[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.143' (ECDSA) to the list of known hosts. 2021/04/28 21:53:10 fuzzer started 2021/04/28 21:53:10 dialing manager at 10.128.0.163:46869 2021/04/28 21:53:10 syscalls: 1982 2021/04/28 21:53:10 code coverage: enabled 2021/04/28 21:53:10 comparison tracing: enabled 2021/04/28 21:53:10 extra coverage: enabled 2021/04/28 21:53:10 setuid sandbox: enabled 2021/04/28 21:53:10 namespace sandbox: enabled 2021/04/28 21:53:10 Android sandbox: enabled 2021/04/28 21:53:10 fault injection: enabled 2021/04/28 21:53:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/28 21:53:10 net packet injection: /dev/net/tun does not exist 2021/04/28 21:53:10 net device setup: enabled 2021/04/28 21:53:10 concurrency sanitizer: enabled 2021/04/28 21:53:10 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/28 21:53:10 USB emulation: /dev/raw-gadget does not exist 2021/04/28 21:53:10 hci packet injection: /dev/vhci does not exist 2021/04/28 21:53:10 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/04/28 21:53:10 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/04/28 21:53:11 suppressing KCSAN reports in functions: 'tick_sched_timer' 'internal_add_timer' 'shmem_unlink' 'ext4_writepages' 'kauditd_thread' 'blk_mq_sched_dispatch_requests' 'fsnotify' 'xas_clear_mark' 'ext4_mark_iloc_dirty' 'ext4_free_inode' 'dd_has_work' 'complete_signal' 'audit_log_start' 'ext4_ext_try_to_merge_right' 'generic_write_end' 'do_nanosleep' 'lookup_fast' 'exit_mm' '__xa_clear_mark' 'put_pipe_info' 'do_signal_stop' 'file_write_and_wait_range' 'step_into' 'do_readlinkat' 'ext4_free_inodes_count' 'expire_timers' 'blk_mq_rq_ctx_init' 'shmem_file_read_iter' '__ext4_new_inode' 'do_sys_poll' 'blk_mq_dispatch_rq_list' 'n_tty_receive_buf_common' 2021/04/28 21:53:11 fetching corpus: 0, signal 0/2000 (executing program) 2021/04/28 21:53:11 fetching corpus: 50, signal 14185/17957 (executing program) 2021/04/28 21:53:11 fetching corpus: 100, signal 22302/27739 (executing program) 2021/04/28 21:53:11 fetching corpus: 150, signal 26320/33434 (executing program) 2021/04/28 21:53:12 fetching corpus: 200, signal 31114/39836 (executing program) 2021/04/28 21:53:12 fetching corpus: 250, signal 35763/46079 (executing program) 2021/04/28 21:53:12 fetching corpus: 300, signal 39351/51183 (executing program) 2021/04/28 21:53:12 fetching corpus: 350, signal 43215/56534 (executing program) 2021/04/28 21:53:12 fetching corpus: 400, signal 45737/60527 (executing program) 2021/04/28 21:53:12 fetching corpus: 450, signal 47853/64127 (executing program) 2021/04/28 21:53:12 fetching corpus: 500, signal 49907/67644 (executing program) 2021/04/28 21:53:12 fetching corpus: 550, signal 55123/73997 (executing program) 2021/04/28 21:53:12 fetching corpus: 600, signal 56725/77001 (executing program) 2021/04/28 21:53:12 fetching corpus: 650, signal 59618/81129 (executing program) 2021/04/28 21:53:12 fetching corpus: 700, signal 61531/84339 (executing program) 2021/04/28 21:53:12 fetching corpus: 750, signal 64258/88235 (executing program) 2021/04/28 21:53:12 fetching corpus: 800, signal 65623/90962 (executing program) 2021/04/28 21:53:12 fetching corpus: 850, signal 67493/94072 (executing program) 2021/04/28 21:53:12 fetching corpus: 900, signal 70227/97928 (executing program) 2021/04/28 21:53:12 fetching corpus: 950, signal 72266/101130 (executing program) 2021/04/28 21:53:12 fetching corpus: 1000, signal 74150/104167 (executing program) 2021/04/28 21:53:12 fetching corpus: 1050, signal 75037/106276 (executing program) 2021/04/28 21:53:12 fetching corpus: 1100, signal 76533/108915 (executing program) 2021/04/28 21:53:12 fetching corpus: 1150, signal 78377/111845 (executing program) 2021/04/28 21:53:12 fetching corpus: 1200, signal 79917/114501 (executing program) 2021/04/28 21:53:12 fetching corpus: 1250, signal 82079/117596 (executing program) 2021/04/28 21:53:12 fetching corpus: 1300, signal 83951/120447 (executing program) 2021/04/28 21:53:12 fetching corpus: 1350, signal 85373/122956 (executing program) 2021/04/28 21:53:12 fetching corpus: 1400, signal 86701/125288 (executing program) 2021/04/28 21:53:12 fetching corpus: 1450, signal 87334/127113 (executing program) 2021/04/28 21:53:13 fetching corpus: 1500, signal 88493/129333 (executing program) 2021/04/28 21:53:13 fetching corpus: 1550, signal 90500/132133 (executing program) 2021/04/28 21:53:13 fetching corpus: 1600, signal 91227/133978 (executing program) 2021/04/28 21:53:13 fetching corpus: 1650, signal 93063/136645 (executing program) 2021/04/28 21:53:13 fetching corpus: 1700, signal 96377/140256 (executing program) 2021/04/28 21:53:13 fetching corpus: 1750, signal 97462/142286 (executing program) 2021/04/28 21:53:13 fetching corpus: 1800, signal 98167/144055 (executing program) 2021/04/28 21:53:13 fetching corpus: 1850, signal 98932/145852 (executing program) 2021/04/28 21:53:13 fetching corpus: 1900, signal 99925/147766 (executing program) 2021/04/28 21:53:13 fetching corpus: 1950, signal 100702/149541 (executing program) 2021/04/28 21:53:13 fetching corpus: 2000, signal 101656/151406 (executing program) 2021/04/28 21:53:13 fetching corpus: 2050, signal 102586/153270 (executing program) 2021/04/28 21:53:13 fetching corpus: 2100, signal 103520/155116 (executing program) 2021/04/28 21:53:13 fetching corpus: 2150, signal 104526/156949 (executing program) 2021/04/28 21:53:13 fetching corpus: 2200, signal 105123/158481 (executing program) 2021/04/28 21:53:13 fetching corpus: 2250, signal 106469/160521 (executing program) 2021/04/28 21:53:13 fetching corpus: 2300, signal 107617/162395 (executing program) 2021/04/28 21:53:13 fetching corpus: 2350, signal 108434/164045 (executing program) 2021/04/28 21:53:13 fetching corpus: 2400, signal 109837/166049 (executing program) 2021/04/28 21:53:13 fetching corpus: 2450, signal 110595/167609 (executing program) 2021/04/28 21:53:13 fetching corpus: 2500, signal 111542/169254 (executing program) 2021/04/28 21:53:13 fetching corpus: 2550, signal 112506/171001 (executing program) 2021/04/28 21:53:13 fetching corpus: 2600, signal 113280/172554 (executing program) 2021/04/28 21:53:13 fetching corpus: 2650, signal 113982/174088 (executing program) 2021/04/28 21:53:13 fetching corpus: 2700, signal 114649/175545 (executing program) 2021/04/28 21:53:14 fetching corpus: 2750, signal 115350/177051 (executing program) 2021/04/28 21:53:14 fetching corpus: 2800, signal 116010/178512 (executing program) 2021/04/28 21:53:14 fetching corpus: 2850, signal 117011/180161 (executing program) 2021/04/28 21:53:14 fetching corpus: 2899, signal 117970/181761 (executing program) 2021/04/28 21:53:14 fetching corpus: 2949, signal 118685/183206 (executing program) 2021/04/28 21:53:14 fetching corpus: 2999, signal 119587/184749 (executing program) 2021/04/28 21:53:14 fetching corpus: 3049, signal 120503/186300 (executing program) 2021/04/28 21:53:14 fetching corpus: 3099, signal 121296/187751 (executing program) 2021/04/28 21:53:14 fetching corpus: 3149, signal 121865/189119 (executing program) 2021/04/28 21:53:14 fetching corpus: 3199, signal 122491/190493 (executing program) 2021/04/28 21:53:14 fetching corpus: 3249, signal 123068/191790 (executing program) 2021/04/28 21:53:14 fetching corpus: 3299, signal 123560/193038 (executing program) 2021/04/28 21:53:14 fetching corpus: 3349, signal 124259/194404 (executing program) 2021/04/28 21:53:14 fetching corpus: 3399, signal 124854/195647 (executing program) 2021/04/28 21:53:14 fetching corpus: 3449, signal 125609/197049 (executing program) 2021/04/28 21:53:14 fetching corpus: 3499, signal 126078/198286 (executing program) 2021/04/28 21:53:14 fetching corpus: 3549, signal 126602/199559 (executing program) 2021/04/28 21:53:14 fetching corpus: 3599, signal 126998/200722 (executing program) 2021/04/28 21:53:14 fetching corpus: 3649, signal 127766/202059 (executing program) 2021/04/28 21:53:14 fetching corpus: 3699, signal 128373/203311 (executing program) 2021/04/28 21:53:14 fetching corpus: 3749, signal 128800/204478 (executing program) 2021/04/28 21:53:14 fetching corpus: 3799, signal 129695/205855 (executing program) 2021/04/28 21:53:14 fetching corpus: 3849, signal 130172/207008 (executing program) 2021/04/28 21:53:14 fetching corpus: 3899, signal 131085/208327 (executing program) 2021/04/28 21:53:15 fetching corpus: 3949, signal 131656/209559 (executing program) 2021/04/28 21:53:15 fetching corpus: 3999, signal 132289/210815 (executing program) 2021/04/28 21:53:15 fetching corpus: 4049, signal 132856/211978 (executing program) 2021/04/28 21:53:15 fetching corpus: 4099, signal 133451/213168 (executing program) 2021/04/28 21:53:15 fetching corpus: 4149, signal 133962/214298 (executing program) 2021/04/28 21:53:15 fetching corpus: 4199, signal 134574/215463 (executing program) 2021/04/28 21:53:15 fetching corpus: 4249, signal 135102/216621 (executing program) 2021/04/28 21:53:15 fetching corpus: 4298, signal 135642/217741 (executing program) 2021/04/28 21:53:15 fetching corpus: 4348, signal 136184/218894 (executing program) 2021/04/28 21:53:15 fetching corpus: 4398, signal 136570/219954 (executing program) 2021/04/28 21:53:15 fetching corpus: 4448, signal 137030/221046 (executing program) 2021/04/28 21:53:15 fetching corpus: 4498, signal 137752/222180 (executing program) 2021/04/28 21:53:15 fetching corpus: 4547, signal 138222/223201 (executing program) 2021/04/28 21:53:15 fetching corpus: 4597, signal 138830/224343 (executing program) 2021/04/28 21:53:15 fetching corpus: 4647, signal 139497/225453 (executing program) 2021/04/28 21:53:15 fetching corpus: 4697, signal 140111/226507 (executing program) 2021/04/28 21:53:15 fetching corpus: 4747, signal 140590/227534 (executing program) 2021/04/28 21:53:15 fetching corpus: 4797, signal 141317/228618 (executing program) 2021/04/28 21:53:15 fetching corpus: 4847, signal 141931/229687 (executing program) 2021/04/28 21:53:15 fetching corpus: 4897, signal 142427/230715 (executing program) 2021/04/28 21:53:15 fetching corpus: 4947, signal 142991/231715 (executing program) 2021/04/28 21:53:15 fetching corpus: 4997, signal 143674/232752 (executing program) 2021/04/28 21:53:15 fetching corpus: 5047, signal 144089/233737 (executing program) 2021/04/28 21:53:16 fetching corpus: 5097, signal 144565/234765 (executing program) 2021/04/28 21:53:16 fetching corpus: 5147, signal 145151/235694 (executing program) 2021/04/28 21:53:16 fetching corpus: 5196, signal 145449/236612 (executing program) 2021/04/28 21:53:16 fetching corpus: 5246, signal 145988/237576 (executing program) 2021/04/28 21:53:16 fetching corpus: 5296, signal 146458/238525 (executing program) 2021/04/28 21:53:16 fetching corpus: 5346, signal 146797/239448 (executing program) 2021/04/28 21:53:16 fetching corpus: 5396, signal 147513/240404 (executing program) 2021/04/28 21:53:16 fetching corpus: 5446, signal 147832/241308 (executing program) 2021/04/28 21:53:16 fetching corpus: 5496, signal 148517/242294 (executing program) 2021/04/28 21:53:16 fetching corpus: 5546, signal 148920/243220 (executing program) 2021/04/28 21:53:16 fetching corpus: 5596, signal 149285/244113 (executing program) 2021/04/28 21:53:16 fetching corpus: 5646, signal 149592/245024 (executing program) 2021/04/28 21:53:16 fetching corpus: 5696, signal 150101/245918 (executing program) 2021/04/28 21:53:16 fetching corpus: 5746, signal 150571/246794 (executing program) 2021/04/28 21:53:16 fetching corpus: 5796, signal 150984/247597 (executing program) 2021/04/28 21:53:16 fetching corpus: 5846, signal 151427/248426 (executing program) 2021/04/28 21:53:16 fetching corpus: 5896, signal 151832/249285 (executing program) 2021/04/28 21:53:16 fetching corpus: 5946, signal 152259/250157 (executing program) 2021/04/28 21:53:16 fetching corpus: 5996, signal 152724/251013 (executing program) 2021/04/28 21:53:16 fetching corpus: 6046, signal 153311/251856 (executing program) 2021/04/28 21:53:16 fetching corpus: 6096, signal 153788/252706 (executing program) 2021/04/28 21:53:16 fetching corpus: 6146, signal 154244/253506 (executing program) 2021/04/28 21:53:16 fetching corpus: 6196, signal 154848/254325 (executing program) 2021/04/28 21:53:16 fetching corpus: 6246, signal 155160/255124 (executing program) 2021/04/28 21:53:16 fetching corpus: 6296, signal 156078/255923 (executing program) 2021/04/28 21:53:16 fetching corpus: 6346, signal 156488/256748 (executing program) 2021/04/28 21:53:16 fetching corpus: 6396, signal 157036/256983 (executing program) 2021/04/28 21:53:17 fetching corpus: 6446, signal 157451/256987 (executing program) 2021/04/28 21:53:17 fetching corpus: 6496, signal 157804/256990 (executing program) 2021/04/28 21:53:17 fetching corpus: 6546, signal 158255/256990 (executing program) 2021/04/28 21:53:17 fetching corpus: 6596, signal 158778/256992 (executing program) 2021/04/28 21:53:17 fetching corpus: 6646, signal 159185/256992 (executing program) 2021/04/28 21:53:17 fetching corpus: 6696, signal 159526/256992 (executing program) 2021/04/28 21:53:17 fetching corpus: 6745, signal 160109/256992 (executing program) 2021/04/28 21:53:17 fetching corpus: 6795, signal 160831/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 6845, signal 161254/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 6895, signal 161484/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 6945, signal 161781/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 6994, signal 162067/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 7044, signal 162455/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 7094, signal 162938/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 7144, signal 163385/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 7194, signal 163963/256997 (executing program) 2021/04/28 21:53:17 fetching corpus: 7244, signal 164254/256998 (executing program) 2021/04/28 21:53:17 fetching corpus: 7294, signal 164652/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7344, signal 165115/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7394, signal 165590/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7444, signal 165971/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7494, signal 166409/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7544, signal 167086/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7594, signal 167462/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7644, signal 167916/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7694, signal 168279/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7744, signal 168605/257000 (executing program) 2021/04/28 21:53:17 fetching corpus: 7794, signal 168955/257000 (executing program) 2021/04/28 21:53:18 fetching corpus: 7844, signal 169338/257000 (executing program) 2021/04/28 21:53:18 fetching corpus: 7894, signal 169812/257000 (executing program) 2021/04/28 21:53:18 fetching corpus: 7944, signal 170104/257000 (executing program) 2021/04/28 21:53:18 fetching corpus: 7994, signal 170421/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8044, signal 170778/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8094, signal 171103/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8144, signal 171320/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8194, signal 171719/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8244, signal 171962/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8294, signal 172358/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8344, signal 172662/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8394, signal 172939/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8444, signal 173503/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8494, signal 173803/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8544, signal 174035/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8594, signal 174401/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8644, signal 174961/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8694, signal 175458/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8744, signal 176013/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8794, signal 176329/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8844, signal 176668/257012 (executing program) 2021/04/28 21:53:18 fetching corpus: 8894, signal 177120/257022 (executing program) 2021/04/28 21:53:18 fetching corpus: 8944, signal 177384/257022 (executing program) 2021/04/28 21:53:18 fetching corpus: 8994, signal 177667/257022 (executing program) 2021/04/28 21:53:18 fetching corpus: 9044, signal 178182/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9094, signal 178410/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9144, signal 179156/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9193, signal 179418/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9243, signal 179808/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9293, signal 180048/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9343, signal 180454/257022 (executing program) 2021/04/28 21:53:19 fetching corpus: 9393, signal 180670/257024 (executing program) 2021/04/28 21:53:19 fetching corpus: 9443, signal 180992/257024 (executing program) 2021/04/28 21:53:19 fetching corpus: 9493, signal 181396/257024 (executing program) 2021/04/28 21:53:19 fetching corpus: 9543, signal 181757/257024 (executing program) 2021/04/28 21:53:19 fetching corpus: 9593, signal 182065/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9643, signal 182433/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9693, signal 182802/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9743, signal 183052/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9793, signal 183381/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9842, signal 183736/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9892, signal 183981/257025 (executing program) 2021/04/28 21:53:19 fetching corpus: 9942, signal 184311/257027 (executing program) 2021/04/28 21:53:19 fetching corpus: 9992, signal 184639/257027 (executing program) 2021/04/28 21:53:19 fetching corpus: 10042, signal 185336/257027 (executing program) 2021/04/28 21:53:19 fetching corpus: 10092, signal 185582/257028 (executing program) 2021/04/28 21:53:19 fetching corpus: 10141, signal 185757/257028 (executing program) 2021/04/28 21:53:19 fetching corpus: 10190, signal 186019/257028 (executing program) 2021/04/28 21:53:19 fetching corpus: 10240, signal 186338/257033 (executing program) 2021/04/28 21:53:19 fetching corpus: 10290, signal 186738/257033 (executing program) 2021/04/28 21:53:19 fetching corpus: 10340, signal 187089/257033 (executing program) 2021/04/28 21:53:19 fetching corpus: 10390, signal 187352/257033 (executing program) 2021/04/28 21:53:19 fetching corpus: 10439, signal 187632/257033 (executing program) 2021/04/28 21:53:20 fetching corpus: 10489, signal 187900/257033 (executing program) 2021/04/28 21:53:20 fetching corpus: 10539, signal 188274/257033 (executing program) 2021/04/28 21:53:20 fetching corpus: 10589, signal 188517/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10639, signal 188720/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10689, signal 189120/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10739, signal 189434/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10789, signal 189714/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10839, signal 190062/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10889, signal 190253/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10939, signal 190441/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 10989, signal 190629/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11039, signal 190888/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11089, signal 191282/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11138, signal 191634/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11188, signal 192000/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11238, signal 192286/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11288, signal 192477/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11337, signal 192714/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11387, signal 192932/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11437, signal 193103/257034 (executing program) 2021/04/28 21:53:20 fetching corpus: 11486, signal 193457/257035 (executing program) 2021/04/28 21:53:20 fetching corpus: 11536, signal 193836/257035 (executing program) 2021/04/28 21:53:20 fetching corpus: 11586, signal 