0x6c060680) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1000000000015) 00:58:16 executing program 4: io_setup(0x7, &(0x7f0000000040)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0}) 00:58:16 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f00000001c0)) 00:58:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0x8) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r2, 0x90e, 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0xffff, 0x0, 0x0, 0x0, 0x0, "6e3f4164127740e07913c807b2c5104d18c41f"}) 00:58:16 executing program 5: set_mempolicy(0x3, &(0x7f0000000000)=0x9, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000740)={0x2, &(0x7f0000000700)=[{0x25}, {0x6}]}) 00:58:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_create(0x0) 00:58:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x10000, 0x0) fcntl$setpipe(r2, 0x407, 0x0) writev(r1, &(0x7f0000001300)=[{&(0x7f0000000200)='P', 0x1}], 0x1) 00:58:17 executing program 5: epoll_pwait(0xffffffffffffffff, 0xfffffffffffffffe, 0x25, 0x0, 0x0, 0x0) 00:58:17 executing program 4: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000005c0)=[{0x0}, {0xfffffffffffffffc}], 0x2, 0x0) 00:58:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) fcntl$getflags(r1, 0x401) 00:58:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "0000070000000000fae636fc000000cc1000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0xf8d, 0x0, 0x0, 0x10001, 0x0, "2ecb67ce1232418eaba0731b986e5c9eb0d818"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)) 00:58:17 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) fdatasync(r0) 00:58:17 executing program 3: r0 = getpid() unshare(0x6c060680) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1000000000015) 00:58:17 executing program 0: syz_read_part_table(0x0, 0x5, &(0x7f0000000080)=[{&(0x7f00000000c0)="0201bfffffffc4c10100ff45ac0480ffffffbf800800000000000000024000ffffff81000000e10000008877007200300700a5ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:58:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x181080, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = mq_open(&(0x7f0000000140)='.\'\x00', 0x42, 0x0, 0x0) r2 = dup2(r1, r1) mq_timedreceive(r2, &(0x7f000001e740)=""/102389, 0x18ff5, 0x0, 0x0) 00:58:17 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="24000000180003041dfffd946f6105000200030a1f00000811100800080005400a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 00:58:17 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) fdatasync(r0) 00:58:17 executing program 1: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x28) 00:58:17 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x4000000000010046) 00:58:17 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) fdatasync(r0) [ 388.554514][T18202] loop0: detected capacity change from 0 to 264192 00:58:17 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="24000000180003041dfffd946f6105000200030a1f00000811100800080005400a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) [ 388.628103][T18202] loop0: p1 < > p3 p4 [ 388.639803][T18202] loop0: p4 size 3657465856 extends beyond EOD, truncated 00:58:18 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:58:18 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="24000000180003041dfffd946f6105000200030a1f00000811100800080005400a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 00:58:18 executing program 5: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0xd4fa3fe959b9ad8}, 0xff7f) fdatasync(r0) 00:58:18 executing program 3: r0 = getpid() unshare(0x6c060680) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect(r2, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1000000000015) 00:58:18 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x4000000000010046) 00:58:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0xb4, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x50, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0xc, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6}, @CTA_PROTONAT_PORT_MIN={0x6}, @CTA_PROTONAT_PORT_MIN={0x5}]}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @multicast1}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @private0}]}]}, 0xb4}}, 0x0) 00:58:18 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="24000000180003041dfffd946f6105000200030a1f00000811100800080005400a000000140000001a00ffffba16a0aa1c0900000a000000", 0x38}], 0x1}, 0x0) 00:58:18 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000580), 0x202080, 0x0) accept4$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14, 0x800) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r1, 0x89f5, &(0x7f0000000240)={'ip6_vti0\x00', &(0x7f00000001c0)={'ip6_vti0\x00', r2, 0x29, 0x2, 0x0, 0x6, 0x0, @loopback, @private0, 0x7800, 0x7, 0x553, 0xe68}}) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000680)) ioctl$RTC_PIE_ON(r0, 0x7005) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000380)={{0x0, 0x1, 0xefe, 0x3, 0x101}, 0x0, 0x5, 'id0\x00', 'timer1\x00', 0x0, 0x684ad692, 0x6b, 0x9, 0x3}) 00:58:18 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x4000000000010046) 00:58:18 executing program 4: set_mempolicy(0x1, &(0x7f0000000000)=0x1f, 0x5) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/mdstat\x00', 0x0, 0x0) 00:58:18 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x4000000000010046) 00:58:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0xfd06) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x43, 0x0, "7fc3eb20dc86d7a0718d638ae8a3ced80d598060e6b0d20e36819465580df86281b2440cd50978bd2b090d43402d88386e2ac0c00eed85421f3d52026a4518084c49e3e4af6e6018460f430cdafce76a"}, 0xd8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x56) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x2b}, 0x0, @in6=@mcast1}}, 0xe8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000000380)="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", 0x4c5, 0x0, 0x0, 0x0) [ 389.491488][T18274] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 00:58:18 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:58:18 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="fdc60b9300a08d994b1b2f"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 00:58:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) [ 389.680802][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 389.694521][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 5: r0 = syz_io_uring_setup(0x19eb, &(0x7f0000000000)={0x0, 0x0, 0x50}, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:58:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x800000071}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 00:58:19 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@rand_addr=' \x01\x00', @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x32}, 0x0, @in, 0x0, 0x1}}, 0xe8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 00:58:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) [ 390.264595][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.282653][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a8687c443fdc0683800c3eb0f365c31c34de8856720000000000000093d5b8c22e287510000000000000002e5d8267491b38ea0b994806ebe884bb2b33f44a7094b42e82e9095c0568ca609fa5553c7cc8a7d6a3cf74fa896774e1c35f797ffeeb11cb8261686dcb28449024ecf9ca7d6c54066f6a2cf0997b7bc1bd682b443300ac6e972b142cf3569a02c2cefcd0fb7e6451b8f7741e23e576f0ab554aea009a4611ab5a31d6", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 390.339050][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.373202][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.373293][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:19 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:58:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000480)={0x1, &(0x7f0000000440)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) 00:58:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) [ 390.553597][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.573713][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 390.606342][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:20 executing program 3: clone(0x20087104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') exit_group(0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 00:58:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAP(r1, 0x5603, &(0x7f0000001140)={0x0, 0x0}) 00:58:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22}, 0x6d) sendto$inet6(r1, &(0x7f00000000c0)="ba", 0x1, 0x40008e5, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCINQ(r2, 0x8905, &(0x7f0000000080)) 00:58:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x800000071}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 00:58:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000000101ff0f00000008000000000a0000000c00198008000100fc0c0000040001"], 0x24}}, 0x0) 00:58:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x1e, 0x0, "e074b4c9825fe8a4a9859a9095facb0b5f737bf27469a408333006c43d18f1b06b802310e581a17c024904f28838a3d1f253feba2c566776f9bbc30e88610b2a", "3ba62b26344a32aa506783e62a5aaa07d59564316da15211fd7f8d3af7073f00"}) 00:58:20 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:58:20 executing program 4: sync() ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, 0x0) 00:58:20 executing program 0: mmap(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x3, 0x31, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000048000/0x1000)=nil, 0x1000, 0x6, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x16) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:58:20 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0xffffffffffffffc0) 00:58:20 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_setup(0x844, &(0x7f0000000080), &(0x7f000014a000/0x1000)=nil, &(0x7f0000146000/0x3000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000180)) r4 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000480)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40010040}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:58:20 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:58:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x800000071}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 00:58:20 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:58:20 executing program 4: keyctl$restrict_keyring(0x6, 0xfffffffffffffffd, 0x0, 0x0) 00:58:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 00:58:20 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/mdstat\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) 00:58:20 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x6) 00:58:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(0x0, 0x0) [ 391.553572][T18432] new mount options do not match the existing superblock, will be ignored [ 391.584433][T18432] new mount options do not match the existing superblock, will be ignored 00:58:21 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:58:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 00:58:21 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') exit(0x0) pread64(r0, 0x0, 0x0, 0x0) 00:58:21 executing program 4: r0 = syz_io_uring_setup(0xd1b, &(0x7f0000000840), &(0x7f0000ee4000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000800)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_CONNECT={0x10, 0x4, 0x0, r3, 0x80, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x0, 0x0, 0x0, {0x0, r4}}, 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r5, 0x0, &(0x7f0000001500)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 00:58:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x1040c) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x800000071}) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000200)="e0", 0x1}], 0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 00:58:21 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000001c0)=[{0x0, 0x3, 0x0, 0x0, @time={0x0, 0x1f}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x2f3}) 00:58:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x29, 0x35, 0x0, 0x0) 00:58:21 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 00:58:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 00:58:21 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x4c, 0x1c, 0x1, 0x0, 0x0, {0x7}}, 0x4c}}, 0x0) [ 392.358891][T18471] new mount options do not match the existing superblock, will be ignored 00:58:21 executing program 4: clone(0x82000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000200)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='sit0\x00', 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) 00:58:21 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="c5b8aa81dc0c8d81495f8c"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) [ 392.439372][T18492] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.439759][T18489] new mount options do not match the existing superblock, will be ignored 00:58:22 executing program 5: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0xfffffe58) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)) 00:58:22 executing program 4: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000040)="3a03000019002551075c0165ff0ffc02802000030011000500e1000c040009101a020300", 0x33a) [ 392.717117][T18514] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 392.725256][T18514] netlink: 254 bytes leftover after parsing attributes in process `syz-executor.4'. 00:58:22 executing program 2: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="240000002d0007031dfffd946fa201000100000001000000000000e50c1be3a2f7fffe7e", 0x24}], 0x1}, 0x0) 00:58:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x1) 00:58:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x87e) readv(r1, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/256, 0x10}], 0x2) close(r1) creat(&(0x7f0000000180)='./file0\x00', 0x0) 00:58:22 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x540e, 0x0) 00:58:22 executing program 5: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='#! ./file0 '], 0x191) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) fcntl$setstatus(r1, 0x4, 0x2000) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 393.191719][T18532] new mount options do not match the existing superblock, will be ignored 00:58:22 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 00:58:22 executing program 4: set_mempolicy(0x1, 0x0, 0x0) unshare(0x4a060480) perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 00:58:22 executing program 5: mlockall(0x7) socket$inet6_udp(0xa, 0x2, 0x0) munlockall() 00:58:22 executing program 3: r0 = syz_io_uring_setup(0x76fb, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x8) syz_io_uring_setup(0x89, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f00006d5000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000380)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0x2) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:58:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000000000000025000000040016000c0001000300001f00000606040000000000000000", 0x39}], 0x1) 00:58:22 executing program 1: unshare(0x40400) r0 = epoll_create1(0x0) r1 = io_uring_setup(0x428e, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x2000001a}) 00:58:22 executing program 3: prctl$PR_MCE_KILL(0x23, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) exit_group(0x0) rseq(&(0x7f0000000080), 0x20, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x3, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000040)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000400)=""/240, 0xf0}) [ 393.298447][T18555] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. 00:58:22 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 393.352695][T18558] Y­4`Ò˜: renamed from lo [ 393.400965][T18583] Y­4`Ò˜: renamed from lo 00:58:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) 00:58:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000900)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0xf}]) [ 393.516450][T18598] debugfs: File 'dropped' in directory 'loop7' already present! [ 393.525233][T18598] debugfs: File 'msg' in directory 'loop7' already present! [ 393.533804][T18601] loop4: detected capacity change from 0 to 1019 00:58:22 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000000000024000ffffff81000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:58:22 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 393.567592][T18601] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 393.654433][T18614] loop1: detected capacity change from 0 to 1 [ 393.683054][T18618] debugfs: File 'dropped' in directory 'loop7' already present! [ 393.691121][T18614] loop1: p1 p2 p3 p4 [ 393.691223][T18618] debugfs: File 'msg' in directory 'loop7' already present! [ 393.696045][T18614] loop1: p1 start 10 is beyond EOD, truncated [ 393.708964][T18614] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 393.728824][T18614] loop1: p3 start 225 is beyond EOD, truncated [ 393.735130][T18614] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 393.758954][ T1034] loop1: p1 p2 p3 p4 [ 393.763187][ T1034] loop1: p1 start 10 is beyond EOD, truncated [ 393.769251][ T1034] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 393.777605][ T1034] loop1: p3 start 225 is beyond EOD, truncated [ 393.783908][ T1034] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 393.839170][T18614] loop1: detected capacity change from 0 to 1 00:58:23 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 