194176/257035 (executing program) 2021/04/28 21:53:20 fetching corpus: 11636, signal 194503/257035 (executing program) 2021/04/28 21:53:20 fetching corpus: 11686, signal 194752/257035 (executing program) 2021/04/28 21:53:20 fetching corpus: 11736, signal 194930/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 11786, signal 195205/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 11836, signal 195421/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 11886, signal 195865/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 11936, signal 196089/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 11986, signal 196308/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12036, signal 196530/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12086, signal 196785/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12136, signal 197011/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12186, signal 197307/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12236, signal 197518/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12286, signal 197781/257037 (executing program) 2021/04/28 21:53:21 fetching corpus: 12336, signal 198171/257054 (executing program) 2021/04/28 21:53:21 fetching corpus: 12386, signal 198434/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12436, signal 198928/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12486, signal 199156/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12536, signal 199381/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12586, signal 199607/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12636, signal 199830/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12686, signal 200040/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12736, signal 200256/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12786, signal 200436/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12836, signal 200688/257056 (executing program) 2021/04/28 21:53:21 fetching corpus: 12886, signal 200967/257116 (executing program) 2021/04/28 21:53:21 fetching corpus: 12935, signal 201248/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 12985, signal 201454/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13035, signal 201745/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13085, signal 202007/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13134, signal 202176/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13184, signal 202488/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13234, signal 202757/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13284, signal 203010/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13334, signal 203481/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13384, signal 203732/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13433, signal 204158/257117 (executing program) 2021/04/28 21:53:22 fetching corpus: 13483, signal 204343/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13533, signal 204583/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13583, signal 204792/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13633, signal 205039/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13683, signal 205348/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13733, signal 205616/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13783, signal 205797/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13833, signal 206012/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13883, signal 206222/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13933, signal 206445/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 13983, signal 206656/257123 (executing program) 2021/04/28 21:53:22 fetching corpus: 14033, signal 206854/257125 (executing program) 2021/04/28 21:53:22 fetching corpus: 14083, signal 207077/257125 (executing program) 2021/04/28 21:53:22 fetching corpus: 14133, signal 207224/257125 (executing program) 2021/04/28 21:53:22 fetching corpus: 14183, signal 207583/257125 (executing program) 2021/04/28 21:53:22 fetching corpus: 14233, signal 207799/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14283, signal 208111/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14333, signal 208421/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14383, signal 208621/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14433, signal 208825/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14483, signal 209066/257125 (executing program) 2021/04/28 21:53:23 fetching corpus: 14533, signal 209455/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14583, signal 209765/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14633, signal 209914/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14682, signal 210172/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14732, signal 210348/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14782, signal 210628/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14832, signal 210753/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14882, signal 210987/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14932, signal 211263/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 14982, signal 211463/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15032, signal 211655/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15082, signal 211948/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15132, signal 212194/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15182, signal 212525/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15232, signal 212685/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15282, signal 212890/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15332, signal 213038/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15381, signal 213239/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15431, signal 213458/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15481, signal 213702/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15531, signal 213993/257126 (executing program) 2021/04/28 21:53:23 fetching corpus: 15581, signal 214271/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15631, signal 214439/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15681, signal 214658/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15731, signal 214832/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15781, signal 215087/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15831, signal 215264/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15881, signal 215525/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15931, signal 215716/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 15981, signal 215957/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16031, signal 216277/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16081, signal 216478/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16131, signal 216802/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16181, signal 216983/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16231, signal 217282/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16281, signal 217474/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16331, signal 217670/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16381, signal 217888/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16431, signal 218156/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16481, signal 218353/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16531, signal 218622/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16581, signal 218896/257126 (executing program) 2021/04/28 21:53:24 fetching corpus: 16631, signal 219054/257198 (executing program) 2021/04/28 21:53:24 fetching corpus: 16681, signal 219328/257198 (executing program) 2021/04/28 21:53:24 fetching corpus: 16731, signal 219571/257198 (executing program) 2021/04/28 21:53:24 fetching corpus: 16781, signal 219800/257198 (executing program) 2021/04/28 21:53:24 fetching corpus: 16831, signal 220096/257198 (executing program) 2021/04/28 21:53:24 fetching corpus: 16881, signal 220315/257231 (executing program) 2021/04/28 21:53:24 fetching corpus: 16930, signal 220648/257231 (executing program) 2021/04/28 21:53:24 fetching corpus: 16980, signal 220837/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17030, signal 221073/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17080, signal 221315/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17130, signal 221490/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17180, signal 221699/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17230, signal 221904/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17280, signal 222098/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17330, signal 222279/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17380, signal 222500/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17430, signal 222704/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17478, signal 223079/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17528, signal 223425/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17578, signal 223629/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17628, signal 223825/257231 (executing program) 2021/04/28 21:53:25 fetching corpus: 17678, signal 223961/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17728, signal 224170/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17778, signal 224412/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17828, signal 224604/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17878, signal 224788/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17928, signal 224990/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 17978, signal 225228/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 18027, signal 225451/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 18077, signal 225727/257234 (executing program) 2021/04/28 21:53:25 fetching corpus: 18127, signal 225947/257235 (executing program) 2021/04/28 21:53:25 fetching corpus: 18177, signal 226199/257235 (executing program) 2021/04/28 21:53:25 fetching corpus: 18227, signal 226368/257235 (executing program) 2021/04/28 21:53:25 fetching corpus: 18277, signal 226520/257235 (executing program) 2021/04/28 21:53:26 fetching corpus: 18327, signal 226750/257236 (executing program) 2021/04/28 21:53:26 fetching corpus: 18377, signal 226890/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18427, signal 227083/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18477, signal 227369/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18527, signal 227496/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18577, signal 227653/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18626, signal 227842/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18676, signal 228030/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18726, signal 228326/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18776, signal 228583/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18826, signal 228874/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18875, signal 229068/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18925, signal 229222/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 18975, signal 229386/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 19025, signal 229596/257240 (executing program) 2021/04/28 21:53:26 fetching corpus: 19075, signal 229750/257242 (executing program) 2021/04/28 21:53:26 fetching corpus: 19125, signal 229890/257246 (executing program) 2021/04/28 21:53:26 fetching corpus: 19175, signal 230054/257246 (executing program) 2021/04/28 21:53:26 fetching corpus: 19225, signal 230198/257246 (executing program) 2021/04/28 21:53:26 fetching corpus: 19275, signal 230332/257246 (executing program) 2021/04/28 21:53:26 fetching corpus: 19325, signal 230528/257246 (executing program) 2021/04/28 21:53:26 fetching corpus: 19375, signal 230777/257265 (executing program) 2021/04/28 21:53:26 fetching corpus: 19422, signal 230968/257265 (executing program) 2021/04/28 21:53:26 fetching corpus: 19472, signal 231114/257265 (executing program) 2021/04/28 21:53:26 fetching corpus: 19522, signal 231274/257265 (executing program) 2021/04/28 21:53:26 fetching corpus: 19571, signal 231481/257269 (executing program) 2021/04/28 21:53:27 fetching corpus: 19621, signal 231729/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19670, signal 231915/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19720, signal 232086/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19770, signal 232313/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19820, signal 232443/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19870, signal 232612/257305 (executing program) 2021/04/28 21:53:27 fetching corpus: 19920, signal 232848/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 19970, signal 233009/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 20020, signal 233191/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 20070, signal 233341/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 20120, signal 233539/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 20170, signal 233687/257306 (executing program) 2021/04/28 21:53:27 fetching corpus: 20219, signal 233926/257307 (executing program) 2021/04/28 21:53:27 fetching corpus: 20269, signal 234136/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20319, signal 234315/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20369, signal 234462/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20418, signal 234614/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20468, signal 234807/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20518, signal 234979/257308 (executing program) 2021/04/28 21:53:27 fetching corpus: 20567, signal 235135/257310 (executing program) 2021/04/28 21:53:27 fetching corpus: 20617, signal 235284/257310 (executing program) 2021/04/28 21:53:27 fetching corpus: 20667, signal 235438/257310 (executing program) 2021/04/28 21:53:27 fetching corpus: 20717, signal 235577/257310 (executing program) 2021/04/28 21:53:27 fetching corpus: 20767, signal 235813/257311 (executing program) 2021/04/28 21:53:27 fetching corpus: 20816, signal 235989/257313 (executing program) 2021/04/28 21:53:28 fetching corpus: 20866, signal 236133/257313 (executing program) 2021/04/28 21:53:28 fetching corpus: 20915, signal 236332/257313 (executing program) 2021/04/28 21:53:28 fetching corpus: 20965, signal 236610/257314 (executing program) 2021/04/28 21:53:28 fetching corpus: 21014, signal 236796/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21064, signal 237079/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21114, signal 237258/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21163, signal 237418/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21213, signal 237568/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21263, signal 237692/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21313, signal 237841/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21363, signal 238008/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21412, signal 238164/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21462, signal 238330/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21512, signal 238672/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21562, signal 238808/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21612, signal 239018/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21662, signal 239324/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21712, signal 239483/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21762, signal 239638/257318 (executing program) 2021/04/28 21:53:28 fetching corpus: 21811, signal 239805/257319 (executing program) 2021/04/28 21:53:28 fetching corpus: 21861, signal 239969/257319 (executing program) 2021/04/28 21:53:28 fetching corpus: 21911, signal 240198/257319 (executing program) 2021/04/28 21:53:28 fetching corpus: 21960, signal 240346/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22010, signal 240494/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22060, signal 240613/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22109, signal 240770/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22159, signal 240904/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22209, signal 241064/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22259, signal 241200/257320 (executing program) 2021/04/28 21:53:28 fetching corpus: 22309, signal 241369/257320 (executing program) 2021/04/28 21:53:29 fetching corpus: 22358, signal 241532/257326 (executing program) 2021/04/28 21:53:29 fetching corpus: 22408, signal 241713/257326 (executing program) 2021/04/28 21:53:29 fetching corpus: 22458, signal 241859/257326 (executing program) 2021/04/28 21:53:29 fetching corpus: 22508, signal 241978/257326 (executing program) 2021/04/28 21:53:29 fetching corpus: 22558, signal 242139/257326 (executing program) 2021/04/28 21:53:29 fetching corpus: 22607, signal 242255/257327 (executing program) 2021/04/28 21:53:29 fetching corpus: 22656, signal 242500/257327 (executing program) 2021/04/28 21:53:29 fetching corpus: 22706, signal 242743/257327 (executing program) 2021/04/28 21:53:29 fetching corpus: 22755, signal 242891/257327 (executing program) 2021/04/28 21:53:29 fetching corpus: 22805, signal 243092/257328 (executing program) 2021/04/28 21:53:29 fetching corpus: 22855, signal 243248/257328 (executing program) 2021/04/28 21:53:29 fetching corpus: 22905, signal 243472/257328 (executing program) 2021/04/28 21:53:29 fetching corpus: 22955, signal 243617/257328 (executing program) 2021/04/28 21:53:29 fetching corpus: 23005, signal 243773/257328 (executing program) 2021/04/28 21:53:29 fetching corpus: 23053, signal 243935/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23103, signal 244073/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23151, signal 244217/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23200, signal 244406/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23249, signal 244499/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23299, signal 244749/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23348, signal 244904/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23398, signal 245043/257334 (executing program) 2021/04/28 21:53:29 fetching corpus: 23447, signal 245214/257335 (executing program) 2021/04/28 21:53:29 fetching corpus: 23497, signal 245500/257335 (executing program) 2021/04/28 21:53:29 fetching corpus: 23547, signal 245661/257335 (executing program) 2021/04/28 21:53:29 fetching corpus: 23597, signal 245843/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23647, signal 245974/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23697, signal 246144/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23746, signal 246330/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23796, signal 246465/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23846, signal 246600/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23896, signal 246721/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23945, signal 246838/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 23995, signal 246975/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24045, signal 247159/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24095, signal 247302/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24145, signal 247486/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24195, signal 247641/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24245, signal 247891/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24295, signal 248012/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24345, signal 248459/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24395, signal 248636/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24445, signal 248857/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24494, signal 248993/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24544, signal 249171/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24594, signal 249285/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24644, signal 249431/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24694, signal 249615/257335 (executing program) 2021/04/28 21:53:30 fetching corpus: 24743, signal 249740/257336 (executing program) 2021/04/28 21:53:30 fetching corpus: 24793, signal 249905/257336 (executing program) 2021/04/28 21:53:30 fetching