00:58:23 executing program 5: mlockall(0x7) socket$inet6_udp(0xa, 0x2, 0x0) munlockall() 00:58:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) 00:58:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:58:23 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000000000024000ffffff81000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:58:23 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 394.181825][T18649] loop1: detected capacity change from 0 to 1 [ 394.183069][T18651] debugfs: File 'dropped' in directory 'loop7' already present! [ 394.195696][T18651] debugfs: File 'msg' in directory 'loop7' already present! [ 394.212469][T18653] loop4: detected capacity change from 0 to 1019 00:58:23 executing program 3: prctl$PR_MCE_KILL(0x23, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) exit_group(0x0) rseq(&(0x7f0000000080), 0x20, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x3, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000040)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000400)=""/240, 0xf0}) 00:58:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) [ 394.338845][T18668] debugfs: File 'dropped' in directory 'loop7' already present! [ 394.346613][T18668] debugfs: File 'msg' in directory 'loop7' already present! [ 394.348510][T18649] loop1: p1 p2 p3 p4 [ 394.360407][T18649] loop1: p1 start 10 is beyond EOD, truncated [ 394.366548][T18649] loop1: p2 size 1073872896 extends beyond EOD, truncated 00:58:23 executing program 5: mlockall(0x7) socket$inet6_udp(0xa, 0x2, 0x0) munlockall() [ 394.383278][T18653] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 394.403258][T18649] loop1: p3 start 225 is beyond EOD, truncated [ 394.409531][T18649] loop1: p4 size 3657465856 extends beyond EOD, truncated 00:58:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) 00:58:23 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000000000024000ffffff81000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 394.441412][T18675] loop2: detected capacity change from 0 to 1019 00:58:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) [ 394.491214][T18675] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 394.507272][T18692] loop1: detected capacity change from 0 to 1 [ 394.538490][T18701] loop4: detected capacity change from 0 to 1019 [ 394.582954][T18692] loop1: p1 p2 p3 p4 [ 394.593784][T18692] loop1: p1 start 10 is beyond EOD, truncated [ 394.600036][T18692] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 394.608077][T18701] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 394.608580][T18709] loop2: detected capacity change from 0 to 1019 [ 394.629445][T18692] loop1: p3 start 225 is beyond EOD, truncated [ 394.635660][T18692] loop1: p4 size 3657465856 extends beyond EOD, truncated [ 394.647231][T18709] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:58:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xea2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 00:58:24 executing program 5: mlockall(0x7) socket$inet6_udp(0xa, 0x2, 0x0) munlockall() 00:58:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) 00:58:24 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x5, &(0x7f00000006c0)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014", 0x1d, 0x9400}, {0x0, 0x0, 0x3fbfd}], 0x0, &(0x7f0000000180)=ANY=[]) getdents(r0, &(0x7f00000002c0)=""/68, 0x44) symlink(0x0, 0x0) 00:58:24 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000000000024000ffffff81000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 395.031006][T18733] loop1: detected capacity change from 0 to 1 [ 395.041439][T18731] loop4: detected capacity change from 0 to 1019 [ 395.048172][T18737] loop2: detected capacity change from 0 to 1019 [ 395.074692][T18733] loop1: p1 p2 p3 p4 [ 395.079628][T18737] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 395.085974][T18733] loop1: p1 start 10 is beyond EOD, truncated [ 395.096312][T18733] loop1: p2 size 1073872896 extends beyond EOD, truncated [ 395.113132][T18731] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:58:24 executing program 3: prctl$PR_MCE_KILL(0x23, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) exit_group(0x0) rseq(&(0x7f0000000080), 0x20, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x3, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000040)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000400)=""/240, 0xf0}) 00:58:24 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:58:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffffdbf}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @queue={0x8}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:58:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000003c0), 0x5, 0x40040) preadv(r0, &(0x7f00000029c0)=[{&(0x7f0000001780)=""/80, 0x50}], 0x1, 0x7db1, 0x0) 00:58:24 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x2, 0xf5ffffff, &(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @local}, 0x80) [ 395.236841][T18733] loop1: p3 start 225 is beyond EOD, truncated [ 395.243111][T18733] loop1: p4 size 3657465856 extends beyond EOD, truncated 00:58:24 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:58:24 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x78]}}]}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, &(0x7f0000000280)) [ 395.332567][T18774] debugfs: File 'dropped' in directory 'loop7' already present! [ 395.340620][T18774] debugfs: File 'msg' in directory 'loop7' already present! [ 395.394644][T18784] hugetlbfs: Bad value 'x' for mount option 'nr_inodes' [ 395.394644][T18784] 00:58:25 executing program 5: move_pages(0x0, 0x1, &(0x7f0000001640)=[&(0x7f0000ffb000/0x2000)=nil], &(0x7f0000000100), &(0x7f00000000c0), 0x0) 00:58:25 executing program 4: set_mempolicy(0x1, &(0x7f00000000c0)=0x10001, 0x9) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d}, {0x6}]}) 00:58:25 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, "74c1d906690eb95f22077c3d051537ca873ad1d4abb1cd4235768aae8c8277ca99cbfc3dd8fec5175ac653108857e5ba1525d7a8263445f66783d4cea32bc58e", "b7ee613224bb1ba62a3252cb2486d71fed56dcc51fdb2f3bb2b84aeb455460a2118f05c4ee2c4b2eb5dd248be8864c952c0fa39ca26e390f94e671d10b13e73f", "300c20e6e4d25db856c949ad0553970748f6b35b04875ba0ad26c07033c4ca11"}) 00:58:25 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:58:25 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 395.884384][ T25] kauditd_printk_skb: 9 callbacks suppressed [ 395.884394][ T25] audit: type=1326 audit(1622941105.203:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=18794 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 395.924843][T18803] debugfs: File 'dropped' in directory 'loop7' already present! [ 395.934684][T18803] debugfs: File 'msg' in directory 'loop7' already present! 00:58:25 executing program 3: prctl$PR_MCE_KILL(0x23, 0x3, 0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) prctl$PR_MCE_KILL_GET(0x22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) exit_group(0x0) rseq(&(0x7f0000000080), 0x20, 0x0, 0x0) clock_gettime(0x2, &(0x7f0000000200)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100), 0x3, 0x0) ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f0000000040)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000400)=""/240, 0xf0}) 00:58:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 00:58:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000004000000000ddc15176e1ff"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "636ebbab91c8bd11896496392f08d653912a10"}) 00:58:25 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) r0 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x40, 0x2}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x8000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x40, 0xffff, 0x5, 0x0, 0x48, 0x40, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x8) fchown(0xffffffffffffffff, 0xee01, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 00:58:25 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:58:25 executing program 4: mq_notify(0xffffffffffffffff, 0xfffffffffffffffd) 00:58:25 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f00000000c0)={{}, 0x0, 0x0, @unused, @subvolid=0x9}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)='M', 0x1}], 0x1000000000000316, 0xfffffffd, 0x800000) 00:58:25 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:58:25 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x8000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="5500000018007f7d00fe01b2a4a280930a", 0x11}], 0x1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0x31731add) 00:58:25 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x5411, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}}) 00:58:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00*\x00'], 0x24}], 0x1}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe4, 0x0) [ 396.184460][T18820] debugfs: File 'dropped' in directory 'loop7' already present! [ 396.217974][T18820] debugfs: File 'msg' in directory 'loop7' already present! 00:58:25 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) set_mempolicy(0x1, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x64, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x64}}, 0x0) 00:58:26 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff77040003000020001002002000000000000040000000000000000000", 0xffffffe5}], 0x2) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000680)="b8966b2224000000a588e1af1d80040710ca2769ce34fa2edba3864ea33955e4e80100736422ddade344", 0x2a}], 0x2) 00:58:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0x45, 0x0, 0xfd}, {}]}) 00:58:26 executing program 4: sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x1e) 00:58:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x8, 0x2, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x20}}, 0x0) 00:58:26 executing program 0: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x801, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}}, 0x0) 00:58:26 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) syz_btf_id_by_name$bpf_lsm(&(0x7f0000000840)='bpf_lsm_inode_removexattr\x00') 00:58:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x7}, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, 0x0, 0x0) r2 = syz_io_uring_setup(0x2882, &(0x7f0000000100), &(0x7f0000eec000/0x2000)=nil, &(0x7f00006ec000/0x3000)=nil, &(0x7f0000000080), &(0x7f0000000180)) dup2(r2, r1) 00:58:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r2, r1) getsockopt$SO_BINDTODEVICE(r1, 0x6, 0x7, &(0x7f0000000000), 0x20a154cc) 00:58:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0xb) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 00:58:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000500)) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) 00:58:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r2, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_group_source_req(r1, 0x0, 0x10, &(0x7f00000005c0)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @empty}}}, 0x108) 00:58:26 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r2, 0x0, &(0x7f0000000380)) 00:58:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = gettid() gettid() sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @rights={{0x10}}], 0x30}, 0x0) 00:58:26 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) [ 397.415320][ C0] net_ratelimit: 1 callbacks suppressed [ 397.415335][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 397.433272][T18907] PM: suspend entry (deep) [ 397.458855][T18907] Filesystems sync: 0.021 seconds [ 397.469442][T18907] Freezing user space processes ... (elapsed 0.013 seconds) done. [ 397.491019][T18907] OOM killer disabled. [ 397.495184][T18907] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 397.504871][T18907] printk: Suspending console(s) (use no_console_suspend to debug) 00:58:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) sendmmsg$sock(r0, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@mark={{0x14}}, @timestamping={{0x18}}], 0x30}}], 0x2, 0x0) 00:58:27 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r2, 0x0, &(0x7f0000000380)) 00:58:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) 00:58:27 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000040)=ANY=[@ANYBLOB="e814000010"], 0x14e8}}, 0x0) [ 397.552500][ T1786] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 398.081992][T18907] ACPI: Preparing to enter system sleep state S3 [ 398.082091][T18907] PM: Saving platform NVS memory [ 398.082094][T18907] Disabling non-boot CPUs ... [ 398.085581][T18907] smpboot: CPU 1 is now offline [ 398.088591][T18907] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 398.088664][T18907] ACPI: Low-level resume complete [ 398.088861][T18907] PM: Restoring platform NVS memory [ 398.088871][T18907] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 398.100889][T18907] Enabling non-boot CPUs ... [ 398.101047][T18907] x86: Booting SMP configuration: [ 398.101050][T18907] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 398.101274][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 398.102277][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 398.103667][T18907] CPU1 is up [ 398.104014][T18907] ACPI: Waking up from system sleep state S3 [ 398.229283][T18907] OOM killer enabled. [ 398.230308][T18907] Restarting tasks ... [ 398.240094][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 398.243604][ T1034] block loop3: uevent: failed to send synthetic uevent [ 398.254549][T18907] done. 00:58:27 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r2, 0x0, &(0x7f0000000380)) 00:58:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000500)) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) [ 398.258415][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.263433][T18907] PM: suspend exit [ 398.273775][T18928] netlink: 5332 bytes leftover after parsing attributes in process `syz-executor.5'. 00:58:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "86652608d1393ce56c87ab0f067e4c8809775352519b6fe3dcfe4c598117b2518a701c704337f24b7f208c87f178dd92f1aeb1e4c52ece890d81b45b7c2e39d8a8c9210d53a78d487632d2cfbb8bf901a8d7a7c98afa805d8975dc4c83c6e8c5e298fe76fdf3abdc9187c090ceade28de999e67a24e100cbb7fd0e19bb3167b826d3e816c182cc4e537978b1832dc9f5e5a70776648c4e70f3d7bfc9fa3179cc997f7258ea98cf8d3ede8f43407c9cf8ed3b5970fbdcbf874e22b9174c02c756c220dc1a6b27793318ce771da3b9a2068da67d95e7584ffb293e2b28bf980d78f17b54859dba64a35ab2da185a429c7b9c5d1aff760617b8dbd0"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:27 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000000)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x2e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getpeername$netlink(r2, 0x0, &(0x7f0000000380)) [ 398.335005][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.352664][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.355202][T18947] PM: suspend entry (deep) [ 398.363744][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 398.370819][T18947] Filesystems sync: 0.014 seconds [ 398.372426][T18947] Freezing user space processes ... (elapsed 0.006 seconds) done. [ 398.380316][T18947] OOM killer disabled. [ 398.381042][T18947] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 398.384314][T18947] printk: Suspending console(s) (use no_console_suspend to debug) 00:58:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) [ 398.645858][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 399.176613][T18947] ACPI: Preparing to enter system sleep state S3 [ 399.176694][T18947] PM: Saving platform NVS memory [ 399.176698][T18947] Disabling non-boot CPUs ... [ 399.179309][T18947] smpboot: CPU 1 is now offline [ 399.181746][T18947] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 399.181807][T18947] ACPI: Low-level resume complete [ 399.181878][T18947] PM: Restoring platform NVS memory [ 399.181910][T18947] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 399.192713][T18947] Enabling non-boot CPUs ... [ 399.192898][T18947] x86: Booting SMP configuration: [ 399.192901][T18947] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 399.193073][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 399.194165][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 399.195640][T18947] CPU1 is up [ 399.195997][T18947] ACPI: Waking up from system sleep state S3 [ 399.296016][T18947] OOM killer enabled. [ 399.296653][T18947] Restarting tasks ... [ 399.303660][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 399.306050][ T1034] block loop4: uevent: failed to send synthetic uevent [ 399.314319][T18947] done. [ 399.316676][T18947] PM: suspend exit 00:58:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "86652608d1393ce56c87ab0f067e4c8809775352519b6fe3dcfe4c598117b2518a701c704337f24b7f208c87f178dd92f1aeb1e4c52ece890d81b45b7c2e39d8a8c9210d53a78d487632d2cfbb8bf901a8d7a7c98afa805d8975dc4c83c6e8c5e298fe76fdf3abdc9187c090ceade28de999e67a24e100cbb7fd0e19bb3167b826d3e816c182cc4e537978b1832dc9f5e5a70776648c4e70f3d7bfc9fa3179cc997f7258ea98cf8d3ede8f43407c9cf8ed3b5970fbdcbf874e22b9174c02c756c220dc1a6b27793318ce771da3b9a2068da67d95e7584ffb293e2b28bf980d78f17b54859dba64a35ab2da185a429c7b9c5d1aff760617b8dbd0"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) [ 399.338891][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:58:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='nogrpid,barrier,nogrpid,nomblk_io_submit,norecovery']) 00:58:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) 00:58:28 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000500)) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) 00:58:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) [ 399.363003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 399.380469][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 399.382842][T18968] loop2: detected capacity change from 0 to 4 [ 399.384759][T18968] EXT4-fs (loop2): Ignoring removed nomblk_io_submit option [ 399.385931][T18968] EXT4-fs (loop2): Mount option "norecovery" incompatible with ext2 00:58:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x6, 0x0, 0x3, 0x1000004}) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x41, 0x0, "fdfb0fb3f335cb0733ffe3d8cc556b9c2cd89e41296ef94713bd105fb77e831d72db60021a8243dae3c955c57e0b5331d71accb44f231846e9eaee2d83bd204a7ae25b8ca98f42488d0678d403b78b06"}, 0xd8) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {0x20, '\x00'}, {0x20, '(-.