corpus: 24843, signal 250010/257340 (executing program) 2021/04/28 21:53:30 fetching corpus: 24893, signal 250119/257340 (executing program) 2021/04/28 21:53:30 fetching corpus: 24943, signal 250296/257340 (executing program) 2021/04/28 21:53:30 fetching corpus: 24993, signal 250426/257340 (executing program) 2021/04/28 21:53:31 fetching corpus: 25042, signal 250537/257340 (executing program) 2021/04/28 21:53:31 fetching corpus: 25092, signal 250681/257340 (executing program) 2021/04/28 21:53:31 fetching corpus: 25140, signal 250919/257346 (executing program) 2021/04/28 21:53:31 fetching corpus: 25190, signal 251054/257346 (executing program) 2021/04/28 21:53:31 fetching corpus: 25240, signal 251168/257346 (executing program) 2021/04/28 21:53:31 fetching corpus: 25290, signal 251287/257347 (executing program) 2021/04/28 21:53:31 fetching corpus: 25340, signal 251443/257347 (executing program) 2021/04/28 21:53:31 fetching corpus: 25389, signal 251569/257347 (executing program) 2021/04/28 21:53:31 fetching corpus: 25439, signal 251745/257347 (executing program) 2021/04/28 21:53:31 fetching corpus: 25489, signal 251891/257347 (executing program) 2021/04/28 21:53:31 fetching corpus: 25539, signal 252081/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25589, signal 252212/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25639, signal 252359/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25689, signal 252515/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25739, signal 252655/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25789, signal 252812/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25839, signal 252965/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25889, signal 253177/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25938, signal 253302/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 25988, signal 253419/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 26038, signal 253518/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 26088, signal 253651/257351 (executing program) 2021/04/28 21:53:31 fetching corpus: 26137, signal 253818/257351 (executing program) 2021/04/28 21:53:32 fetching corpus: 26187, signal 253945/257353 (executing program) 2021/04/28 21:53:32 fetching corpus: 26237, signal 254037/257353 (executing program) 2021/04/28 21:53:32 fetching corpus: 26287, signal 254186/257353 (executing program) 2021/04/28 21:53:32 fetching corpus: 26337, signal 254382/257353 (executing program) 2021/04/28 21:53:32 fetching corpus: 26387, signal 254511/257353 (executing program) 2021/04/28 21:53:32 fetching corpus: 26437, signal 254673/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26487, signal 254850/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26537, signal 255019/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26587, signal 255156/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26637, signal 255282/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26687, signal 255433/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26737, signal 255545/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26740, signal 255554/257355 (executing program) 2021/04/28 21:53:32 fetching corpus: 26740, signal 255554/257355 (executing program) 2021/04/28 21:53:34 starting 6 fuzzer processes 21:53:34 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f0000000280)) 21:53:34 executing program 1: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) setresuid(0xee01, 0xee01, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 21:53:34 executing program 5: r0 = memfd_create(&(0x7f00000022c0)='{.#\x00', 0x0) ioctl$int_out(r0, 0x541b, &(0x7f0000000140)) 21:53:34 executing program 2: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 21:53:34 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 21:53:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r1, &(0x7f0000001900)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000001800)=""/245, 0x57}], 0x2) syzkaller login: [ 40.765966][ T25] audit: type=1400 audit(1619646814.221:8): avc: denied { execmem } for pid=1766 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 40.949205][ T1772] cgroup: Unknown subsys name 'perf_event' [ 40.976937][ T1772] cgroup: Unknown subsys name 'net_cls' [ 41.015843][ T1775] cgroup: Unknown subsys name 'perf_event' [ 41.022067][ T1775] cgroup: Unknown subsys name 'net_cls' [ 41.026765][ T1774] cgroup: Unknown subsys name 'perf_event' [ 41.030045][ T1776] cgroup: Unknown subsys name 'perf_event' [ 41.035450][ T1774] cgroup: Unknown subsys name 'net_cls' [ 41.049774][ T1776] cgroup: Unknown subsys name 'net_cls' [ 41.051296][ T1777] cgroup: Unknown subsys name 'perf_event' [ 41.064464][ T1781] cgroup: Unknown subsys name 'perf_event' [ 41.066861][ T1777] cgroup: Unknown subsys name 'net_cls' [ 41.073860][ T1781] cgroup: Unknown subsys name 'net_cls' 21:53:39 executing program 0: set_mempolicy(0x1, &(0x7f00000000c0)=0x7, 0x5) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000001280)='system.posix_acl_default\x00', &(0x7f0000001340), 0x24, 0x0) 21:53:39 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000002c0)='notify_on_release\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='1', 0x1}], 0x1) 21:53:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x96, &(0x7f0000000180)="c4c6910101ed000000000000e0a593b440f7629100f06ee04fa4ea57ff22ea97be19af1dcb8a4732897bce0405e4eb2dad5ec3c4c5029e40dbf98409b2cd45378dcb6520ff09cf6aa7babc6997d47b4c90352d7258efac44e013c5d6cf2a7540249c9a6e3fdd850e30f06649570aef8ac66b39dc7246bf7d9b131aa01a83b07bfa683f32a7d1bb0a8ff71e7846e079a285f52f651e94"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 21:53:39 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltuid=', @ANYRESHEX]) 21:53:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='\x00'/15, 0x0) 21:53:39 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000240)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=[@mark={{0x18, 0x1, 0x25}}, @mark={{0x14}}], 0x30}, 0x0) [ 45.746657][ T4511] new mount options do not match the existing superblock, will be ignored 21:53:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r1, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) r2 = msgget$private(0x0, 0x0) msgrcv(r2, &(0x7f0000019300)={0x0, ""/4096}, 0x1008, 0x0, 0x3000) msgsnd(r2, &(0x7f0000000000)=ANY=[], 0x2000, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) 21:53:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_io_uring_setup(0x85, &(0x7f0000000080), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x2039, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 2: r0 = io_uring_setup(0x136e, &(0x7f0000000000)={0x0, 0x0, 0x7}) pipe(&(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) io_uring_enter(r0, 0x3189, 0xcc71, 0x2, 0x0, 0x0) 21:53:39 executing program 0: unshare(0x42000000) prctl$PR_SET_SECUREBITS(0x1c, 0x0) [ 45.825080][ T4511] new mount options do not match the existing superblock, will be ignored 21:53:39 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000190007041dfffd946f6105000a020300fe0208010001080008000a000400ff7e", 0x24}], 0x1}, 0x0) 21:53:39 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 3: creat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000300)=""/4090, 0xffa}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r1, &(0x7f0000001600)=[{&(0x7f0000000140)=""/235, 0xeb}], 0x1, 0x1000, 0x0) 21:53:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100), 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000001b40)={0x168, 0x0, 0x534, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5c9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x101}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80000000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x20}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffffff7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER={0xa0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x652034ea}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_NAME={0x17, 0x1, @l2={'ib', 0x3a, 'veth1_virt_wifi\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @remote, 0x8}}}}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_LINK={0x28, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}]}, 0x168}}, 0x0) 21:53:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r0, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) getpeername$unix(r1, 0x0, &(0x7f0000000980)) 21:53:39 executing program 4: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x5386, 0xc04a01) 21:53:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x25, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT={0x8}, @CTA_MARK={0x8}, @CTA_SYNPROXY={0x4}]}, 0x28}}, 0x0) 21:53:39 executing program 3: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x6, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 21:53:39 executing program 2: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000700)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000580)="5d9781e4acfa", 0x0, 0xffffff7f, 0x0, 0x0, 0x0}) 21:53:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r4, r6) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) 21:53:39 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:39 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000200)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e22, 0x1000000080000, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@pktinfo={{0x24, 0x29, 0xb, {@private0}}}], 0x28}, 0x0) 21:53:39 executing program 4: r0 = gettid() pidfd_open(r0, 0x0) [ 46.192768][ T4618] new mount options do not match the existing superblock, will be ignored [ 46.201210][ T4623] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.1'. 21:53:39 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in6=@empty, 0x0, 0x0, 0xff}, [@mark={0xc}]}, 0x34}}, 0x0) 21:53:39 executing program 5: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff85000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 21:53:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) clone(0x52010000, &(0x7f00000000c0), 0x0, &(0x7f0000000200), &(0x7f0000000240)="efea2994ac3ed942ae5ed978551558d7f9ff88ac50b76fdabb2c853f7b78a83f9c467554485c48db08e9bc4786dd86a2cc6d4e8a3fdabcd866f7aa4b5305a4709f0b3079115973eff2861ba0d212d101f0da33de2cd83521d7a27fdf2ed0e279519d1e365e2c6302b6e0f8a50d48182b0e7e2d84450c363dfae69c2e13d44d8bf2d2a75c378089fe50") r1 = add_key$keyring(&(0x7f0000000740), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000380)="074ad26d0cd686d334f2d3a018f1245fcb263a369c2cc3bd38312e5e54eca34923000000000000000000000000000000ef88ef2eba5026ecd257b82ca5d88e85e197bc8be22c5b07332aa19600bd4aa6b98f14178c5464348fd67a702259dddb41a4c3aa66094877595221a2de4861dc3b0cb18c6b436bea1ad80f7d99cb4760281897327a2463be6b540a75571b00", 0x8f, r1) r2 = add_key$keyring(&(0x7f0000000740), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000740), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r2) add_key(0x0, 0x0, 0x0, 0x0, 0x0) 21:53:39 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:39 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:39 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) [ 46.345132][ T4642] loop5: detected capacity change from 0 to 1 [ 46.359687][ T4647] Option ' ' to dns_resolver key: bad/missing value 21:53:39 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/205, 0xcd) 21:53:39 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000280)='j', 0x1, 0x0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10020, 0x0) [ 46.387618][ T4648] Option ' ' to dns_resolver key: bad/missing value [ 46.407384][ T4642] loop5: p2 < > p3 p4 [ 46.420611][ T4642] loop5: p2 size 2 extends beyond EOD, truncated 21:53:39 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/205, 0xcd) 21:53:39 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000440)="7800000018001f06b9409b0dffff00fe0212be04020006050400030043001e0003000000fac8388827a685a168d0bf46d32345653600648dcaaf6c26c291214549935ade4a460c89b6ec0cff3959547f509058ba86c902000000000000000400160012000a000000000000000000000000f6b4f8eca0faed", 0x78, 0x0, 0x0, 0x0) [ 46.470072][ C1] hrtimer: interrupt took 45855 ns [ 46.485713][ T4642] loop5: p3 start 225 is beyond EOD, truncated [ 46.492389][ T4642] loop5: p4 size 3657465856 extends beyond EOD, truncated 21:53:40 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:40 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/205, 0xcd) [ 46.563123][ T4686] netlink: 'syz-executor.4': attribute type 30 has an invalid length. [ 46.603457][ T4642] loop5: detected capacity change from 0 to 1 [ 46.674105][ T4642] loop5: p2 < > p3 p4 [ 46.681073][ T4642] loop5: p2 size 2 extends beyond EOD, truncated [ 46.703819][ T4642] loop5: p3 start 225 is beyond EOD, truncated [ 46.711655][ T4642] loop5: p4 size 3657465856 extends beyond EOD, truncated 21:53:40 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x1a, 0x13012, r0, 0x0) 21:53:40 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:40 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getrlimit(0x0, &(0x7f0000000040)) 21:53:40 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:40 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40), 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040), 0x0, 0x0, 0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/205, 0xcd) 21:53:40 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:40 executing program 3: r0 = fork() wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0xd) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, r0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1) [ 46.784123][ T25] audit: type=1326 audit(1619646820.232:9): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4714 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:40 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x8008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r2}) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x2, 0x1, 0x8, 0x40, 0x0, 0xbc0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, 0x0, 0x1001, 0x101, 0x4, 0x5, 0x1, 0x3, 0x80}, r2, 0xc, r0, 0x6) madvise(&(0x7f0000a92000/0x4000)=nil, 0x4000, 0x10) add_key$user(&(0x7f0000000100), &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000000)='J', 0x1, 0xffffffffffffffff) wait4(r2, &(0x7f0000000580), 0x1, &(0x7f00000005c0)) clone(0x1958ffd, 0x0, 0x0, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000240)={0x0, "1a62de13504590c0218318aaa8fcc0eac4636517899e9809bdb10ed73da6fc48d4f41a5624d294a7a3a892f83726a6b67d66e21dd005f20ff3aa723baaa41b66", 0x31}, 0x48, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)="ff", 0x1, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffb) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000000), &(0x7f0000000140)='\x00\x00\x00\x00\x00\xb7\x9d\x00\x00\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in=@loopback}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) 21:53:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 21:53:40 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000380)=ANY=[], 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x4052, r0, 0x0) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x800000141042, 0x0) ftruncate(r2, 0x200006) mlock2(&(0x7f0000000000/0x4000)=nil, 0x104000, 0x0) 21:53:40 executing program 2: r0 = fsopen(&(0x7f0000000080)='vfat\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000140)='/dev/vcsu\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff) [ 46.851766][ T25] audit: type=1326 audit(1619646820.232:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4714 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=97 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 46.895676][ T1027] loop5: p2 < > p3 p4 21:53:40 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x154, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x7, @dev}, @NLBL_MGMT_A_DOMAIN={0x10f, 0x1, '\xe6f\x1fl\xbc\xe7Z\xe4\x7f\xb3\xd7 \r\xf6o\xc3J{\x9d\xb1\x82x\xb0d\xc3%biP\xd6\xa1&Gi\xec\x110/\xaf\x8d\xf1\xd0\x15\x11.5r\r\xc8\x92\x03\x8a0\xbcL1\x86P\x19\xcb?\xdd\xbb?f\a\xa8\x18\x04\x00\x00\x00:\x17^\x04\x930x0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000040)={0xfffffffffffffdef, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 21:53:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x3, 0x0, 0x0) 21:53:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc020000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef", 0x3a, 0x400}, {0x0}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000012100)="ffff01", 0x3}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000013c00)) [ 46.985075][ T25] audit: type=1326 audit(1619646820.232:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=4714 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:40 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xaa, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xbd, 0x0) 21:53:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4e02, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x2, 0x0) 21:53:40 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c007f030000000f0000070007", 0x11) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 21:53:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) writev(r1, &(0x7f0000001240)=[{&(0x7f0000000240)="d12b3e0ea6c9fabd858f25164eec5624158fb029e0ce868ca52770040b396abde26b5330eff93a1f5654591b3e09ed4e6078bc1de357121d9ec8b4b6bd2256c866807e0e6a8ce5ff13e4fe82e1a44f736c07c10dde1373", 0x57}], 0x1) [ 47.077458][ T4778] loop3: detected capacity change from 0 to 264192 [ 47.113150][ T4778] EXT4-fs (loop3): warning: mounting unchecked fs, running e2fsck is recommended 21:53:40 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) 21:53:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4e02, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x2, 0x0) 21:53:40 executing program 3: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x10001, 0x8) getdents64(r0, &(0x7f0000000400)=""/200, 0xc8) [ 47.139693][ T4778] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:53:40 executing program 2: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)={0x0, 0x0, 0x25}, 0x18) 21:53:40 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f00000003c0)='./file1\x00', 0xffffdfff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740efa01", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 21:53:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4e02, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x2, 0x0) 21:53:40 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}], 0x0, &(0x7f0000000080)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 47.217455][ T4827] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.4'. 