+#@]+&['}, {0x20, '[)'}, {0x20, '\x00'}, {0x20, '\x00'}], 0xa, "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"}, 0x11d) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @empty}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20050080, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x1) r3 = accept(r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x70bd2c}, 0x1c}}, 0x4000) recvfrom$inet6(r2, &(0x7f0000000540)=""/220, 0xdc, 0x0, 0x0, 0x0) close(r2) [ 399.412656][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 399.417982][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 399.437174][T18988] PM: suspend entry (deep) [ 399.451556][T18988] Filesystems sync: 0.013 seconds [ 399.456832][T18988] Freezing user space processes ... (elapsed 0.016 seconds) done. [ 399.474339][T18988] OOM killer disabled. [ 399.475186][T18988] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 399.477967][T18988] printk: Suspending console(s) (use no_console_suspend to debug) 00:58:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4c1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) dup2(r1, r0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 00:58:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(r0, 0x0, 0x0, 0x0) 00:58:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x8092, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 00:58:29 executing program 0: set_mempolicy(0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000100)={0x3, "ab7a04751f30d72fd21abe0e06257722ff0715e3e283709be3a19ae9f7ceadea3b69840b8a434b62eebdff09a51690c4f9c6b127689c3bd37661b41233e4cc0ca8381a99c76d5caaa15f2639eaf51f403b65cd47f5b16301ff40611a3db4daacf51a96d7a93e9546100aa885de2df5275aaf319abfe4f98c1dec4f3f8058c7a71298008c0be8913897583d415fd988fba17a903265fb1457a48eb017cedeb8aa38e3684fc20ac48f294ea1dc5ae5c1da653495c4495642570b9a43478b9d9fc400bd81bba3a06a48c5b35d7288a8455fc6a481e418cbf1b32a3e89e10d07d0ea39ccb87dbf9da3da16f9b8f279b83d0ac68548b5c3fa403bf7b9e1fd8511955452e57c40ba4d675a6ba518e54452c357a71e96de586d26623b2a9b54031898057e034e7b06bf1d00f4cd3ca074a575d82de52c1d0d60101a773830b128feb84d0338aa16d564200220ca4cb4df99ff4fcd0a678149b43785f61c3b86e0b102d26fc14bfc2026a8f963e657c413ad72ad5797729909f9e58fe7799f230f1ab26dcddd52437ab483ee9c2583751adf6c83a49a731486c86383629b3f4091551055fc52c70e182955364763d3a62ccd9d674a19938a23d79081c7fc51499bffbb62e2f2e51f1dce79fbe548ffd1b77aeec7d24b83b55a9b449483753197fca8644a9de33eb272218bbf80e3e31fc95ab5d351d549c95f11f9a24e649809d2733129afa6b935c53d0f11feed20b2f6e3b8857671cdcaf82d57fc826fbc7efa5aa4fe30859e6cc1a4e9e49fc568d57577177898358a8cab48e218ef9617daf2546c0d52b66b247a003f7b723a545694c7d14eaea8592600a1f8e580da8095744355abc9d28086b221e309a0b42b42ac57d301da85a52e7f91c28b9afed04e93c197ad17dba3fddd555cd44de68245399fdeab347f05badfb688fa505037b759e6ec14bbbe343a82e37304e288d42936b0964bbaca99bcc07b2a5477a87e115b06799281e1f03dc8b81da08b7082307691261611148da503175a97e83488802a7f21015fd3d78f9eecd3dcedc0b7907084a305c52d16a4ae8678304e31fab2fe8105edb7b9240bd324a123f1f040f3ef944e965e446a038c08941bab4134ab4f95a7b842f72c716a62751cb0dfe245273fba6aa2b26ab638b258142329a676dd4661504551b349294f22f911a88991922f5e33939b6b2e1ebb3c37345337da68291c24332be9137468fc648a98bfc4e7389bfdc960b1d8f3d9841e333b082f5a445c52042801abed9d92b659d79e44f4089ac49243f9b15dee6fd30c7d97aa44f2ede2e3de95db1effb8a9c59d0517505936b91f23407eeeba6969211d0fb4db3883050c05c6bae268748e3bce6d91becdb4d029f47bfa36ae4804192b93914a28fff4f3645707598705f6bc6baaa2609702c69bd3e85d58016f35772c0149e680d9a0578c3c2ecd03bdbf9421d8277f9be84f064b4347e364a568204239dbf2aaf63189436487d106037963ab13ec263e5c7a03c6ad870caef7f892e176deed8b8a584de164dcd7c372d9f807486fd1921ab2268e1a135b23f1715daab25b04c4590dd94dd0306c2ecc3a2454052dbd20af929501f5e240cb657ed34617b91f8c36cb8267cc727cddbe23e39c117ea672bdf5888fb5adf4d0b5824d70b191986116ec7bfe6774b19c69e20d61d32b7215409c8b3d05967d17e439834632795ba605ff8c9faaf39fd2c3091e4d5fbc0bae3a5e8bb133464ba5f40f8c0c1d0052567bccabcdf1584f928395eb9b70cd3129d33373f91e37bde2825647f42204894cabbe85d00d6a40cb0652be4b5638fa7ccb936af148fca9f85834681232332ef82d6a30f7880c00000431d8a272af6d19c0084516e8679e2c9debaeeb2b3e6b483fbc4ddb564b74e08ae4b94a71e76291904f86638612634ff4c00af3b946f1d680d16c4b9aee37fc47e3619d9da1f0535ab75243505d380049787c590055c365d8f28ac2735f44b6e8155eb68c3ef9daf6d97eed1d0525d5f2e24c8912eec508c302463bd9dffc16c9c72ad60244c1f794a987e72d852fedd39e35453b3b558e3974c774507afe797b6fd1420a1ab1f6a3ce603d789ecd24f0f744277cba0168013f868c5d21e3de5b4de62b501109ec1b0e0fa47e4e46be668f128246b5bf1e0bb71208d53d36768b47f34d0c735ebf06cbe1c54efc24a9352870ce0031707e82d89931ab2a641e869403d5a4f101e3c8575eabf1bfbb48051d5c6c34bdd86c0db46c9d1e42efa4235a57588e8bd56d0edb8f3538ae4de3160211bb9357673c32e8dbc2925416200f88e2e21b39e1da25871cb0937d52dd6567259b79904be684e4fbb6cb22633c7aac23904527931fdfdcb837497f0e3caf7bf6d5947aca833244bbe2c9f5c998aeeae995f9e381dfbbe991604e3402ee882772dd3206081b056df6581899b3fc28f8f33b72f95b0420cf75bc56914664f84fb5e8fc2aa6e8c226352daff47c8b47d39356a6222cbf5d89ce3c3952f19960a9be97bde9731fd9960c761830ebb0a074f1e6aeb8cb00bb96f4189f52551baf0e8d25c6671963bf926a8cb9eecee8b25375d08b0ce0abdc0d8acc78f7d0582d13a120d6f6477daf7424500440523eddf0b9cd3965e6aca080ae8bd4dc2471fa6b4f795d17d7812c93ab9d9f79795436d44d67f38ed433d09dd923be3b4d6f54789a14164a310f45557ea5bd937e560e3e09984be6a90ceec9fbe41e6a4e012828984fceb06fd3dc2db70f83be60992069c668bcf70b5ad2b8a841f52c45bd58b8dea2dbebba02b027352c4e85314ad1eac50f7e225963d357b147b55099fd74a452f490355e34f7ab91e81c9b482e7956054227f5049dc140135332d5ca6e6e945da6446b2af0c2a3c4a71b3668bb608b80c0db7ee107c8607d39fc471ebf4ed6b92c2103470474820b45929dccd08a81519840785dbc311fcfe32a8612bfdff77bf18a8c74e2ea639ae7ee5cd52ba5133ef232dfe3628bbf18a39f4affb8ceef730082f984f163b28983c90b53b0b8eeb85becbbd6de4c0e59fa9ac423af7ca6a34e99640c560c69cf844e225ad304584e3e05172dfa66a3016f6578db83746aaa3e552353b6c05b6719260d0e715c7f8126dba41e7eae6c62f0bdd1a1769b31245ac024343e43ad7a3a960c4c54453b9af9dbbdc5df89cdd7c8a9a06296b1f7853ea0ca08de47ce0e7c69198d14a99834971b24553e10b0e2db682ad7f8aa702b9abcf17936e17d23dc48fc6d78595729578ac64be5d9530412dc1e24f1e3d368b2c7e499e675bfb895d2b04446b742112b267d0868d4ea3f62d7d802c52040694dc3e76020e2674c7fd8a6125a92724d2214b74cd26bb99fd439e0f535d563abfbdba5ffbcf9973531d48afb9f2cbfd521b94dfa3f8858cb28d61e2603be46147fc3051e9570b79a13e869acd603f2762e5a7a0fe9639636477c1e7a87e7a57924354d95dd6e8bf405b0b7b7b8742e38e4a33bcff3366ee63bf64b7e09dcabf9de3db3254b125a0a02693725d84be99917e8955804db1cd03876e37ca1cce04fb1430dcd0b350873955b27f770d4bb8fd02549d6f7a842b22ce6b81bb53c42e803488af7326bc8bf6699c8c3f86170d9e892c84b4bef89bf19098eb9c63037fa054244c8fc0d0e7f53980d68f6dba8e3e6d521476c3e26066de66cadb8eb0936a26185b1ff1365d35bfe20077c1b26829043c7842260f6ba7e55a21580eef019928e3ea70e762f60bb0ba29b56c15524877abdadc71d77d13279f2494a76e6ecf72500526ec2949e5dc6a2efb18410df54f820c24fb4409ac499fb288cce7ee300bbce5cfa4cfe7d24a3514a209b2597ac0419b0209c872e9350af7086a7e82ebbdd282d33a6c0f2af4649fb37f89507e599149172596b54a5c68de6a27eee37327bf4eb646daaa11e5bd0b780fa1a1f55c9710734af3677d80d36ab6bdb7ffae5f379ff96520f5cd93af52a7734be69c3a76708a69eceb87d373b3f5e2a85ca9a0dc6068ff869c4552656e2ff01cb31d6c3082451cae5d629f4fba41aed61e783b1deff8f3b4da36f877480575120a151c6b6c3c2aff6413c86d618b2ec47c13e82bcfe669f84d3037ac21a6ed81848a358d92481627a423dd92f947f292908eb6b13a32286d50ca3e3bd39018c881112742d68275902f67636c8670ff1ee5ea23c5840a5b601c0726bac55bbff1ca1f7b807a1c7b3ecd2b70499871f844721735103d5a9b8d2b9031d4b4f9d467d09e709d768b58c71e8c8ce6c4cba7e0c14caebb8aa022af37e3d0e7363e994f41d91ad8bde4ffaa3f21d3cd5589e26733f54a35e4e76bfa33c2790c5ee209a14639d21c36c3605394a5224b8ff07232e9ca677cdb21a00a9d022b45c138a48c39db32f65cae2abc9a23a39a2f8afe0517c75e39013595a3d7a3251eb6c79d67d310dcc87d6a