21:53:40 executing program 2: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)={0x0, 0x0, 0x25}, 0x18) [ 47.268307][ T4839] loop1: detected capacity change from 0 to 264192 [ 47.324482][ T4846] loop3: detected capacity change from 0 to 224 21:53:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:43 executing program 2: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)={0x0, 0x0, 0x25}, 0x18) 21:53:43 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/241, 0xf1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x1d3}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x40505331, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x3938700}}, 0x0) tkill(r0, 0x1004000000016) 21:53:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000000400)=[{{&(0x7f0000000040)={0xa, 0x4e02, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, 0x0}}], 0x2, 0x0) 21:53:43 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde88", 0x27}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x5) 21:53:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fork() rt_sigqueueinfo(r0, 0x2f, &(0x7f0000000100)={0x0, 0x0, 0xfffffe01}) waitid(0x1, r0, &(0x7f0000001c00), 0x4, &(0x7f0000000300)) 21:53:43 executing program 2: mkdir(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)={0x0, 0x0, 0x25}, 0x18) 21:53:43 executing program 0: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='uid_map\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$tcp_mem(r0, &(0x7f0000000000)={0x0, 0x20, 0x0, 0x20, 0x0, 0x9}, 0xfffffdbb) 21:53:43 executing program 4: socket(0x11, 0x3, 0x0) 21:53:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000040)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) unlink(&(0x7f0000000180)='./file0/file1\x00') mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x2000, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0), 0x0, 0x0, 0x0) 21:53:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='hugetlbfs\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000440)=0xc) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x24b6422, &(0x7f0000000180)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r1]) [ 50.193199][ T25] audit: type=1400 audit(1619646823.642:13): avc: denied { sys_admin } for pid=4882 comm="syz-executor.0" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 21:53:43 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000100)={0x5e}) [ 50.251435][ T4897] hugetlbfs: Bad value '0x00000000ffffffff' for mount option 'uid' [ 50.251435][ T4897] [ 50.266057][ T4901] hugetlbfs: Bad value '0x00000000ffffffff' for mount option 'uid' [ 50.266057][ T4901] 21:53:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:44 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) 21:53:44 executing program 1: unshare(0x40600) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fgetxattr(r0, &(0x7f00000000c0)=@known='system.sockprotoname\x00', 0x0, 0x0) 21:53:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) 21:53:46 executing program 0: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 21:53:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc00000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019ff9600500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="000000000000000010000000b138543112eb43ac9dbc7e1411f64d55010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="ff070000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f00000002c0)="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", 0x22d, 0x1980}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000000300)=ANY=[]) 21:53:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:46 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r0, 0x0, r3, 0x0, 0x4ffe0, 0x0) 21:53:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0x9c}, {0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 53.150495][ T4943] loop1: detected capacity change from 0 to 24576 [ 53.208726][ T4943] EXT4-fs error (device loop1): ext4_ext_check_inode:459: inode #16: comm syz-executor.1: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 53.227580][ T4943] EXT4-fs error (device loop1): ext4_orphan_get:1391: comm syz-executor.1: couldn't read orphan inode 16 (err -117) [ 53.240711][ T4943] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:53:46 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[{0x10}], 0x10}, 0x0) 21:53:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 21:53:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) 21:53:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) [ 53.428885][ T4943] ext4 filesystem being mounted at /root/syzkaller-testdir723604475/syzkaller.LCeUkP/12/file0 supports timestamps until 2038 (0x7fffffff) 21:53:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 21:53:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:47 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb66f2d696569eada31b09fbd15f0332701d9d14a3f3109d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552841516ab78c83f85cfe873f70957000dac653b3b313d89a46e152f505778305470dad528d3b41f1f70f3e58625c153cc7", 0x128}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:53:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131600a", 0xe}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) 21:53:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) 21:53:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x1) lseek(r1, 0x1200, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x200fff) 21:53:47 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pidfd_send_signal(r0, 0x12, 0x0, 0x0) 21:53:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) pread64(r1, &(0x7f0000000280)=""/188, 0xbc, 0x0) 21:53:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xae, &(0x7f0000000240)="f3180479cebca2feef0c4e6e653386e00bfa2685c683676483f22766c044814ad53d69f9c013916a17f30572d2beea1fc586d4a4f45d81a30c273c1d6f7be1a33c5ddcbd118cdd913f95ffeeede27664237e4312dd5bf250f31e86cc803dcced79e00c5a72ff3449326f428fe6d34c5ebe2f42849c85b0e6301b6236dcf663f2a12f9b4a444fd10074d2e193e7d9a6e7709f71fda07f4201d0cdf81e4a430ec2b0d5ad59a58a820879978d920bca"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:53:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000003) 21:53:47 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f00000012c0), 0x0) 21:53:47 executing program 3: r0 = syz_io_uring_setup(0x4e7e, &(0x7f0000000340), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f00000003c0)) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '\x00'}, 0x0, 0x0, 0x0) 21:53:47 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x9df3) ptrace$pokeuser(0x6, r0, 0x388, 0x2) 21:53:47 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x204400, 0x0) inotify_rm_watch(r0, 0x0) 21:53:47 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) fcntl$setlease(r0, 0x5, 0x4af000) 21:53:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) mq_open(&(0x7f0000000180)='-.]&', 0x0, 0x0, 0x0) 21:53:47 executing program 3: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000300)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) pwritev(r1, &(0x7f00000014c0)=[{&(0x7f0000000080)="d69f2271", 0x8800000}], 0x1, 0x0, 0x1400) [ 54.363515][ T25] audit: type=1326 audit(1619646827.813:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5070 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 54.429887][ T25] audit: type=1326 audit(1619646827.843:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5070 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=240 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 54.487817][ T25] audit: type=1326 audit(1619646827.843:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5070 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:48 executing program 4: setxattr$security_selinux(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) 21:53:48 executing program 0: add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xffffffffffffffff) 21:53:48 executing program 1: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000580)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="e3", 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000340)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) 21:53:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xb9, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 21:53:48 executing program 2: r0 = fsopen(&(0x7f0000000040)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x5, &(0x7f0000000000)='nolazytime\x00', 0x0, 0x300) 21:53:48 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000b00)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) [ 54.522746][ T25] audit: type=1326 audit(1619646827.843:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5070 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 54.549635][ T25] audit: type=1326 audit(1619646827.843:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5070 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:48 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x240000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000003540), r0) 21:53:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f00000003c0)=ANY=[], 0x8) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000480)=0x4000000000007, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x4000a3172, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 21:53:48 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x168, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x20) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) gettid() 21:53:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x1a1, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 21:53:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x40, &(0x7f0000000140)={@private, @empty}, 0xc) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) mmap(&(0x7f000032f000/0x3000)=nil, 0x3000, 0x2000004, 0x10, 0xffffffffffffffff, 0x0) [ 54.651263][ T5102] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 54.687207][ T5112] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 21:53:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x530d0000) 21:53:50 executing program 5: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) lseek(r0, 0xe, 0x1) 21:53:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 21:53:50 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x240000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000003540), r0) 21:53:50 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7ff) 21:53:50 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0xb09040, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='.\x00', &(0x7f0000000280), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 57.396570][ T25] audit: type=1326 audit(1619646830.853:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5143 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 57.409924][ T5155] mmap: syz-executor.3 (5155) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:53:50 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x240000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000003540), r0) 21:53:50 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000020c0)=[{&(0x7f0000010600)="ec4344303031", 0x6, 0x8800}], 0x0, &(0x7f0000000080)) 21:53:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@broadcast}, 0xa, @in6=@local}}, 0xe8) 21:53:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='wchan\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) [ 57.431857][ T25] audit: type=1326 audit(1619646830.883:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5143 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=304 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:50 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7ff) 21:53:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3}, {0x25}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:53:51 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x240000, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000003540), r0) [ 57.499195][ T5162] loop4: detected capacity change from 0 to 136 [ 57.525687][ T5162] isofs_fill_super: bread failed, dev=loop4, iso_blknum=34, block=68 21:53:51 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7ff) 21:53:51 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='#\'%no\x00\x00v\x00\x7f\xe5\xd0ql\x86\xc9\xe6\x14\x93\xb0\x14L\xb8i<~\xab\x84\x00\x00\x00\x00\x00\x00\x14}\n\x81\xc7\x85|oC\xca\v\xe3\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xab\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF\x13\x9f\xc2\xb7/1\xb9V\xf0*\xcb\xdc\x05n<\xcfi\x02=1\xda\"\xb3\xfe\xf3\x97\xd9\xa5b\xd4\x00Q$\xb2v\\\xa9\xcf*tw\x8a\n_)\x89A\x8f`R\x12zM\a\xc43\xd0d\xee\x13Q', 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x2000) dup2(r0, r1) 21:53:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x34, &(0x7f0000000080), 0x4) 21:53:51 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x30, 0x0, 0x108) [ 57.559692][ T25] audit: type=1326 audit(1619646830.883:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5143 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 57.574861][ T5162] loop4: detected capacity change from 0 to 136 [ 57.597119][ T5162] isofs_fill_super: bread failed, dev=loop4, iso_blknum=34, block=68 21:53:51 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{}, {0x1c}, {0x6}]}) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) 21:53:51 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 21:53:51 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7ff) 21:53:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x78, 0x0, 0x1, 0x409, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_DST={0x14, 0xd, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @loopback}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @dev}]}]}, 0x78}}, 0x0) 21:53:51 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)) [ 57.712976][ T25] audit: type=1326 audit(1619646830.883:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5143 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[], 0x8d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r0, &(0x7f0000000040)=""/74, 0x4a) [ 57.755473][ T25] audit: type=1326 audit(1619646830.923:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5143 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:51 executing program 3: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmctl$IPC_RMID(r0, 0x0) shmget$private(0x0, 0x3000, 0x54000000, &(0x7f0000ffc000/0x3000)=nil) r1 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r1, 0xb) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x2000) shmctl$SHM_LOCK(r1, 0xb) remap_file_pages(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x5000) 21:53:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 21:53:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_io_uring_setup(0x85, &(0x7f0000000100), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:53:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[], 0x8d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r0, &(0x7f0000000040)=""/74, 0x4a) 21:53:51 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 21:53:51 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000080)={0x7fe}, 0x10) write(r0, &(0x7f0000000040)="1c0000001a009b8a14e5f4070009042400000000ff000003000a0000", 0x5a) 21:53:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_modinfo}) 21:53:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000200)=""/152, 0x19, 0x3) 21:53:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[], 0x8d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r0, &(0x7f0000000040)=""/74, 0x4a) 21:53:52 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:53:52 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) 21:53:52 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f00000000c0)=0xfff, 0x4) recvmsg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) 21:53:52 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[], 0x8d) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r0, &(0x7f0000000040)=""/74, 0x4a) 21:53:52 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='cruft,utf8,utf8,utf8,check=relaxed,check=relaxed,map=off,session=0']) 21:53:52 executing program 1: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000480)="5500000018007f7000fe15b282a380930a60564e48a8430891000000390009002300ff000200000014001500740000000014566881b18432009b1100b1df13000000fb001106fffffff440970de3b3000000000900", 0x55}], 0x1}, 0x0) 21:53:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 4: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}) [ 58.702804][ T5286] ISOFS: Unable to identify CD-ROM format. 21:53:52 executing program 1: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, 0x0) r0 = io_uring_setup(0x21c5, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/236, 0xec}], 0x1) fork() 21:53:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='cruft,utf8,utf8,utf8,check=relaxed,check=relaxed,map=off,session=0']) 21:53:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) [ 58.748348][ T5286] ISOFS: Unable to identify CD-ROM format. [ 58.839445][ T5317] ISOFS: Unable to identify CD-ROM format. 21:53:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1c9500, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x319480, 0x21) getrusage(0x0, &(0x7f0000000440)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$addseals(r0, 0x409, 0x1) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ppoll(&(0x7f00000000c0)=[{r1, 0x9408}, {r0, 0x88}], 0x2, &(0x7f0000000100)={0x0, 0x989680}, &(0x7f0000000140)={[0xa9e7]}, 0x8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x3}, 0x8) sendto$inet(0xffffffffffffffff, &(0x7f0000000180)="b06f1aca7a", 0x5, 0x20004840, &(0x7f00000001c0)={0x2, 0x4f24, @loopback}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff7c, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000080)='\x00', 0x1, 0xc840, 0x0, 0x0) close(r2) 21:53:52 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffbfd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00') ftruncate(r0, 0x4) 21:53:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x15, 0x0, &(0x7f0000001080)) 21:53:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000027c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0xd300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) sendmmsg(0xffffffffffffffff, &(0x7f0000006bc0)=[{{0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000071c0)=ANY=[@ANYBLOB="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"], 0x12b8}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x1010}}], 0x2, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:53:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f00000000c0), 0x10) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x22086605, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:53:52 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='cruft,utf8,utf8,utf8,check=relaxed,check=relaxed,map=off,session=0']) 21:53:53 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) bind$inet6(r0, &(0x7f0000000980)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 59.514267][ T5339] ISOFS: Unable to identify CD-ROM format. 21:53:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x80002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[], 0xc0}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 21:53:53 executing program 4: io_setup(0x1, &(0x7f0000000040)=0x0) r1 = socket$inet6(0xa, 0x100000003, 0x3c) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pwritev2(r2, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) io_submit(r0, 0x2, &(0x7f0000001880)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f00000002c0)={0x0, 0x0, 0xe7, 0x0, 0x0, r3, 0x0}]) 21:53:53 executing program 2: mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) mremap(&(0x7f0000e95000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f00005d9000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x8) 21:53:53 executing program 5: syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='cruft,utf8,utf8,utf8,check=relaxed,check=relaxed,map=off,session=0']) 21:53:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000200)=""/131, 0x83}], 0x1, 0x0, 0x0) 21:53:53 executing program 0: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 21:53:53 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[{0x0}], 0x0, 0x0) 21:53:53 executing program 3: r0 = syz_io_uring_setup(0x75c4, &(0x7f0000000040), &(0x7f00003ae000/0x1000)=nil, &(0x7f00000b0000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000300)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r1, r0) r2 = syz_io_uring_setup(0x6be2, &(0x7f0000000240), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) r3 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r2, 0x7, &(0x7f0000000000)=r3, 0x1) 21:53:53 executing program 2: capset(&(0x7f00000002c0)={0x20080522}, &(0x7f0000000300)) setresgid(0x0, 0x0, 0xffffffffffffffff) [ 59.639803][ T5373] ISOFS: Unable to identify CD-ROM format. 21:53:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:53:53 executing program 5: timer_create(0xfffffffffffffffd, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_create(0xfffffffffffffffd, 0x0, &(0x7f00000001c0)=0x0) timer_settime(r1, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000100)={{}, {0x0, r0+60000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x3938700}}, 0x0) 21:53:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000000a00)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) chdir(&(0x7f0000000400)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0xffffffffffffff37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) rename(0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) chdir(0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[], 0x82) write$9p(r0, &(0x7f0000001400)=';', 0x1) truncate(&(0x7f0000000540)='./file0\x00', 0x7) sendfile(r0, r2, 0x0, 0x10000) 21:53:53 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000005a00010a0000000000000000000000000a"], 0x1}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 59.704493][ T25] kauditd_printk_skb: 11 callbacks suppressed [ 59.704505][ T25] audit: type=1326 audit(1619646833.163:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 59.768330][ T25] audit: type=1326 audit(1619646833.213:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 59.798198][ T5409] loop4: detected capacity change from 0 to 512 21:53:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$sock(r0, &(0x7f0000000200)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[@timestamping={{0x14, 0x1, 0x24}}], 0x18}, 0x0) 21:53:53 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 21:53:53 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000058c000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000172000/0x1000)=nil) mremap(&(0x7f0000266000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005af000/0x4000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) mremap(&(0x7f0000ae7000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000c66000/0x3000)=nil) madvise(&(0x7f0000637000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f00001db000/0x1000)=nil, 0x1000, 0x0) [ 59.799484][ T25] audit: type=1326 audit(1619646833.213:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 59.858558][ T5409] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:53:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000d00)) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff0600000001000000450000002500000019001c000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 21:53:53 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$netlink(r0, 0x10e, 0x5, 0x0, &(0x7f0000000100)=0x4) [ 59.876653][ T5424] netlink: 'syz-executor.0': attribute type 28 has an invalid length. 21:53:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237a478fa5d25c60f9fc4c5622ca21e8b3e2d733a399aefcac2da0e590648ac1836215a380deb66ac8ddb51307638c2443cddb72d00c6e1c7db1364994381872cba7bf27242d3fc6d997ee20fffa950d94ee9d4", 0xc1}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 21:53:53 executing program 0: sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008180)=[{{0x0, 0x0, 0x0}, 0x3ff}, {{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, 0x0}, 0x800000}], 0x3, 0x2222, &(0x7f0000008340)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) futex(&(0x7f00000002c0)=0x2, 0x9, 0x0, &(0x7f00000016c0)={0x0, 0x3938700}, &(0x7f0000001700)=0x2, 0x0) [ 59.909877][ T25] audit: type=1326 audit(1619646833.213:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=55 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff002}]}, 0x10) [ 59.954178][ T25] audit: type=1326 audit(1619646833.213:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:53:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:53 executing program 4: r0 = timerfd_create(0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000180)) read(r0, &(0x7f0000000440)=""/206, 0xce) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 21:53:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)="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"}) [ 60.055478][ T25] audit: type=1326 audit(1619646833.213:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=105 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 60.089499][ T25] audit: type=1326 audit(1619646833.213:41): auid=4294967295 uid=255 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 60.129692][ T25] audit: type=1326 audit(1619646833.213:42): auid=4294967295 uid=255 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=319 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 60.161909][ T25] audit: type=1326 audit(1619646833.213:43): auid=4294967295 uid=255 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=77 compat=0 ip=0x4665b7 code=0x7ffc0000 [ 60.192369][ T25] audit: type=1326 audit(1619646833.213:44): auid=4294967295 uid=255 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=5388 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=18 compat=0 ip=0x419797 code=0x7ffc0000 21:53:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)={0x10, 0x25, 0x1}, 0x10}], 0x1}, 0x0) 21:53:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:54 executing program 2: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x9) 21:53:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f000000b000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) close(r1) 21:53:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:56 executing program 5: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 21:53:56 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x2) 21:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:56 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r1, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x4b66, &(0x7f0000000240)) 21:53:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:56 executing program 0: sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008180)=[{{0x0, 0x0, 0x0}, 0x3ff}, {{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, 0x0}, 0x800000}], 0x3, 0x2222, &(0x7f0000008340)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) futex(&(0x7f00000002c0)=0x2, 0x9, 0x0, &(0x7f00000016c0)={0x0, 0x3938700}, &(0x7f0000001700)=0x2, 0x0) 21:53:56 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@getsa={0x34, 0x12, 0x1, 0x0, 0x0, {@in, 0x0, 0x0, 0x33}, [@mark={0xc}]}, 0x34}}, 0x0) 21:53:56 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r0, 0x0, 0x0) 21:53:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x45}, {0x6}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 21:53:56 executing program 3: perf_event_open(&(0x7f0000001040)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) clock_gettime(0x0, 0x0) semop(0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000280)) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0x0, 0xee01, 0x128}}) semctl$GETPID(0x0, 0x0, 0xb, 0x0) 21:53:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 21:53:56 executing program 1: socketpair(0x1, 0x0, 0x3f, &(0x7f0000000100)) 21:53:56 executing program 5: unshare(0x20600) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x6, 0x0) sendfile(r1, r0, &(0x7f0000002580)=0x4000000000003, 0x0) 21:53:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = socket$inet(0x10, 0x80003, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020003e8fe02080100010800080002000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:53:56 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x6b53, &(0x7f00000001c0), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r1, 0x110c, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x81f, &(0x7f0000000080), &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r1, 0x2fc1, 0x0, 0x0, 0x0, 0x0) 21:53:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000004c0), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x48, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}]}, 0x48}}, 0x0) 21:53:56 executing program 3: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) read(r0, 0x0, 0x0) [ 63.139123][ T5552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 21:53:57 executing program 0: sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008180)=[{{0x0, 0x0, 0x0}, 0x3ff}, {{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, 0x0}, 0x800000}], 0x3, 0x2222, &(0x7f0000008340)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) futex(&(0x7f00000002c0)=0x2, 0x9, 0x0, &(0x7f00000016c0)={0x0, 0x3938700}, &(0x7f0000001700)=0x2, 0x0) 21:53:57 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) sendfile(r0, r1, 0x0, 0xfffe) 21:53:57 executing program 3: mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mlockall(0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:53:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f00000016c0)=[{}], 0x1, 0x8000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x2000200c}) 21:53:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:57 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) readv(r0, &(0x7f00000033c0)=[{&(0x7f0000000040)=""/22, 0x16}], 0x1) 21:53:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/149, 0x95}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)=""/133, 0x85}, {0x0}], 0x2}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x2d79, 0x0, 0x0, 0x800e0076e) shutdown(r3, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/233, 0xe9}, {0x0}], 0x2}, 0x0) shutdown(r4, 0x0) 21:53:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:57 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) sendfile(r0, r1, 0x0, 0xfffe) 21:53:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:57 executing program 0: sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f00000000c0)=0x1, 0x0, 0x0, &(0x7f0000001640), 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008180)=[{{0x0, 0x0, 0x0}, 0x3ff}, {{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, 0x0}, 0x800000}], 0x3, 0x2222, &(0x7f0000008340)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) futex(&(0x7f00000002c0)=0x2, 0x9, 0x0, &(0x7f00000016c0)={0x0, 0x3938700}, &(0x7f0000001700)=0x2, 0x0) 21:53:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x11, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/diskstats\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x200, 0x8001) io_setup(0x0, &(0x7f0000000040)) getdents(0xffffffffffffff9c, &(0x7f0000000440)=""/180, 0xb4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000062c40)={0x0, [{0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x0, "8bebeb894f74c3"}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)="e6a577fdcb4fd926d2355e7480e4cc1abb0010c4619148bf9e0377c2ed664f94cf7590864d7fa1d9572bf34d33e7be4ad38fab465750b3142a1610d9f70cf60f6a65ec533aa01a2d2e9cef5e06f0561268bda7eb86") ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x801fffd) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:53:58 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f610500020000e8fe02080100380800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:53:58 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) sendfile(r0, r1, 0x0, 0xfffe) 21:53:58 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xfb, 0x101, 0x0, 0x1, "cb476ff20f066d15ddc4208a037e397f", "bb8495f195553ca1dd56306511e38f4bcc7bbd2ebe9017f2bb0cb83ad980e5313203827ea36f0c985227819084fe85b5da0607a6cd7f71db9a978071bdc2f4d472b3f4b9bfd6a8d30adda1cac79ddd04b708ed05ded773580dc336e4ccf374f55e70cbf051fe7a4a6dbd40e3bc996ce822a9d5f091f49d61ef37d6ac6b94952717224bfd2d7e23868e027d930926519327cb9032b16302e9873bd7a08423dd088457c8dd637c3371e571ab0b3fee0ddc7a44987ce3baa0cf86414ee2ce91c501f94bb514906612f9b2ed4f7e1a98393f184eeda408211bcff5fe725d8229b4467ebb5d920efa337d626614de"}, 0x101, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) [ 64.883615][ T5660] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 64.894733][ T5661] loop3: detected capacity change from 0 to 264192 21:53:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf0, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae979bc9581d6a854d4d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 21:53:58 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f610500020000e8fe02080100380800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:53:58 executing program 4: set_mempolicy(0x2, &(0x7f00000000c0)=0xfffffffffffffffd, 0x80) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)="077cb224fa5a28556e0c0a2d62c5774cccea7e739d084e501eac2062aa44c0137da4ff51fa76e83500d820c666aaadb8ecc6b779340616a9548e48b3dfeccce8c13646a2953da19bccb3de910a52ec", 0x4f}], 0x1}}], 0x4000000000001d0, 0x24044075) 21:53:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x680000c, 0x12, r2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "00000000800000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) 21:53:58 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f610500020000e8fe02080100380800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:53:58 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xfb, 0x101, 0x0, 0x1, "cb476ff20f066d15ddc4208a037e397f", "bb8495f195553ca1dd56306511e38f4bcc7bbd2ebe9017f2bb0cb83ad980e5313203827ea36f0c985227819084fe85b5da0607a6cd7f71db9a978071bdc2f4d472b3f4b9bfd6a8d30adda1cac79ddd04b708ed05ded773580dc336e4ccf374f55e70cbf051fe7a4a6dbd40e3bc996ce822a9d5f091f49d61ef37d6ac6b94952717224bfd2d7e23868e027d930926519327cb9032b16302e9873bd7a08423dd088457c8dd637c3371e571ab0b3fee0ddc7a44987ce3baa0cf86414ee2ce91c501f94bb514906612f9b2ed4f7e1a98393f184eeda408211bcff5fe725d8229b4467ebb5d920efa337d626614de"}, 0x101, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) [ 65.080643][ T5684] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 65.173469][ T5696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 21:53:59 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xfb, 0x101, 0x0, 0x1, "cb476ff20f066d15ddc4208a037e397f", "bb8495f195553ca1dd56306511e38f4bcc7bbd2ebe9017f2bb0cb83ad980e5313203827ea36f0c985227819084fe85b5da0607a6cd7f71db9a978071bdc2f4d472b3f4b9bfd6a8d30adda1cac79ddd04b708ed05ded773580dc336e4ccf374f55e70cbf051fe7a4a6dbd40e3bc996ce822a9d5f091f49d61ef37d6ac6b94952717224bfd2d7e23868e027d930926519327cb9032b16302e9873bd7a08423dd088457c8dd637c3371e571ab0b3fee0ddc7a44987ce3baa0cf86414ee2ce91c501f94bb514906612f9b2ed4f7e1a98393f184eeda408211bcff5fe725d8229b4467ebb5d920efa337d626614de"}, 0x101, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 21:53:59 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x10000) sendfile(r0, r1, 0x0, 0xfffe) 21:53:59 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000640)=[{0x0, 0x0, 0x7ff}, {&(0x7f00000001c0)="82e777c3948f", 0x6, 0x9}], 0x0, &(0x7f0000000740)) 21:53:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x680000c, 0x12, r2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "00000000800000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) 21:53:59 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f610500020000e8fe02080100380800080010000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 21:53:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x8, 0x7}) 21:53:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x680000c, 0x12, r2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "00000000800000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) [ 65.595798][ T5718] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 65.619879][ T5723] loop3: detected capacity change from 0 to 264192 [ 65.628892][ T5722] loop4: detected capacity change from 0 to 7 21:53:59 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x17, 0x0, &(0x7f0000000080)) 21:53:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x680000c, 0x12, r2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x0, 0x0, "00000000800000000000000000000000000000000000000000000000000000000000004000"}, 0xd8) bind$inet(r1, &(0x7f0000000540)={0x2, 0x0, @dev}, 0x10) 21:53:59 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000080), 0xfffffffffffffffe, 0x8) [ 65.646861][ T5722] FAT-fs (loop4): bogus number of FAT structure [ 65.653214][ T5722] FAT-fs (loop4): Can't find a valid FAT filesystem 21:53:59 executing program 2: r0 = creat(&(0x7f0000000280)='./file1\x00', 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0x1) 21:53:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r2, &(0x7f0000000400)=[{}, {&(0x7f00000000c0)="e6c263f42e35f78f08172f2c6e91fa75547ccff20482496dd6337c27da22ef17df7b17b023e6d2d6307e67baaba5af361ad5734f177d5e8a6da0a67d0c64213455eec42d357a92b74bda0e0000f00f06c4dc8f8e8238478aae72b6bbefefb8c5", 0x60}, {&(0x7f00000001c0)="d79d442db2b5a6844e266d434b67e163d7fb77869a1578eaa3f0f6bc2aabecf355989d96ad1972c574815a726c40a9705d37e6187d8362a7b2d22efcfc31db035ddf6453ca756ce940d74a6da077e78c1dae89e7f9e454a65983196e538693f95dd4309374389fbc3c7dbb5697f2f99d9b", 0xfdd1}, {&(0x7f0000000480)="ffc038afcafc7eea8bc1af1fff030000000000004b801aae0ddc10f3a8cf499a455742aede244de72efcc2e787647f344b755e9f730450d8e25719e6e65f04402b3b71221ee69dde42f79d2486682366fecd0b4f34d516", 0x57}, {&(0x7f00000002c0)="f4bbe2727a52179dc06b2a80ac7e933be57fccd512a62c63538f0f97c6eb04090a0f4f990a4e259d4cddcb9212c15a43cf3e02af9e1a91b18af78ee73b699f13890080312ab5ceaddd8f7343141ecf1816ef6be4445d2b910b0147a8aaeabf5282107980c0c7819f9c28da", 0x6b}, {&(0x7f0000000340)="9d0750f629b8e304e7f01d692c8968e5ea47c9c760a8ec8c7eb38e80de29a36abc13a468a96d23cb65ad15917aa6003aa358febfc085fa8034794024ad41e25098dbcf0741896b120092b5a480e1730b2eeb611dabc80f415d639bada5c411f1a5c03f036c2da91e287d08adb8a1dc5df67c19f45c5f2652e453c11a0f89ba86de968c158d", 0x85}], 0x6, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) [ 65.765366][ T5722] loop4: detected capacity change from 0 to 7 [ 65.773087][ T5722] FAT-fs (loop4): bogus number of FAT structure [ 65.779502][ T5722] FAT-fs (loop4): Can't find a valid FAT filesystem 21:53:59 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000180)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240), &(0x7f0000000280)={0x0, 0xfb, 0x101, 0x0, 0x1, "cb476ff20f066d15ddc4208a037e397f", "bb8495f195553ca1dd56306511e38f4bcc7bbd2ebe9017f2bb0cb83ad980e5313203827ea36f0c985227819084fe85b5da0607a6cd7f71db9a978071bdc2f4d472b3f4b9bfd6a8d30adda1cac79ddd04b708ed05ded773580dc336e4ccf374f55e70cbf051fe7a4a6dbd40e3bc996ce822a9d5f091f49d61ef37d6ac6b94952717224bfd2d7e23868e027d930926519327cb9032b16302e9873bd7a08423dd088457c8dd637c3371e571ab0b3fee0ddc7a44987ce3baa0cf86414ee2ce91c501f94bb514906612f9b2ed4f7e1a98393f184eeda408211bcff5fe725d8229b4467ebb5d920efa337d626614de"}, 0x101, 0x0) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[], 0x208e24b) open$dir(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00007, 0x0, 0x0, 0x0, 0x10000000002) 21:53:59 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) 21:53:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) mmap(&(0x7f00002b9000/0xc00000)=nil, 0xc00000, 0x100000f, 0x8012, r0, 0x0) 21:53:59 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="2e1b879362b21a6bb3bd7eef2bd9c9361dea2d800300d9be1f5faa8169563f982b66c3fc4873810a1c51b200ae7533ca444bfb1e8a361a", 0x37, 0x4008840, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x404480d, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080)=0x1, 0x4) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x12, 0xfd, 0xfe, 0x6, 0x0, 0x3767, 0x209, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff1a, 0x0, 0x0, 0x42011, 0x2, 0x0, 0x3, 0x5, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x470) init_module(&(0x7f0000000100)='bridge0\x00', 0x8, &(0x7f0000000200)='bridge0\x00') unshare(0x8000400) r2 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0xb0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x24040000}, 0x44010) r3 = memfd_create(&(0x7f0000000500)='\x11\x00\xf6\xd3B\xe7\xf0\xae_\v\xb8\x00\x1c\xd8\xfa\xc1$\xfa\xe6\xed0\x15 y\xf9=!&\xfbA\xcc\x19\x95\x10\xcah\xc4vW\xd9\x93\x88\xf0\xf8\x15H\x87j\xd8\xbc\\\xc2\r\xedmR\xfe)\"\x105o\xaf\xd5\xe2vOf\xa0\xbd-Ed\t\x00\x00\x00+Lq\xeb\xcf:U\x92\xc6\x93\xba\xa4\xc3(\xf7\xe1\"\xc6\x98\x8b\xad+\x19$H\x1e\x00\x00\x00\xb7U;s\x8f%\x91\xf2\x86\x06X\x97,\x05\x83^<#\xae\x140\xaa&\xc7\x9b\xa4\xf6+K\xfeq\x97\xb2\x7f^\xa8\x9b\x8b\xded\x0f\xe9YK\"I\xa0\xe6b9\xcd\xbb\x9b\x97\xcb\x01D\xa0\xa1\xc9G\xd9\xdb\xd1/f\xb7\xcfq\x90\x1f>\xf9\xac\x8c\xba\x17\x8eJ\xf8\b\x92\xc2\xf8\xeb}\xea\x82\xd6&#\x17\xe6\xdey\xdb\x15{\xbd\x1e@-\xd8\xad=\x9d;\xc1\xb7\xf0l\xea\x06+\x19u[\xc4\x1b\xdeG\x81\x80l\fJ\xcb\x05\xe6\xbc\xf5d\xd1\xa9[A\xb9}evW\xd9\x930\xcd\x9d\x9d\xa2\x7f\xac\x88\xb73\x04\xdc[\x9e\xf7\xb7GB,A\xde\xfc\xd0\x02\x90\x97\xe7_\xdd\xcd\xd62\x1d\x8bn\xb7\x13\xfc\xdb\x90\xb8\xfe\x93\xa1\f\xe7\xcf\xe6\x1e\xb5\xa3PN\xfc\xf3C\x92\x05yH\xe6\x96\x00\x8e\x8e\xc3\xb92-3\xf4\xb1\xf4\";E;\xce\x8bT\xe2\xa1\x0eSY\x01\xc4z\xaekj3\x06\xb5k\xc8\xfb\x12.