7d2ed798a28a229bd9a3924eadcbee82f8a6f5cda0549cf7922c6305306cd08edef5e9ddc9134894aa6d21d8ae820d5328fe1cedb4b41266f270c10dd0cb380e2498d43f30f9176250bc22a7297262d7b8c2d5df5963e448336747fa16ac07ba19b71801515802d44ac18ae2f365f1517f714a7de5aa0ef4875a8cf9b30ffcbf220890532f56795c58332742ee85c462a492acfae6bbd1ed0ca5d610cebae085f42c5b8183837ff316877f5d86009852a4d78c8966f87f6f4c4bd1f446d537eebfdee368cd7014c9608c9cf40c64ef613f7f7e9909c20f0f79c2a1436bb08400b86554e97af9bfe91787ff618a81ac9378d4de8fd0af023f2caffa745e7ebc4c390d1168868fc5747f8d0632586cc1d28b62ec7b47f521a5e7b03fdcc51e56487fd43ec931644a8f9ffed613d190d5d0156b3b4c33374348b16d8a8e0930c72a017660bc2d6ef5c13d00e8fc1bc0b42bb2fedfcca6890e9c745ad14f1295be9dd72ce6ae3cbaef031cbf7b3015e68271a256e74fbd82fee055cf4bc07085be078923a52810dee1f19727d943bafd42252c82d2de8ef2f69214d9544e95c5083a02c40a00676d3cd10bf28009d652c53bf60023824c58ef3fe4d096fade001d139172030cd2ff7a67b3be531714843fc37bdb6f154d7269e921311b1d8182e048285dfc0b7fde8da6e04b1f5ffef650b6bff05925d0b138593869611a4a48669c4db7f6b25d3638e4a660a534aa335618366ccf9a74e561cf15c5b6e84e9f30323620081eb6c7f593d8d18aa749a04006430ce66a0f029cef0bd9ca090a2e4ef09caf8eeed662b2314dc924d8c71a765ccdd91985cae42683291021c5c4992b314a9a977256d914d83006a97f1af128a744ccea86f2d9a2813f8fb4bb9cf66551679c24b062f627a95d77a7fa428de8d705960159dc2345d4725835ba1ee30b76cdf0b213c7a665474e47808dc108acc10ce8a363645bb5603843eca6a5ee0cdee30e0184da4f2d39f17fc38a60cf618c94ebefe8a6d1e401b240a81627114361dc0c2e9e7bc6deb22c4884099345f594ead558d2b751bb9a4cc65bee0aef7c44d30b81ecb950a44ee0a7b6e71ad2ab0b73da415daacc9575308864fc19d22205f729c58d1a89aec25bb2b9c34d3df06fa1a4b911d0b5c76f668a14e657dda1086ba7f66163cefbb4770b3b548ab6c1c7c56b2f5f9dd8a1dee1384d83477356af69ef41a0158058a6102f428a22966bb6943705df67888f0c986fd36"}, 0x2000, 0x0) [ 399.938391][ T1786] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 400.455578][T18988] ACPI: Preparing to enter system sleep state S3 [ 400.455679][T18988] PM: Saving platform NVS memory [ 400.455682][T18988] Disabling non-boot CPUs ... [ 400.459080][T18988] smpboot: CPU 1 is now offline [ 400.461725][T18988] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 400.461784][T18988] ACPI: Low-level resume complete [ 400.461859][T18988] PM: Restoring platform NVS memory [ 400.461867][T18988] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 400.473280][T18988] Enabling non-boot CPUs ... [ 400.473458][T18988] x86: Booting SMP configuration: [ 400.473461][T18988] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 400.473630][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 400.474748][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 400.476221][T18988] CPU1 is up [ 400.476641][T18988] ACPI: Waking up from system sleep state S3 [ 400.578420][T18988] OOM killer enabled. [ 400.579002][T18988] Restarting tasks ... [ 400.586937][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 400.589319][ T1034] block loop3: uevent: failed to send synthetic uevent 00:58:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8007}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x8000000000004, 0x4) socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xe0) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) [ 400.617324][T18988] done. [ 400.618774][T18988] PM: suspend exit [ 400.632592][T18998] loop1: detected capacity change from 0 to 16 00:58:30 executing program 0: set_mempolicy(0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000100)={0x3, "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"}, 0x2000, 0x0) 00:58:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001c40)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x7) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000500)) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/110, 0xfffffe32, 0x0, 0x0, 0xffffffffffffff39) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) 00:58:30 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000080)=[{&(0x7f0000000180)="bad75e693175ff4ccfc4", 0xfffffec5}, {&(0x7f0000000300)="76df8cfefa7ddac22dcfcf9e00c693a47524fbfa60133f4bf9500ca94f344e4dd28a9ec9014befb0ea01a514ea8c7c66e5e88e77a778affc2a2030f7fbfa96fe6c14a0c75aee26637a81e3bcb693e7513645eb550c7adad4103ebae473f42372227fa59722490bdd9f2774cffe4bd181ffffffffffffffc3788e745965108c770cc26d1936bcc660d3ccbf2feaeb4603347ab0", 0x93}], 0x2, 0x8) close(r1) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="220000001400250000000000549901040208031300000000080002", 0x1b) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 00:58:30 executing program 0: set_mempolicy(0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000100)={0x3, "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"}, 0x2000, 0x0) [ 400.724857][T19024] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 400.732542][T19025] PM: suspend entry (deep) [ 400.760255][T19025] Filesystems sync: 0.026 seconds [ 400.762592][T19025] Freezing user space processes ... (elapsed 0.037 seconds) done. [ 400.801377][T19025] OOM killer disabled. [ 400.802020][T19025] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 400.805384][T19025] printk: Suspending console(s) (use no_console_suspend to debug) 00:58:31 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x8092, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 00:58:31 executing program 0: set_mempolicy(0x1, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000100)={0x3, "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"}, 0x2000, 0x0) 00:58:31 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8007}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x8000000000004, 0x4) socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xe0) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) [ 401.211985][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 401.755823][T19025] ACPI: Preparing to enter system sleep state S3 [ 401.755971][T19025] PM: Saving platform NVS memory [ 401.755975][T19025] Disabling non-boot CPUs ... [ 401.759496][T19025] smpboot: CPU 1 is now offline [ 401.762284][T19025] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 401.762351][T19025] ACPI: Low-level resume complete [ 401.762429][T19025] PM: Restoring platform NVS memory [ 401.762437][T19025] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 401.774459][T19025] Enabling non-boot CPUs ... [ 401.774641][T19025] x86: Booting SMP configuration: [ 401.774644][T19025] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 401.774805][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 401.775870][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 401.777390][T19025] CPU1 is up [ 401.777790][T19025] ACPI: Waking up from system sleep state S3 [ 401.895739][T19025] OOM killer enabled. [ 401.896439][T19025] Restarting tasks ... [ 401.904665][ T1034] synth uevent: /devices/virtual/block/loop0: failed to send uevent [ 401.909345][ T1034] block loop0: uevent: failed to send synthetic uevent [ 401.921330][T19025] done. [ 401.923890][T19025] PM: suspend exit [ 401.957989][T19048] loop1: detected capacity change from 0 to 16 [ 401.985326][T19039] ================================================================== [ 401.987475][T19039] BUG: KCSAN: data-race in copy_page_to_iter / fat16_ent_put [ 401.989939][T19039] [ 401.990515][T19039] write to 0xffff88812d11d22e of 2 bytes by task 19048 on cpu 1: [ 401.992689][T19039] fat16_ent_put+0x24/0x50 [ 401.993493][T19039] fat_alloc_clusters+0x430/0xa50 [ 401.995262][T19039] fat_get_block+0x213/0x5a0 [ 401.996538][T19039] __block_write_begin_int+0x4a2/0x1060 [ 401.998257][T19039] cont_write_begin+0x522/0x850 [ 401.999612][T19039] fat_write_begin+0x61/0xf0 [ 402.000884][T19039] generic_perform_write+0x196/0x3a0 [ 402.002221][T19039] __generic_file_write_iter+0x161/0x300 [ 402.003717][T19039] generic_file_write_iter+0x75/0x130 [ 402.005265][T19039] aio_write+0x287/0x360 [ 402.006503][T19039] io_submit_one+0x82f/0x1350 [ 402.007818][T19039] __se_sys_io_submit+0xf5/0x260 [ 402.009503][T19039] __x64_sys_io_submit+0x3f/0x50 [ 402.010753][T19039] do_syscall_64+0x4a/0x90 [ 402.012087][T19039] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.013649][T19039] [ 402.014388][T19039] read to 0xffff88812d11d000 of 1377 bytes by task 19039 on cpu 0: [ 402.016406][T19039] copy_page_to_iter+0x320/0x860 [ 402.017717][T19039] filemap_read+0xf06/0x1230 [ 402.018991][T19039] generic_file_read_iter+0x75/0x2c0 [ 402.020094][T19039] blkdev_read_iter+0xb9/0xf0 [ 402.021298][T19039] vfs_read+0x565/0x5d0 [ 402.022429][T19039] ksys_read+0xce/0x180 [ 402.023392][T19039] __x64_sys_read+0x3e/0x50 [ 402.024705][T19039] do_syscall_64+0x4a/0x90 [ 402.025990][T19039] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 402.027594][T19039] [ 402.028016][T19039] Reported