\xf1m\xfc\xf6p\x81Rx\x9f\xa7\xa0p\x17\x04\xaetNT\xc7tl@/', 0x2) sendfile(r3, r2, &(0x7f0000000040), 0x7e) 21:53:59 executing program 1: r0 = memfd_create(&(0x7f0000000000)='+\x00', 0x0) fallocate(r0, 0x3, 0x7fff, 0x1) 21:53:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r2, &(0x7f0000000400)=[{}, {&(0x7f00000000c0)="e6c263f42e35f78f08172f2c6e91fa75547ccff20482496dd6337c27da22ef17df7b17b023e6d2d6307e67baaba5af361ad5734f177d5e8a6da0a67d0c64213455eec42d357a92b74bda0e0000f00f06c4dc8f8e8238478aae72b6bbefefb8c5", 0x60}, {&(0x7f00000001c0)="d79d442db2b5a6844e266d434b67e163d7fb77869a1578eaa3f0f6bc2aabecf355989d96ad1972c574815a726c40a9705d37e6187d8362a7b2d22efcfc31db035ddf6453ca756ce940d74a6da077e78c1dae89e7f9e454a65983196e538693f95dd4309374389fbc3c7dbb5697f2f99d9b", 0xfdd1}, {&(0x7f0000000480)="ffc038afcafc7eea8bc1af1fff030000000000004b801aae0ddc10f3a8cf499a455742aede244de72efcc2e787647f344b755e9f730450d8e25719e6e65f04402b3b71221ee69dde42f79d2486682366fecd0b4f34d516", 0x57}, {&(0x7f00000002c0)="f4bbe2727a52179dc06b2a80ac7e933be57fccd512a62c63538f0f97c6eb04090a0f4f990a4e259d4cddcb9212c15a43cf3e02af9e1a91b18af78ee73b699f13890080312ab5ceaddd8f7343141ecf1816ef6be4445d2b910b0147a8aaeabf5282107980c0c7819f9c28da", 0x6b}, {&(0x7f0000000340)="9d0750f629b8e304e7f01d692c8968e5ea47c9c760a8ec8c7eb38e80de29a36abc13a468a96d23cb65ad15917aa6003aa358febfc085fa8034794024ad41e25098dbcf0741896b120092b5a480e1730b2eeb611dabc80f415d639bada5c411f1a5c03f036c2da91e287d08adb8a1dc5df67c19f45c5f2652e453c11a0f89ba86de968c158d", 0x85}], 0x6, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 21:53:59 executing program 1: r0 = fork() kcmp$KCMP_EPOLL_TFD(r0, r0, 0x5, 0xffffffffffffffff, 0x0) 21:53:59 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001280)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09c60b49bac43836221bc3130b44a9df8704c9656b60912ff6bdb6fb1f", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x2) [ 65.920057][ T5776] loop3: detected capacity change from 0 to 264192 21:53:59 executing program 1: clock_adjtime(0x0, &(0x7f0000000000)={0x7fff}) 21:53:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 21:53:59 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="2e1b879362b21a6bb3bd7eef2bd9c9361dea2d800300d9be1f5faa8169563f982b66c3fc4873810a1c51b200ae7533ca444bfb1e8a361a", 0x37, 0x4008840, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x404480d, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080)=0x1, 0x4) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x12, 0xfd, 0xfe, 0x6, 0x0, 0x3767, 0x209, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff1a, 0x0, 0x0, 0x42011, 0x2, 0x0, 0x3, 0x5, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x470) init_module(&(0x7f0000000100)='bridge0\x00', 0x8, &(0x7f0000000200)='bridge0\x00') unshare(0x8000400) r2 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0xb0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x24040000}, 0x44010) r3 = memfd_create(&(0x7f0000000500)='\x11\x00\xf6\xd3B\xe7\xf0\xae_\v\xb8\x00\x1c\xd8\xfa\xc1$\xfa\xe6\xed0\x15 y\xf9=!&\xfbA\xcc\x19\x95\x10\xcah\xc4vW\xd9\x93\x88\xf0\xf8\x15H\x87j\xd8\xbc\\\xc2\r\xedmR\xfe)\"\x105o\xaf\xd5\xe2vOf\xa0\xbd-Ed\t\x00\x00\x00+Lq\xeb\xcf:U\x92\xc6\x93\xba\xa4\xc3(\xf7\xe1\"\xc6\x98\x8b\xad+\x19$H\x1e\x00\x00\x00\xb7U;s\x8f%\x91\xf2\x86\x06X\x97,\x05\x83^<#\xae\x140\xaa&\xc7\x9b\xa4\xf6+K\xfeq\x97\xb2\x7f^\xa8\x9b\x8b\xded\x0f\xe9YK\"I\xa0\xe6b9\xcd\xbb\x9b\x97\xcb\x01D\xa0\xa1\xc9G\xd9\xdb\xd1/f\xb7\xcfq\x90\x1f>\xf9\xac\x8c\xba\x17\x8eJ\xf8\b\x92\xc2\xf8\xeb}\xea\x82\xd6&#\x17\xe6\xdey\xdb\x15{\xbd\x1e@-\xd8\xad=\x9d;\xc1\xb7\xf0l\xea\x06+\x19u[\xc4\x1b\xdeG\x81\x80l\fJ\xcb\x05\xe6\xbc\xf5d\xd1\xa9[A\xb9}evW\xd9\x930\xcd\x9d\x9d\xa2\x7f\xac\x88\xb73\x04\xdc[\x9e\xf7\xb7GB,A\xde\xfc\xd0\x02\x90\x97\xe7_\xdd\xcd\xd62\x1d\x8bn\xb7\x13\xfc\xdb\x90\xb8\xfe\x93\xa1\f\xe7\xcf\xe6\x1e\xb5\xa3PN\xfc\xf3C\x92\x05yH\xe6\x96\x00\x8e\x8e\xc3\xb92-3\xf4\xb1\xf4\";E;\xce\x8bT\xe2\xa1\x0eSY\x01\xc4z\xaekj3\x06\xb5k\xc8\xfb\x12.\xf1m\xfc\xf6p\x81Rx\x9f\xa7\xa0p\x17\x04\xaetNT\xc7tl@/', 0x2) sendfile(r3, r2, &(0x7f0000000040), 0x7e) 21:53:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r2, &(0x7f0000000400)=[{}, {&(0x7f00000000c0)="e6c263f42e35f78f08172f2c6e91fa75547ccff20482496dd6337c27da22ef17df7b17b023e6d2d6307e67baaba5af361ad5734f177d5e8a6da0a67d0c64213455eec42d357a92b74bda0e0000f00f06c4dc8f8e8238478aae72b6bbefefb8c5", 0x60}, {&(0x7f00000001c0)="d79d442db2b5a6844e266d434b67e163d7fb77869a1578eaa3f0f6bc2aabecf355989d96ad1972c574815a726c40a9705d37e6187d8362a7b2d22efcfc31db035ddf6453ca756ce940d74a6da077e78c1dae89e7f9e454a65983196e538693f95dd4309374389fbc3c7dbb5697f2f99d9b", 0xfdd1}, {&(0x7f0000000480)="ffc038afcafc7eea8bc1af1fff030000000000004b801aae0ddc10f3a8cf499a455742aede244de72efcc2e787647f344b755e9f730450d8e25719e6e65f04402b3b71221ee69dde42f79d2486682366fecd0b4f34d516", 0x57}, {&(0x7f00000002c0)="f4bbe2727a52179dc06b2a80ac7e933be57fccd512a62c63538f0f97c6eb04090a0f4f990a4e259d4cddcb9212c15a43cf3e02af9e1a91b18af78ee73b699f13890080312ab5ceaddd8f7343141ecf1816ef6be4445d2b910b0147a8aaeabf5282107980c0c7819f9c28da", 0x6b}, {&(0x7f0000000340)="9d0750f629b8e304e7f01d692c8968e5ea47c9c760a8ec8c7eb38e80de29a36abc13a468a96d23cb65ad15917aa6003aa358febfc085fa8034794024ad41e25098dbcf0741896b120092b5a480e1730b2eeb611dabc80f415d639bada5c411f1a5c03f036c2da91e287d08adb8a1dc5df67c19f45c5f2652e453c11a0f89ba86de968c158d", 0x85}], 0x6, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) 21:53:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) futex(&(0x7f000000cffc)=0x1, 0x80, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000048000), 0x25000000) 21:53:59 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="2e1b879362b21a6bb3bd7eef2bd9c9361dea2d800300d9be1f5faa8169563f982b66c3fc4873810a1c51b200ae7533ca444bfb1e8a361a", 0x37, 0x4008840, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x404480d, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080)=0x1, 0x4) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x12, 0xfd, 0xfe, 0x6, 0x0, 0x3767, 0x209, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff1a, 0x0, 0x0, 0x42011, 0x2, 0x0, 0x3, 0x5, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x470) init_module(&(0x7f0000000100)='bridge0\x00', 0x8, &(0x7f0000000200)='bridge0\x00') unshare(0x8000400) r2 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0xb0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x24040000}, 0x44010) r3 = memfd_create(&(0x7f0000000500)='\x11\x00\xf6\xd3B\xe7\xf0\xae_\v\xb8\x00\x1c\xd8\xfa\xc1$\xfa\xe6\xed0\x15 y\xf9=!&\xfbA\xcc\x19\x95\x10\xcah\xc4vW\xd9\x93\x88\xf0\xf8\x15H\x87j\xd8\xbc\\\xc2\r\xedmR\xfe)\"\x105o\xaf\xd5\xe2vOf\xa0\xbd-Ed\t\x00\x00\x00+Lq\xeb\xcf:U\x92\xc6\x93\xba\xa4\xc3(\xf7\xe1\"\xc6\x98\x8b\xad+\x19$H\x1e\x00\x00\x00\xb7U;s\x8f%\x91\xf2\x86\x06X\x97,\x05\x83^<#\xae\x140\xaa&\xc7\x9b\xa4\xf6+K\xfeq\x97\xb2\x7f^\xa8\x9b\x8b\xded\x0f\xe9YK\"I\xa0\xe6b9\xcd\xbb\x9b\x97\xcb\x01D\xa0\xa1\xc9G\xd9\xdb\xd1/f\xb7\xcfq\x90\x1f>\xf9\xac\x8c\xba\x17\x8eJ\xf8\b\x92\xc2\xf8\xeb}\xea\x82\xd6&#\x17\xe6\xdey\xdb\x15{\xbd\x1e@-\xd8\xad=\x9d;\xc1\xb7\xf0l\xea\x06+\x19u[\xc4\x1b\xdeG\x81\x80l\fJ\xcb\x05\xe6\xbc\xf5d\xd1\xa9[A\xb9}evW\xd9\x930\xcd\x9d\x9d\xa2\x7f\xac\x88\xb73\x04\xdc[\x9e\xf7\xb7GB,A\xde\xfc\xd0\x02\x90\x97\xe7_\xdd\xcd\xd62\x1d\x8bn\xb7\x13\xfc\xdb\x90\xb8\xfe\x93\xa1\f\xe7\xcf\xe6\x1e\xb5\xa3PN\xfc\xf3C\x92\x05yH\xe6\x96\x00\x8e\x8e\xc3\xb92-3\xf4\xb1\xf4\";E;\xce\x8bT\xe2\xa1\x0eSY\x01\xc4z\xaekj3\x06\xb5k\xc8\xfb\x12.\xf1m\xfc\xf6p\x81Rx\x9f\xa7\xa0p\x17\x04\xaetNT\xc7tl@/', 0x2) sendfile(r3, r2, &(0x7f0000000040), 0x7e) 21:53:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000180)) 21:53:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x8848, r2}, 0x14) 21:53:59 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/msg\x00', 0x0, 0x0) close(r0) 21:53:59 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="2e1b879362b21a6bb3bd7eef2bd9c9361dea2d800300d9be1f5faa8169563f982b66c3fc4873810a1c51b200ae7533ca444bfb1e8a361a", 0x37, 0x4008840, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x404480d, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000080)=0x1, 0x4) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x12, 0xfd, 0xfe, 0x6, 0x0, 0x3767, 0x209, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff1a, 0x0, 0x0, 0x42011, 0x2, 0x0, 0x3, 0x5, 0x7}, r0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write$binfmt_elf64(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x470) init_module(&(0x7f0000000100)='bridge0\x00', 0x8, &(0x7f0000000200)='bridge0\x00') unshare(0x8000400) r2 = mq_open(&(0x7f0000000000)='m$\x00', 0x6e93ebbbcc0884ee, 0xb0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x24040000}, 0x44010) r3 = memfd_create(&(0x7f0000000500)='\x11\x00\xf6\xd3B\xe7\xf0\xae_\v\xb8\x00\x1c\xd8\xfa\xc1$\xfa\xe6\xed0\x15 y\xf9=!&\xfbA\xcc\x19\x95\x10\xcah\xc4vW\xd9\x93\x88\xf0\xf8\x15H\x87j\xd8\xbc\\\xc2\r\xedmR\xfe)\"\x105o\xaf\xd5\xe2vOf\xa0\xbd-Ed\t\x00\x00\x00+Lq\xeb\xcf:U\x92\xc6\x93\xba\xa4\xc3(\xf7\xe1\"\xc6\x98\x8b\xad+\x19$H\x1e\x00\x00\x00\xb7U;s\x8f%\x91\xf2\x86\x06X\x97,\x05\x83^<#\xae\x140\xaa&\xc7\x9b\xa4\xf6+K\xfeq\x97\xb2\x7f^\xa8\x9b\x8b\xded\x0f\xe9YK\"I\xa0\xe6b9\xcd\xbb\x9b\x97\xcb\x01D\xa0\xa1\xc9G\xd9\xdb\xd1/f\xb7\xcfq\x90\x1f>\xf9\xac\x8c\xba\x17\x8eJ\xf8\b\x92\xc2\xf8\xeb}\xea\x82\xd6&#\x17\xe6\xdey\xdb\x15{\xbd\x1e@-\xd8\xad=\x9d;\xc1\xb7\xf0l\xea\x06+\x19u[\xc4\x1b\xdeG\x81\x80l\fJ\xcb\x05\xe6\xbc\xf5d\xd1\xa9[A\xb9}evW\xd9\x930\xcd\x9d\x9d\xa2\x7f\xac\x88\xb73\x04\xdc[\x9e\xf7\xb7GB,A\xde\xfc\xd0\x02\x90\x97\xe7_\xdd\xcd\xd62\x1d\x8bn\xb7\x13\xfc\xdb\x90\xb8\xfe\x93\xa1\f\xe7\xcf\xe6\x1e\xb5\xa3PN\xfc\xf3C\x92\x05yH\xe6\x96\x00\x8e\x8e\xc3\xb92-3\xf4\xb1\xf4\";E;\xce\x8bT\xe2\xa1\x0eSY\x01\xc4z\xaekj3\x06\xb5k\xc8\xfb\x12.\xf1m\xfc\xf6p\x81Rx\x9f\xa7\xa0p\x17\x04\xaetNT\xc7tl@/', 0x2) sendfile(r3, r2, &(0x7f0000000040), 0x7e) 21:53:59 executing program 4: unshare(0x400) r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40081271, 0xffffffffffffffff) 21:53:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0xfffc, 0x0) vmsplice(r2, &(0x7f0000000400)=[{}, {&(0x7f00000000c0)="e6c263f42e35f78f08172f2c6e91fa75547ccff20482496dd6337c27da22ef17df7b17b023e6d2d6307e67baaba5af361ad5734f177d5e8a6da0a67d0c64213455eec42d357a92b74bda0e0000f00f06c4dc8f8e8238478aae72b6bbefefb8c5", 0x60}, {&(0x7f00000001c0)="d79d442db2b5a6844e266d434b67e163d7fb77869a1578eaa3f0f6bc2aabecf355989d96ad1972c574815a726c40a9705d37e6187d8362a7b2d22efcfc31db035ddf6453ca756ce940d74a6da077e78c1dae89e7f9e454a65983196e538693f95dd4309374389fbc3c7dbb5697f2f99d9b", 0xfdd1}, {&(0x7f0000000480)="ffc038afcafc7eea8bc1af1fff030000000000004b801aae0ddc10f3a8cf499a455742aede244de72efcc2e787647f344b755e9f730450d8e25719e6e65f04402b3b71221ee69dde42f79d2486682366fecd0b4f34d516", 0x57}, {&(0x7f00000002c0)="f4bbe2727a52179dc06b2a80ac7e933be57fccd512a62c63538f0f97c6eb04090a0f4f990a4e259d4cddcb9212c15a43cf3e02af9e1a91b18af78ee73b699f13890080312ab5ceaddd8f7343141ecf1816ef6be4445d2b910b0147a8aaeabf5282107980c0c7819f9c28da", 0x6b}, {&(0x7f0000000340)="9d0750f629b8e304e7f01d692c8968e5ea47c9c760a8ec8c7eb38e80de29a36abc13a468a96d23cb65ad15917aa6003aa358febfc085fa8034794024ad41e25098dbcf0741896b120092b5a480e1730b2eeb611dabc80f415d639bada5c411f1a5c03f036c2da91e287d08adb8a1dc5df67c19f45c5f2652e453c11a0f89ba86de968c158d", 0x85}], 0x6, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0x10034) [ 66.197436][ T5837] loop2: detected capacity change from 0 to 264192 [ 66.205561][ T5837] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 66.234079][ T5837] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0002] 21:53:59 executing program 1: r0 = socket(0xa, 0x2, 0x0) syz_io_uring_setup(0x1eda, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) fcntl$setstatus(r0, 0x4, 0x42c00) epoll_wait(r1, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) shutdown(r0, 0x1) r2 = dup3(r0, r1, 0x0) shutdown(r2, 0x0) 21:53:59 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x15, &(0x7f0000000140)="a8", 0x1) [ 66.288179][ T5837] System zones: 1-20 21:53:59 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x0) 21:53:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0x22b) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000980)=@fragment, 0x8) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 21:53:59 executing program 4: r0 = socket(0x2, 0x3, 0x4) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, 0x0}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 21:53:59 executing program 0: r0 = socket(0x2, 0x3, 0x5) setsockopt(r0, 0x0, 0x2d, 0x0, 0x0) [ 66.311733][ T5837] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:53:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000180)) 21:53:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2c, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x9, 0x1, @remote}, {0x8, 0x2, @empty}}}]}]}, 0x2c}}, 0x0) 21:53:59 executing program 4: sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="3e12d7495bf9025a9a66ae79fc6c4831ba5fd53027611584ddfa3ab1844072685fa875ada5ae430351fe3c115c7afb86"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x3266, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB='errors=remount-ro\x00\x00']) 21:53:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="1000020000000000"], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='M', 0x1}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:53:59 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 21:53:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) [ 66.426789][ T5895] loop2: detected capacity change from 0 to 264192 [ 66.436328][ T5889] loop4: detected capacity change from 0 to 1051 [ 66.462448][ T5907] new mount options do not match the existing superblock, will be ignored 21:53:59 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_io_uring_setup(0x2de0, &(0x7f0000000240), &(0x7f00007b2000/0x1000)=nil, &(0x7f000043d000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000140)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r5}}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x5330, 0x0, 0x0, 0x0, 0x0) [ 66.468048][ T5905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.471392][ T5895] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0002] [ 66.480582][ T5905] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 66.480602][ T5905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.507497][ T5889] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 66.515075][ T5895] System zones: 1-20 21:54:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000180)) 21:54:00 executing program 0: clock_adjtime(0x0, &(0x7f0000000340)={0x2f96, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0xfffffffffffffffe}) [ 66.525694][ T5907] new mount options do not match the existing superblock, will be ignored [ 66.537341][ T5895] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 66.552023][ T5889] EXT4-fs (loop4): orphan cleanup on readonly fs [ 66.600291][ T5889] EXT4-fs error (device loop4): ext4_quota_enable:6403: inode #3: comm syz-executor.4: iget: bad i_size value: -8720241717917221120 [ 66.625447][ T5926] loop2: detected capacity change from 0 to 264192 [ 66.656528][ T5889] EXT4-fs (loop4): Remounting filesystem read-only [ 66.665202][ T5889] EXT4-fs error (device loop4): ext4_quota_enable:6405: comm syz-executor.4: Bad quota inode # 3 [ 66.689272][ T5889] EXT4-fs warning (device loop4): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 66.692381][ T5926] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0002] [ 66.705203][ T5889] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 66.705230][ T5889] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro. Quota mode: writeback. [ 66.728334][ T5926] System zones: 1-20 [ 66.748941][ T5926] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:54:00 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r0, 0x400, 0x0) 21:54:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioprio_get$uid(0x2, 0x0) 21:54:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x1100, &(0x7f0000000080)=ANY=[]) 21:54:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414aa000000"], 0x1c) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @local}, 0xc) 21:54:00 executing program 4: sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="3e12d7495bf9025a9a66ae79fc6c4831ba5fd53027611584ddfa3ab1844072685fa875ada5ae430351fe3c115c7afb86"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x3266, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB='errors=remount-ro\x00\x00']) 21:54:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000000080)="0000000000000000000000003bf48e55190e4cca80d5ddff88e78b3dd460810421", 0x21, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000180)) 21:54:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TCGETA(r0, 0x5405, &(0x7f00000002c0)) 21:54:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000001700)=[{{&(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e20}, 0x10, 0x0, 0x0, &(0x7f0000001540)=[@ip_retopts={{0x10}}], 0x10}}], 0x2, 0x0) [ 67.209313][ T5949] loop4: detected capacity change from 0 to 1051 [ 67.218363][ T5949] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 67.219882][ T5955] loop2: detected capacity change from 0 to 264192 [ 67.246591][ T5949] EXT4-fs (loop4): orphan cleanup on readonly fs 21:54:00 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x2, @l2tp={0x2, 0x0, @dev}, @rc={0x1f, @none, 0xff}, @nl=@unspec, 0xfd, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_macvtap\x00'}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001500)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0xc02, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x6, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x48084, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000080), 0xd}, 0x40292, 0xe80, 0x8, 0x1, 0x81, 0x0, 0x6, 0x0, 0x200, 0x0, 0x145f}, 0xffffffffffffffff, 0xb, r0, 0x1) [ 67.256243][ T5949] EXT4-fs error (device loop4): ext4_quota_enable:6403: inode #3: comm syz-executor.4: iget: bad i_size value: -8720241717917221120 [ 67.286335][ T5955] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a002c018, mo2=0002] [ 67.302078][ T5949] EXT4-fs (loop4): Remounting filesystem read-only 21:54:00 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/196, 0xc4}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x14a, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x4cb8d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff2145, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 21:54:00 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5e7df7a20c03775f4e0942b23a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x3) 21:54:00 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x11, 0x0) removexattr(&(0x7f0000000240)='./file0\x00', 0x0) [ 67.309312][ T5949] EXT4-fs error (device loop4): ext4_quota_enable:6405: comm syz-executor.4: Bad quota inode # 3 [ 67.323556][ T5955] System zones: 1-20 [ 67.329024][ T5955] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:54:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x70) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80300dd0000040d001800ea1100ea1105000000", 0x29}], 0x1) 21:54:00 executing program 1: r0 = socket$inet(0x10, 0x80003, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="240000001e0007021dfffd946f610500020000e8fe0208020001080008000400fd7f0000280000001100ffffba164aab1c00000012000000000000eff24d82387e23f7ef6a44c99af286e404", 0x4c}], 0x1}, 0x0) [ 67.380689][ T5949] EXT4-fs warning (device loop4): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 67.394881][ T5949] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 67.401617][ T5949] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro. Quota mode: writeback. 21:54:00 executing program 0: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x20}}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000000)="53000000fcffffff7700f80e000000", 0xff4a}, {&(0x7f0000000080)="12b247299e67bfdb1fd2cf82e93f497efcba98c857535ccc04be04839efbe7925fb2184879d3348a8e9b3107f679ca4d5a9f0ff9e2f023a996", 0x39}], 0x3) 21:54:00 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000b40)=ANY=[], 0xa) close(r2) r3 = socket(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x6}, 0x10) write(0xffffffffffffffff, &(0x7f0000000180)="2000000012005f", 0x7) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 67.445673][ T6003] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 21:54:00 executing program 4: sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="3e12d7495bf9025a9a66ae79fc6c4831ba5fd53027611584ddfa3ab1844072685fa875ada5ae430351fe3c115c7afb86"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x3266, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB='errors=remount-ro\x00\x00']) 21:54:00 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/196, 0xc4}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x14a, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x4cb8d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff2145, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 21:54:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000480)="66530700ae897094e71b0fa1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29", 0x46}], 0x4, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xffffffffffffffc2, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) 21:54:00 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r0, @ANYRESOCT], 0x52) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@noextend}]}}) 21:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x55, &(0x7f0000000340)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x803, 0x6) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000001a80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@flowinfo={{0x14, 0x29, 0x8}}], 0x18}}], 0x1, 0x0) 21:54:01 executing program 5: syz_open_dev$vcsn(&(0x7f0000000240), 0x0, 0xe0202) 21:54:01 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/196, 0xc4}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x14a, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x4cb8d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff2145, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 21:54:01 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x22, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) [ 67.580316][ T4605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=4605 comm=kworker/0:3 [ 67.677342][ T6036] loop4: detected capacity change from 0 to 1051 [ 67.688974][ T6027] 9pnet: p9_errstr2errno: server reported unknown error 01777 21:54:01 executing program 5: unshare(0x22060400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000300)=0x1b, 0x4) [ 67.715371][ T6036] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 67.736509][ T1007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=1007 comm=kworker/1:2 [ 67.754787][ T6036] EXT4-fs (loop4): orphan cleanup on readonly fs 21:54:01 executing program 2: r0 = inotify_init() r1 = inotify_init() r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000300)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000040)) 21:54:01 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1f", 0x36}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 67.761619][ T6036] EXT4-fs error (device loop4): ext4_quota_enable:6403: inode #3: comm syz-executor.4: iget: bad i_size value: -8720241717917221120 [ 67.836312][ T6036] EXT4-fs (loop4): Remounting filesystem read-only [ 67.843001][ T6036] EXT4-fs error (device loop4): ext4_quota_enable:6405: comm syz-executor.4: Bad quota inode # 3 [ 67.856593][ T6036] EXT4-fs warning (device loop4): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 67.870814][ T6036] EXT4-fs (loop4): Cannot turn on quotas: error -117 21:54:01 executing program 4: sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="3e12d7495bf9025a9a66ae79fc6c4831ba5fd53027611584ddfa3ab1844072685fa875ada5ae430351fe3c115c7afb86"], 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x3266, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB='errors=remount-ro\x00\x00']) 21:54:01 executing program 3: chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000080)='./file0\x00', 0x4142, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/196, 0xc4}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp6\x00') r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4b, &(0x7f0000000180)=0xfffffff7, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) preadv(r0, &(0x7f00000017c0), 0x3da, 0x14a, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x5, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x4cb8d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff2145, 0x0, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) 21:54:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000800)={0x20, r1, 0x8246020563c3cb19, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x1}]}]}, 0x20}}, 0x0) 21:54:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 2: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000680)={{0x0, 0xfffffffffffffe01}}) 21:54:01 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010047) [ 67.877772][ T6036] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro. Quota mode: writeback. 21:54:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) set_mempolicy(0x4, 0x0, 0x0) 21:54:01 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000040)={0x5c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x5}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x5c}}, 0x0) 21:54:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000800)={0x20, r1, 0x8246020563c3cb19, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x1}]}]}, 0x20}}, 0x0) 21:54:01 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010047) 21:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) [ 67.985971][ T6107] loop4: detected capacity change from 0 to 1051 [ 68.014624][ T6107] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 68.034773][ T6107] EXT4-fs (loop4): orphan cleanup on readonly fs [ 68.059864][ T6107] EXT4-fs error (device loop4): ext4_quota_enable:6403: inode #3: comm syz-executor.4: iget: bad i_size value: -8720241717917221120 [ 68.111524][ T6107] EXT4-fs (loop4): Remounting filesystem read-only [ 68.118884][ T6107] EXT4-fs error (device loop4): ext4_quota_enable:6405: comm syz-executor.4: Bad quota inode # 3 [ 68.130564][ T6107] EXT4-fs warning (device loop4): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 68.145839][ T6107] EXT4-fs (loop4): Cannot turn on quotas: error -117 21:54:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002840), 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/48, 0x30}, {&(0x7f00000001c0)=""/253, 0xfd}, {&(0x7f0000000340)=""/119, 0x77}, {0x0}, {&(0x7f0000000140)=""/23, 0x17}], 0x5}, 0x200}], 0x1, 0x100, &(0x7f0000000540)={0x0, 0x3938700}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xa6000001) sendfile(0xffffffffffffffff, r1, 0x0, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000300)=0xffffffffffffffff, 0x12) preadv(r2, &(0x7f00000009c0)=[{0x0}, {0x0}, {&(0x7f0000000480)=""/13, 0xd}], 0x3, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000580), 0x218d40, 0x0) 21:54:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010047) 21:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000800)={0x20, r1, 0x8246020563c3cb19, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x1}]}]}, 0x20}}, 0x0) 21:54:01 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) rename(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)='./file0\x00') [ 68.153325][ T6107] EXT4-fs (loop4): mounted filesystem without journal. Opts: errors=remount-ro. Quota mode: writeback. 21:54:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) utimes(&(0x7f0000000180)='./file0\x00', 0x0) 21:54:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000800)={0x20, r1, 0x8246020563c3cb19, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x4001, 0x1}]}]}, 0x20}}, 0x0) [ 68.213517][ T6136] new mount options do not match the existing superblock, will be ignored 21:54:01 executing program 4: prctl$PR_SET_NAME(0xf, 0x0) 21:54:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') write$tcp_mem(r0, &(0x7f0000000080)={0x100000000000000}, 0x48) [ 68.270604][ T6154] new mount options do not match the existing superblock, will be ignored 21:54:01 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x20120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010047) 21:54:01 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r1, 0x0, 0x80000001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6628, 0x0) 21:54:01 executing program 0: unshare(0x24020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x3d, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000100)=0x54) 21:54:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'lo\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x7}}) 21:54:01 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='hide']) 21:54:01 executing program 5: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x400017e) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)=ANY=[], 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) read(r0, &(0x7f00000000c0)=""/163, 0xa3) 21:54:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 21:54:01 executing program 0: prctl$PR_SET_IO_FLUSHER(0x39, 0x0) 21:54:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000), &(0x7f0000000080)) 21:54:01 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6) [ 68.430385][ T6176] ISOFS: Unable to identify CD-ROM format. 21:54:01 executing program 0: set_mempolicy(0x1, &(0x7f00000005c0)=0x1, 0x7ff) r0 = socket$unix(0x1, 0x5, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 21:54:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000100)=@FILEID_INO32_GEN={0x8}, 0x0, 0x1400) 21:54:02 executing program 5: r0 = socket$unix(0x1, 0x800000000005, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x5, 0x0) connect$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x1) [ 68.511662][ T6176] ISOFS: Unable to identify CD-ROM format. 21:54:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800005, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syslog(0xa, 0x0, 0x0) 21:54:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0xe, 0x3fe}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) recvfrom(r4, 0x0, 0x0, 0x0, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x6cc253fb, 0x0) 21:54:02 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000100)=@FILEID_INO32_GEN={0x8}, 0x0, 0x1400) 21:54:02 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000f40)=[{&(0x7f0000000d40)='k', 0x1}], 0x0, 0x0) 21:54:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0), r0) 21:54:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000100)=@FILEID_INO32_GEN={0x8}, 0x0, 0x1400) [ 68.667714][ T6224] loop7: detected capacity change from 0 to 1028 [ 68.721219][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.733133][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.742388][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.753505][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.763595][ T6224] loop7: unable to read partition table [ 68.770169][ T6224] loop_reread_partitions: partition scan of loop7 (@‹ܸ¤Ì¥%2xZì¦?h2’~*‰2¶l¦: àQGJµÁR†ý BHH) failed (rc=-5) [ 68.836832][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 68.894608][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.905656][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.920341][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.931456][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.939845][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.951798][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.959769][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.970732][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.979770][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 68.990900][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 68.998953][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 69.009870][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 69.018000][ C1] blk_update_request: I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 69.029391][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 69.037500][ C1] Buffer I/O error on dev loop7, logical block 0, async page read 21:54:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0), 0x8) 21:54:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) r1 = openat$procfs(0xffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) connect$unix(r0, &(0x7f0000000280)=@abs, 0x6e) 21:54:02 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='\x00', &(0x7f0000000100)=@FILEID_INO32_GEN={0x8}, 0x0, 0x1400) 21:54:02 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0305302, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40a85323, &(0x7f0000000340)) tkill(r0, 0x7) 21:54:02 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:02 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:02 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a95", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x1) 21:54:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x3, &(0x7f0000000080)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_submit(r2, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) [ 69.549993][ T6273] loop7: detected capacity change from 0 to 1028 21:54:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x3, &(0x7f0000000080)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_submit(r2, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) 21:54:03 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) [ 69.613981][ T6269] loop_set_status: loop7 () has still dirty pages (nrpages=2) [ 69.653894][ T6273] loop_set_status: loop7 () has still dirty pages (nrpages=6) 21:54:03 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x3, &(0x7f0000000080)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_submit(r2, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) [ 69.745912][ T6304] loop7: detected capacity change from 0 to 1028 [ 69.839404][ T6309] loop7: unable to read partition table [ 69.845417][ T6309] loop_reread_partitions: partition scan of loop7 (@‹ܸ¤Ì¥%2xZì¦?h2’~*‰2¶l¦: àQGJµÁR†ý BHH) failed (rc=-5) 21:54:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x144, &(0x7f00000005c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:03 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2c060000) semget$private(0x0, 0x4007, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000200)=""/163) 21:54:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) setrlimit(0x3, &(0x7f0000000080)) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0xb, &(0x7f0000000040)=0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_submit(r2, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) 21:54:03 executing program 0: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:03 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x80805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x70, 0x1, 0x38, 0x3, 0x6, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8402, 0x101, 0x800, 0x0, 0x4, 0x0, 0x4}, 0x0, 0x10, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@l2={0x1f, 0x2, @fixed, 0x0, 0x2}, 0x80, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000000000000000ff010000000000001800"], 0x28}, 0x80) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) lseek(0xffffffffffffffff, 0x3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmmsg$unix(r3, &(0x7f0000000400)=[{&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000500)="83675d15b967bdcf3e9c7f5534f073243389c398cef2992cd7fd4f57e7236d5606ca4475d893f6f79a8d7fefe3c01901c5e2992e51c5dda5fe872e80c581df984562c3ac6a2765f7d2e03b08fc956267c636e07dfb8c1433fc2805df6b6bc0c5fd1cac5093f2397320c4918d4c", 0x6d}, {0x0}, {0x0}, {&(0x7f0000000600)="b22521c2ef8923d79d6099b3ff85ff5deed3fd0406e571642f800f34ead67dc71c751933c9c90e15c6dce3cd929cc60a5615d12d3eab19f760a407ba61e8d6700896b54815bdf69f7575158e352b52ba8a104d2a9df160ecd3dfb948bbfac9f763afc2e509acc5b23a3a7da7937948b08f84d73a13c2b2d31d2c06d42d907c164d828850b48dd963c50b589303a2e1d6f8b7a9c93cc9d1ddf9d98ba4e661a7b15a7c9aee5dab3ea8768b7cfa4292d0c195115068cb60414e1dbb73c98b9754f8c1c574f7acf221949aefe0aabc12201082838d1fbcb4925cc27ba2475fc6c4e4fb30080c9edfdc99931ca55d58", 0xed}], 0x4, 0x0, 0x0, 0x4040010}], 0x1, 0x4000004) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000440)={0x0, {0x4c}, 0x0, {}, 0xfffffffe, 0x0, 0x1d, 0x19, "408b0301dcb8a402cc02a52532785aec11a63f6832927e2a8932b66ca63aa002e00751470e814ab516c15286fd20420448480002000000000000004800", "b89b67ed7f1d20d113f405d53b1b4549a3fcb55be159afa1c02188b895618eab", [0x712dce36, 0xfffffffffffffffc]}) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x18, 0x3f9, 0x2, 0x70bd2c, 0x0, {0x1}, ["", ""]}, 0x18}}, 0x4880) 21:54:03 executing program 2: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) 21:54:06 executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) 21:54:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000004540)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 21:54:06 executing program 0: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='syscall\x00') exit(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/70, 0x46}], 0x1, 0x0, 0x0) 21:54:06 executing program 5: r0 = socket$inet(0x10, 0x400000002, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="1c000000180007041dfffd946f610529802000001f11000500000800", 0x1c}], 0x1}, 0x0) 21:54:06 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') unlink(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') 21:54:06 executing program 2: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) [ 72.604304][ T25] kauditd_printk_skb: 19 callbacks suppressed [ 72.604318][ T25] audit: type=1400 audit(1619646846.067:64): avc: denied { dac_override } for pid=6374 comm="syz-executor.0" capability=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 21:54:06 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 21:54:06 executing program 4: mbind(&(0x7f0000fec000/0x11000)=nil, 0x11000, 0x0, &(0x7f0000000000), 0x9, 0x8118e874c53af55e) 21:54:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5401, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "73ffe6cec70b5088b5abf019ee7d319126d669"}) 21:54:06 executing program 0: clone(0x2000000080204500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r1) ptrace$cont(0x21, r0, 0x0, 0x0) [ 72.653338][ T25] audit: type=1400 audit(1619646846.097:65): avc: denied { dac_read_search } for pid=6377 comm="syz-executor.0" capability=2 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 21:54:06 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x105442) r1 = memfd_create(&(0x7f00000022c0)='{.#\x00', 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:54:06 executing program 2: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) 21:54:06 executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) 21:54:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)={0x2c, r2, 0x305, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x4}]}, 0x2c}}, 0x0) 21:54:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4200}, {&(0x7f0000012a00)="8081005700180000d5f4655fd5f4655fd5f4655f000000000000010080000200000008f6", 0x24, 0x4300}, {0x0}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000005c0)=ANY=[]) 21:54:06 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) futimesat(r0, 0x0, &(0x7f00000002c0)) [ 72.807000][ T6407] loop5: detected capacity change from 0 to 4096 [ 72.855020][ T6407] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 72.879356][ T6407] EXT4-fs error (device loop5): ext4_quota_enable:6405: comm syz-executor.5: Bad quota inode # 4 21:54:06 executing program 2: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) 21:54:06 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r2) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2c) wait4(0x0, 0x0, 0x0, 0x0) 21:54:06 executing program 4: r0 = fork() setpgid(r0, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 21:54:06 executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8001) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f00000002c0)) [ 72.893517][ T6407] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 73.004763][ T6407] EXT4-fs (loop5): mount failed 21:54:06 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x8, 0x200) [ 73.081819][ T6407] loop5: detected capacity change from 0 to 4096 [ 73.104756][ T6407] EXT4-fs error (device loop5): ext4_ext_check_inode:459: inode #4: comm syz-executor.5: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 73.122396][ T6407] EXT4-fs error (device loop5): ext4_quota_enable:6405: comm syz-executor.5: Bad quota inode # 4 [ 73.133744][ T6407] EXT4-fs warning (device loop5): ext4_enable_quotas:6445: Failed to enable quota tracking (type=1, err=-117). Please run e2fsck to fix. [ 73.214801][ T6407] EXT4-fs (loop5): mount failed 21:54:07 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x10e, 0x486, 0x0, 0x0) 21:54:07 executing program 3: sched_setscheduler(0x0, 0x0, 0x0) clone(0x80a80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:54:07 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x8, 0x200) 21:54:07 executing program 1: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 21:54:07 executing program 5: mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, 0x1c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 21:54:07 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x1c}}, 0x0) 21:54:07 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x8, 0x200) 21:54:07 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x2, 0x1, 0x5, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) 21:54:07 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006b00)=[{{&(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000d40)=[{0x0}, {&(0x7f00000007c0)="b5", 0xffe3}], 0x2}}, {{0x0, 0x0, &(0x7f0000005040)=[{&(0x7f0000004f80)='/', 0x1}], 0x1}}], 0x3, 0x4008000) 21:54:07 