by Kernel Concurrency Sanitizer on: [ 402.029733][T19039] CPU: 0 PID: 19039 Comm: systemd-udevd Tainted: G W 5.13.0-rc4-syzkaller #0 [ 402.033442][T19039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.036018][T19039] ================================================================== 00:58:32 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0xc, 0x20, 0x9}, 0x20) 00:58:32 executing program 4: clone(0x300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:58:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8007}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x8000000000004, 0x4) socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xe0) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) 00:58:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x8092, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 00:58:32 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0xc, 0x20, 0x9}, 0x20) 00:58:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0xc, 0x20, 0x9}, 0x20) 00:58:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x8007}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x8000000000004, 0x4) socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xe0) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) [ 403.669055][T19081] net_ratelimit: 9 callbacks suppressed [ 403.669067][T19081] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 403.682486][T19071] IPv4: Oversized IP packet from 127.0.0.1 [ 403.684511][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 403.685168][T19080] loop1: detected capacity change from 0 to 16 [ 403.704738][T19091] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 00:58:33 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000180)={0x200000000000001}, 0x8) [ 403.745703][T19096] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 00:58:33 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0xc, 0x20, 0x9}, 0x20) [ 403.781767][T19097] IPv4: Oversized IP packet from 127.0.0.1 [ 403.784169][ C0] IPv4: Oversized IP packet from 127.0.0.1 00:58:33 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x11450c2, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x208202) link(&(0x7f00000000c0)='./bus\x00', &(0x7f00000002c0)='./file0\x00') sendfile(r0, r1, 0x0, 0x8000fffffffa) [ 403.813584][T19108] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 00:58:33 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:33 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000100)='./file0/file1\x00') chdir(&(0x7f0000000000)='./file0\x00') lsetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000340)='./file0\x00') 00:58:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x20000040}}, 0x20, 0x0, 0x0) 00:58:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x8092, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f00000003c0)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x16000}]) 00:58:33 executing program 5: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0], 0x52) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_u}]}}) 00:58:33 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:33 executing program 0: r0 = io_uring_setup(0x233d, &(0x7f0000000280)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000b40)=[0xffffffffffffffff], 0x300) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x300) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 404.550397][ T1021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=1021 comm=kworker/0:2 [ 404.554371][T19133] loop1: detected capacity change from 0 to 16 [ 404.556320][T19134] 9pnet: p9_errstr2errno: server reported unknown error 00:58:33 executing program 5: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000380)="57595a4b414c4c45522020085ac19f", 0xf, 0x612}, {0x0, 0x0, 0x10e20}], 0x0, &(0x7f0000000180)={[{@iocharset={'iocharset', 0x3d, 'default'}}]}) mkdirat(r0, &(0x7f0000000040)='./file2\x00', 0x0) 00:58:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) preadv(r1, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/176, 0xb0}], 0x1, 0x2c0c, 0x0) 00:58:34 executing program 5: openat2$dir(0xffffff9c, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000000)={0x0, 0x0, 0xd}, 0x18) 00:58:34 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x10d, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabe0728d48d59f2324ddf79bae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fc11645f38518dab0aa94ad60d0668d3bbe0625d5d2e3bb987d1e09ab308157bb66b62df75d5c4af3c2a3c5b265ca2955257c94fc8748ba704a5850374975b8998714db8995aeb371e36f9037e022a3506a303bbb9a82c5ab9cba314ab51a6a9ed1b372bd3c2002f99789b922446"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x35) [ 404.704027][T19157] new mount options do not match the existing superblock, will be ignored [ 404.707067][T19157] new mount options do not match the existing superblock, will be ignored 00:58:34 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x10d, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x35) 00:58:34 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) 00:58:34 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x10d, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x35) 00:58:34 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/raw6\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/171, 0xab}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000280)=""/65, 0x41}], 0x1, 0x59c, 0x0) 00:58:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="5500000018007f5f00fe01b2a4a2809302060000fd000001020b00000a000600350028101400f0ff190009407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab82200000000f2ff00000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 00:58:34 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x10d, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = getpid() tkill(r1, 0x35) 00:58:34 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r4, 0x0) io_uring_enter(r0, 0x6196, 0x0, 0x0, 0x0, 0x0) [ 405.385857][T19183] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 405.388426][T19183] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 00:58:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000500)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0xa, 0x0, @local}}]}, 0x110) 00:58:34 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="32b545d4793cd72377c267"], 0xe8}}, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xa, &(0x7f00000002c0)) 00:58:34 executing program 4: clone(0x200964065fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='gid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe9c) lseek(r0, 0x10000, 0x0) 00:58:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) read(r1, 0x0, 0x2000) read(r1, 0x0, 0x0) dup3(r1, r0, 0x0) 00:58:34 executing program 0: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) readv(r1, &(0x7f00000002c0)=[{&(0x7f0000422f69)=""/137, 0x89}], 0x1) read(r1, &(0x7f0000000540)=""/61, 0x3d) 00:58:34 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="9487c49c1b0de8d5", 0x8}], 0x1, &(0x7f0000000140)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 00:58:35 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="9487c49c1b0de8d5", 0x8}], 0x1, &(0x7f0000000140)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 00:58:35 executing program 5: unshare(0x400) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000100)='#\x00', 0x0) write(r1, &(0x7f0000001040)="f5", 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x80000000004, 0x11, r1, 0x0) sendmmsg$unix(r0, &(0x7f0000000bc0)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 00:58:35 executing program 2: ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f00000000c0)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000040)) 00:58:35 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="9487c49c1b0de8d5", 0x8}], 0x1, &(0x7f0000000140)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 00:58:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8d, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000300)={0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40505331, &(0x7f0000000340)={0xbf000000}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000500)) tkill(r1, 0x7) 00:58:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xa7, 0x7) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 00:58:35 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000040)="9487c49c1b0de8d5", 0x8}], 0x1, &(0x7f0000000140)=[@dontfrag={{0x14}}], 0x18}}], 0x1, 0x0) 00:58:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket(0x2, 0x803, 0xff) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x4000, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r2 = dup(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r0, 0x0, 0x4000000000000081) 00:58:35 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, 0x0) 00:58:35 executing program 4: sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="80000000000201040000000002000000240002801400018008d4ca0e8c94f9f003000200ac1e00010c0002800500010000000000240003"], 0x80}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000003) 00:58:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5, &(0x7f0000000080)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) io_submit(r2, 0x3, &(0x7f0000000300)=[&(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:58:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000240)=0x9) 00:58:35 executing program 2: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x55}) 00:58:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xa7, 0x7) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 00:58:35 executing program 1: r0 = socket(0x10, 0x2, 0xa) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000002c0)={0x4c}, 0x4c}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) 00:58:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xa7, 0x7) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 00:58:35 executing program 0: mmap$perf(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, 0x2) 00:58:35 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="109a", 0x2, r0) 00:58:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0xa7, 0x7) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="8224", 0x2}], 0x1}}], 0x1, 0x40008000) write(r0, &(0x7f00000004c0)="0600", 0x2) 00:58:35 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000022c0)={0x64ad}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0014f9f407000904000200200000000000000000000800030000000000", 0x24) 00:58:35 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) close_range(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) [ 406.562051][ T25] audit: type=1326 audit(1622941115.883:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19283 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 406.575493][ T25] audit: type=1326 audit(1622941115.893:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19283 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 [ 406.625013][ T25] audit: type=1326 audit(1622941115.933:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=19283 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193eb code=0x0 [ 406.711442][T19282] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. 00:58:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x2, &(0x7f0000000600)={{0x0, 0x2710}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) 00:58:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xf, &(0x7f0000000400)={&(0x7f0000082000/0x3000)=nil, &(0x7f000023c000/0x2000)=nil, &(0x7f0000077000/0x3000)=nil, &(0x7f00005b5000/0x4000)=nil, &(0x7f00004e8000/0x1000)=nil, &(0x7f0000598000/0x4000)=nil, &(0x7f00007e9000/0x1000)=nil, &(0x7f0000421000/0x2000)=nil, &(0x7f0000387000/0x4000)=nil, &(0x7f00003c2000/0x1000)=nil, &(0x7f00006b2000/0x1000)=nil, 0x0}, 0x68) 00:58:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x98, &(0x7f00000005c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:58:36 executing program 5: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xa4f0, 0x0, &(0x7f00000001c0), 0x10) 00:58:36 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 00:58:36 executing program 0: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}}}}, 0x108) close(r1) 00:58:36 executing program 1: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:etc_mail_t:s0\x00', 0x20) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_opts(r1, 0x0, 0x16, 0x0, &(0x7f0000000180)) 00:58:36 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='utf8=1,uni_xlate=0']) 00:58:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_REG(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5c07e575063f8fb1, 0x0, 0x0, {{0x5}}, [@NL80211_ATTR_REG_RULES={0x8, 0x117, 0x0, 0x1, [{0x4, 0x2}]}]}, 0x1c}}, 0x0) 00:58:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x98, &(0x7f00000005c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:58:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x2, &(0x7f0000000600)={{0x0, 0x2710}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) 00:58:36 executing program 4: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup2(r1, r0) getsockopt$SO_BINDTODEVICE(r0, 0x6, 0x25, &(0x7f0000000000), 0x20a154cc) 00:58:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x2, &(0x7f0000000600)={{0x0, 0x2710}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) 00:58:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000180)) 00:58:36 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='huge']) 00:58:36 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x20020400) fcntl$lock(r0, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x13}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x5, &(0x7f0000000500)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) 00:58:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x2, &(0x7f0000000600)={{0x0, 0x2710}, {0x77359400}}, 0x0) setitimer(0x2, 0x0, 0x0) [ 407.313610][T19355] netlink: 'syz-executor.0': attribute type 2 has an invalid length. [ 407.316882][ T25] audit: type=1400 audit(1622941116.632:260): avc: denied { create } for pid=19344 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:etc_mail_t:s0 tclass=udp_socket permissive=1 [ 407.330509][ T25] audit: type=1400 audit(1622941116.652:261): avc: denied { getopt } for pid=19344 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:etc_mail_t:s0 tclass=udp_socket permissive=1 [ 407.352972][T19369] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 00:58:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x95807, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x824, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:58:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "cf493eeebf3c80886dfd7b4c9da3c4b4bb80e7b89e0b7003b29f437482112ab3d43a07a876e1db253b474b308f7787844ab927ce584b5e1f636fbce03b6b4d5f"}, 0x48, r0) keyctl$set_timeout(0x7, r1, 0x0) 00:58:36 executing program 5: futex(&(0x7f0000000080), 0x5, 0x0, 0x0, &(0x7f0000000280), 0xb4000003) 00:58:36 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700141e9b070009040080", 0x11) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f00000000c0)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a", 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe3, 0x0) [ 407.392990][T19377] tmpfs: Bad value for 'huge' [ 407.404557][T19377] tmpfs: Bad value for 'huge' 00:58:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x98, &(0x7f00000005c0)="f47970da7c2fd541e0656c5762306aa606a0c2a76e59b65fa78fb184da006cabbd58564cf09dcac54f6d212e05d23391ff083d78ff122a776e08af2025580c72249ad2f5366f60b87a982a8066b10f8b85b47e770f548fd2e3c6a8323152fbeebdec6058daee7c23390ee132bd154c99fd3d69623481e1af603fc9d42b2f7173f23f843eb6669d9de930445756424b355d08c8786bf6e250"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 00:58:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendto(r0, &(0x7f0000000000)="a702ef02422bbf1b347d694988ca", 0xe, 0x0, &(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80) 00:58:39 executing program 4: unshare(0x4000600) r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, 0x0, &(0x7f0000000080)) 00:58:39 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 00:58:39 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) writev(r0, &(0x7f0000002640)=[{&(0x7f0000002100)="39d360", 0x3}, {&(0x7f0000002380)='%', 0x1}, {&(0x7f00000022c0)="ba", 0x1}, {&(0x7f0000002480)="f1", 0x1}], 0x4) 00:58:39 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) writev(r0, &(0x7f0000002640)=[{&(0x7f0000002100)="39d360", 0x3}, {&(0x7f0000002380)='%', 0x1}, {&(0x7f00000022c0)="ba", 0x1}, {&(0x7f0000002480)="f1", 0x1}], 0x4) 00:58:39 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_aout(r0, &(0x7f0000000580), 0x20) 00:58:39 executing program 5: perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0e9b4a081b284b9b3344", 0x12e9}], 0x1) 00:58:39 executing program 0: statx(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0, 0x0) 00:58:39 executing program 4: set_mempolicy(0x3, &(0x7f0000000040)=0x3f, 0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0xb1d000) 00:58:39 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x2042, 0x0) writev(r0, &(0x7f0000002640)=[{&(0x7f0000002100)="39d360", 0x3}, {&(0x7f0000002380)='%', 0x1}, {&(0x7f00000022c0)="ba", 0x1}, {&(0x7f0000002480)="f1", 0x1}], 0x4) 00:58:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x12b, &(0x7f00000005c0)="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"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0)