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$FIGETBSZ(r0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a000}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b31}, r1, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:54:07 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) fgetxattr(r0, 0xfffffffffffffffc, 0x0, 0x0) 21:54:07 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) connect$unix(r0, 0x0, 0x20) 21:54:07 executing program 3: r0 = getpgrp(0x0) sched_setparam(r0, &(0x7f0000000000)) 21:54:07 executing program 2: r0 = open(&(0x7f0000000200)='./bus\x00', 0x1612c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/key-users\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000000)=0x8, 0x200) 21:54:07 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x401ffc000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fallocate(r0, 0x100000010, 0x0, 0xe579) 21:54:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}], 0x0, &(0x7f0000013800)) 21:54:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049f", 0x83}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 73.883580][ T6523] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 73.892141][ T6523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 73.896782][ T6529] loop0: detected capacity change from 0 to 512 21:54:07 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) fallocate(r2, 0x0, 0x0, 0x44a) splice(r2, 0x0, r1, 0x0, 0x8ec3, 0x0) read(r0, &(0x7f0000000200)=""/214, 0xd6) 21:54:07 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) write$binfmt_script(r1, 0x0, 0x11e) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000000800)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$char_usb(r1, &(0x7f0000000540)="e3", 0x1) [ 73.945888][ T6529] EXT4-fs error (device loop0): ext4_fill_super:4943: inode #2: comm syz-executor.0: iget: root inode unallocated [ 73.959106][ T6529] EXT4-fs (loop0): get root inode failed [ 73.965093][ T6529] EXT4-fs (loop0): mount failed 21:54:07 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r0 = open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/101, 0x65) 21:54:07 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000080)) [ 73.991804][ T6523] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 74.000509][ T6523] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 21:54:07 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = fork() r1 = pidfd_open(r0, 0x0) waitid$P_PIDFD(0x3, r1, 0x0, 0x4, 0x0) pidfd_send_signal(r1, 0x10, 0x0, 0x0) 21:54:07 executing program 0: setitimer(0x1, &(0x7f0000000080)={{0x0, 0x7530}, {0x800000008}}, 0x0) getitimer(0x1, &(0x7f00000000c0)) 21:54:07 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f00002f1000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) getresuid(&(0x7f0000002300), &(0x7f0000002340), &(0x7f0000002380)) 21:54:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x3}, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x52, 0x1, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) [ 74.061822][ T25] audit: type=1326 audit(1619646847.507:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:54:07 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGBITSW(r1, 0x80404525, 0x0) 21:54:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x35, 0x0, &(0x7f00000014c0)) 21:54:07 executing program 1: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305829, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x5}) 21:54:07 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$lock(r0, 0x0, &(0x7f0000000180)={0x1}) creat(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffeffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) io_submit(0x0, 0x1, &(0x7f0000001940)=[0x0]) io_destroy(0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)={0x14, 0x3, 0x2, 0x301}, 0x14}}, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) [ 74.135336][ T25] audit: type=1326 audit(1619646847.517:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=2 compat=0 ip=0x4665f9 code=0x7ffc0000 21:54:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) shmctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) [ 74.265508][ T25] audit: type=1326 audit(1619646847.517:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 74.340190][ T25] audit: type=1326 audit(1619646847.517:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=217 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 74.371328][ T25] audit: type=1326 audit(1619646847.517:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 74.400072][ T25] audit: type=1326 audit(1619646847.517:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6558 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=317 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 74.425051][ T25] audit: type=1326 audit(1619646847.697:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6598 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 74.449974][ T25] audit: type=1326 audit(1619646847.697:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6598 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=31 compat=0 ip=0x4665f9 code=0x7ffc0000 21:54:08 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0xfffffffffffffffd) 21:54:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:54:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x6, 0xa, 0x0, &(0x7f0000001080)) 21:54:08 executing program 1: llistxattr(0x0, 0x0, 0x0) 21:54:08 executing program 0: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc02c5341, &(0x7f00000002c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x7) 21:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x25, 0x1, 0x1}, {}, {0x6, 0x0, 0x0, 0x7ffffff4}]}) epoll_create1(0x0) 21:54:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 21:54:08 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000140)="ed4ea1a50a0a32ff7ab38b20", 0xc) 21:54:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) 21:54:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000100)={'sit0\x00', @ifru_map}) 21:54:08 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000004c0)={0x2, &(0x7f0000000480)=[{0x35, 0x0, 0x0, 0xfffffffd}, {0x16}]}) close(0xffffffffffffffff) 21:54:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80000000000a01, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000240)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, "d1171b611387afc1b3278ba02b73e1e119d417"}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) read(r1, &(0x7f0000000100)=""/19, 0x20000113) 21:54:08 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000180)=ANY=[], 0xfe9e) close(r1) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) 21:54:08 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0x3, 0x800) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000740)={0x2, &(0x7f0000000700)=[{0x45}, {0x6}]}) 21:54:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff708800008003280008020100ff030000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 21:54:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}}, {@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x33}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2, 0x4, 0x0, 0x63}, [@algo_auth={0x48, 0x1, {{'hmac(sha256)\x00'}}}]}, 0x138}}, 0x0) 21:54:08 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x26, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) getdents(r0, &(0x7f0000000140)=""/175, 0xaf) 21:54:08 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 21:54:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/247, 0xf7}], 0x1, 0x8e, 0x0) [ 75.399377][ T6664] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.3'. 21:54:08 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000400)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x5}, @NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x801, 0x0, 0x0, {0xa}}, @NFT_MSG_DELCHAIN={0x14, 0x5, 0xa, 0x301}, @NFT_MSG_NEWRULE={0x18, 0x6, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_RULE_USERDATA={0x4}]}], {0x14}}, 0x7c}}, 0x0) 21:54:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000200)) 21:54:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net\x00') getdents(r0, &(0x7f0000000000)=""/154, 0x9a) 21:54:09 executing program 2: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x200000)=nil, 0x200000, 0x2000001, 0x2011, r0, 0x0) 21:54:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) splice(r1, 0x0, r3, 0x0, 0x1420000a77, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="550000001800fd0c00000000000081930a600000fca84302910000003900090020000c", 0x23}], 0x1}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[], 0xfffffd88) 21:54:09 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000140)=@ethtool_coalesce}) 21:54:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x97, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf5"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 21:54:09 executing program 5: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='cpu\t_&6|\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x04\x00\x00\x00\x00\x00\x00\x00\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 21:54:09 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 21:54:09 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="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", 0x120}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x3) 21:54:09 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, &(0x7f0000000440)='vD!\xa4\x17\x899\xec\xe2\xb9\xf1?i\x84t\xfa\x94\x8efZ/\xf0\x92\xcb\xe5/4\x89\xf4\xdb\xdb`\xfc\a9\xa0\x8f\xb1\xe7r\x1e\xe46E\xb8\xe5\"\xb5oz\xe3\x83Ay\x9f\x11~+\xf5\xae\x14c\xcf3\x9cwX\xef\x80O\x14\xb9\xe0\x19\x85\xa3\x84\xa5m\x8aGjn_\x9fH\xc8G9T\xa2\x1f\x90&\x04\xb3&w\xa7G\\>@\xab\xa8\x02:G\n\x98\x96\xb8a\xdeZ\xc1\xcc\br\xd20\xf5M\xa4\x96\xa3\x84\xbb\xbbn\xba\xc7\xf8\x12\t\xacs\f\xda=\x1c\x17\x80h\xc8\xb8\xc1\x7f-\xd4w\xa4\xb7\xf3\x8e/\x94\xdb\"\x93\xa7\xa46V\xbb\xf3fqr\xac\x11:\xd2\xe8\xf2\xd7\xf7\xe1F\xb1-?^\x1f\xa7\a\a8\xfe\x06\xf3\xce\xb3;\x11\x9d\"') 21:54:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@private0, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10204}) 21:54:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x1013c1, 0x0) mount$9p_rdma(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=rdma,', {}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@context={'context', 0x3d, 'staff_u'}}]}}) [ 76.278975][ T6730] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽfZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\>@«¨:G [ 76.278975][ T6730] ˜–¸aÞZÁÌrÒ0õM¤–£„»»nºÇø ¬s Ú' [ 76.305058][ T6736] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽfZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\>@«¨:G 21:54:09 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, &(0x7f0000000440)='vD!\xa4\x17\x899\xec\xe2\xb9\xf1?i\x84t\xfa\x94\x8efZ/\xf0\x92\xcb\xe5/4\x89\xf4\xdb\xdb`\xfc\a9\xa0\x8f\xb1\xe7r\x1e\xe46E\xb8\xe5\"\xb5oz\xe3\x83Ay\x9f\x11~+\xf5\xae\x14c\xcf3\x9cwX\xef\x80O\x14\xb9\xe0\x19\x85\xa3\x84\xa5m\x8aGjn_\x9fH\xc8G9T\xa2\x1f\x90&\x04\xb3&w\xa7G\\>@\xab\xa8\x02:G\n\x98\x96\xb8a\xdeZ\xc1\xcc\br\xd20\xf5M\xa4\x96\xa3\x84\xbb\xbbn\xba\xc7\xf8\x12\t\xacs\f\xda=\x1c\x17\x80h\xc8\xb8\xc1\x7f-\xd4w\xa4\xb7\xf3\x8e/\x94\xdb\"\x93\xa7\xa46V\xbb\xf3fqr\xac\x11:\xd2\xe8\xf2\xd7\xf7\xe1F\xb1-?^\x1f\xa7\a\a8\xfe\x06\xf3\xce\xb3;\x11\x9d\"') 21:54:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 21:54:09 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x7fffffff, 0x5) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) flock(r0, 0x1) [ 76.305058][ T6736] ˜–¸aÞZÁÌrÒ0õM¤–£„»»nºÇø ¬s Ú' [ 76.307341][ T6738] SELinux: duplicate or incompatible mount options [ 76.343979][ T6744] SELinux: duplicate or incompatible mount options [ 76.354458][ T6746] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽfZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\>@«¨:G [ 76.354458][ T6746] ˜–¸aÞZÁÌrÒ0õM¤–£„»»nºÇø ¬s Ú' 21:54:10 executing program 1: r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 21:54:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x3}) 21:54:10 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, &(0x7f0000000440)='vD!\xa4\x17\x899\xec\xe2\xb9\xf1?i\x84t\xfa\x94\x8efZ/\xf0\x92\xcb\xe5/4\x89\xf4\xdb\xdb`\xfc\a9\xa0\x8f\xb1\xe7r\x1e\xe46E\xb8\xe5\"\xb5oz\xe3\x83Ay\x9f\x11~+\xf5\xae\x14c\xcf3\x9cwX\xef\x80O\x14\xb9\xe0\x19\x85\xa3\x84\xa5m\x8aGjn_\x9fH\xc8G9T\xa2\x1f\x90&\x04\xb3&w\xa7G\\>@\xab\xa8\x02:G\n\x98\x96\xb8a\xdeZ\xc1\xcc\br\xd20\xf5M\xa4\x96\xa3\x84\xbb\xbbn\xba\xc7\xf8\x12\t\xacs\f\xda=\x1c\x17\x80h\xc8\xb8\xc1\x7f-\xd4w\xa4\xb7\xf3\x8e/\x94\xdb\"\x93\xa7\xa46V\xbb\xf3fqr\xac\x11:\xd2\xe8\xf2\xd7\xf7\xe1F\xb1-?^\x1f\xa7\a\a8\xfe\x06\xf3\xce\xb3;\x11\x9d\"') 21:54:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) writev(r0, &(0x7f0000002140)=[{&(0x7f0000000080)="4eaf828da6cb715377828e212a1e18895a9e0e315d9ff3fd2410e8b22cd2c6612de821dcaf73bae3a5c3378d93c842c5e3af2b13bd050b2d82ec6b2c90f4e3d551054b38cb2bf2958036368ed2e5537f04a0213da2f3761dbcbed6833c48212a6ffed1bdd16cbd2470324de5905eb8e0465fdb24eeac749547cf9aa276d062ea7e12d42e37de8b15a30751e214e112d750cbbd4ae869a293f3b5ff65cd6c023cc8a1f7e444fca9e2af1f7c64b5e896cc44623708ae", 0xb5}, {&(0x7f0000000140)="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", 0x5ba}], 0x2) 21:54:10 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r0, r1, 0x0, 0x0) 21:54:10 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) 21:54:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x1c\x19\x02\x00\x05\x00\x7f\x00@\x00\x00\x00\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\t\x05\x00\x00\x00C\xeb&\xc6\xd6\xcbk\xf762\xa2\x01\x00\x13\x00d\x00\x00\x00\x008t\x9bt\xfa\x86\xa0\x00\x00\x00\x00\x00\x00\x00') 21:54:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r0, 0x541c, &(0x7f0000000040)=0x3) [ 77.088030][ T6769] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 3 (only 16 groups) [ 77.108337][ T6774] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽfZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\>@«¨:G [ 77.108337][ T6774] ˜–¸aÞZÁÌrÒ0õM¤–£„»»nºÇø ¬s Ú' [ 77.127550][ T6778] EXT4-fs warning (device sda1): verify_group_input:132: Cannot add at group 3 (only 16 groups) 21:54:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb6092d696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552843516ab78c83f85cfe873f70957000dac653b3b313e587cdb091f26228ce524ec2db27bb8e3575774af29dac5aa78225147bbfefdda048d3c86d1e3583f6b507f092befd0c4307580e", 0x141}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:54:10 executing program 5: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827", 0x8}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 21:54:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fa1f107000000364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb6092d696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82dfefd5e00d421b000000000000000000000000000000730428fde6136b8e97c32a552843516ab78c83f85cfe873f70957000dac653b3b313e587cdb091f26228ce524ec2db27bb8e3575774af29dac5aa78225147bbfefdda048d3c86d1e3583f6b507f092befd0c4307580e", 0x141}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:10 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, &(0x7f0000000440)='vD!\xa4\x17\x899\xec\xe2\xb9\xf1?i\x84t\xfa\x94\x8efZ/\xf0\x92\xcb\xe5/4\x89\xf4\xdb\xdb`\xfc\a9\xa0\x8f\xb1\xe7r\x1e\xe46E\xb8\xe5\"\xb5oz\xe3\x83Ay\x9f\x11~+\xf5\xae\x14c\xcf3\x9cwX\xef\x80O\x14\xb9\xe0\x19\x85\xa3\x84\xa5m\x8aGjn_\x9fH\xc8G9T\xa2\x1f\x90&\x04\xb3&w\xa7G\\>@\xab\xa8\x02:G\n\x98\x96\xb8a\xdeZ\xc1\xcc\br\xd20\xf5M\xa4\x96\xa3\x84\xbb\xbbn\xba\xc7\xf8\x12\t\xacs\f\xda=\x1c\x17\x80h\xc8\xb8\xc1\x7f-\xd4w\xa4\xb7\xf3\x8e/\x94\xdb\"\x93\xa7\xa46V\xbb\xf3fqr\xac\x11:\xd2\xe8\xf2\xd7\xf7\xe1F\xb1-?^\x1f\xa7\a\a8\xfe\x06\xf3\xce\xb3;\x11\x9d\"') 21:54:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [0x0]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11}}], 0x48}}], 0x1, 0x0) 21:54:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x141}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) [ 77.207273][ T6798] nfs4: Unknown parameter 'vD!¤‰9ìâ¹ñ?i„tú”ŽfZ/ð’Ëå/4‰ôÛÛ`ü9 ±çrä6E¸å"µozãƒAyŸ~+õ®cÏ3œwXï€O¹à…£„¥mŠGjn_ŸHÈG9T¢&³&w§G\>@«¨:G [ 77.207273][ T6798] ˜–¸aÞZÁÌrÒ0õM¤–£„»»nºÇø ¬s Ú' 21:54:10 executing program 3: setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x88040, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f00000000c0)=@v3={0x3000000, [], r0}, 0x18, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0xfffffffffffffea1) [ 77.307278][ T6815] loop5: detected capacity change from 0 to 16383 21:54:10 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [0x0]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11}}], 0x48}}], 0x1, 0x0) 21:54:10 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x141}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:10 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:10 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x29, 0x0, 0xfffffffffffffffd) 21:54:10 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) 21:54:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000040)=0x7f, 0x4) sendmmsg(r0, &(0x7f0000001a00)=[{{&(0x7f0000000100)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000240)=[{0x28, 0x29, 0x32, "2b07df2fd0846bc0964f4ffde3d917e302"}], 0x28}}], 0x1, 0x0) 21:54:11 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x1, @multicast}, 0x8, {0x2, 0x0, @dev}, 'lo\x00'}) 21:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [0x0]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11}}], 0x48}}], 0x1, 0x0) [ 77.507022][ T6839] loop5: detected capacity change from 0 to 16383 [ 77.525083][ T6837] loop3: detected capacity change from 0 to 4096 [ 77.543625][ T6842] loop4: detected capacity change from 0 to 16383 21:54:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237a478fa5d25c60f9fc4c5622ca21e8b3e2d733a399aefcac2da0e590648ac1836215a380deb66ac8ddb51307638c2443cddb72d00c6e1c7db1364994381872cba7bf27242d3fc6d997ee20fffa950d94ee9d4b2c86c", 0xc4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) [ 77.580169][ T6837] EXT4-fs warning (device loop3): ext4_enable_quotas:6445: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 77.604681][ T6837] EXT4-fs (loop3): mount failed 21:54:11 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x24}}, 0x0) 21:54:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000000100)={0x0, 0x0, 0x20000}, 0x20) 21:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000006b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @private}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@ip_retopts={{0x18, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x5, 0x0, 0x0, [0x0]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11}}], 0x48}}], 0x1, 0x0) 21:54:11 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x15, 0x0, 0x1, 0xfffffff8}, {}, {0x6, 0x0, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6}]}) [ 77.683404][ T6870] loop4: detected capacity change from 0 to 16383 [ 77.719185][ T6871] loop5: detected capacity change from 0 to 16383 21:54:11 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f000037e000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000040)=0x800, 0x1f, 0x3) 21:54:11 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x38, 0x1, 0x2, 0x801, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}]}, 0x38}}, 0x0) 21:54:11 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x10, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)="ba", 0x1}], 0x1, 0x0, 0x0) ftruncate(r0, 0x0) 21:54:11 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'decodes', ' ', 'none'}, 0xd) [ 77.745318][ T25] kauditd_printk_skb: 7 callbacks suppressed [ 77.745330][ T25] audit: type=1326 audit(1619646851.207:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6895 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 21:54:11 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x24}}, 0x0) 21:54:11 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f000037e000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000040)=0x800, 0x1f, 0x3) 21:54:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() setpriority(0x0, r1, 0x80000002) r2 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setpriority(0x0, r0, 0x7) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) r8 = openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r8, 0x4b72, &(0x7f00000002c0)={0x2, 0x0, 0xd, 0x0, 0x0, &(0x7f0000000580)="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"}) io_uring_enter(r2, 0x393c, 0x0, 0x0, 0x0, 0x0) 21:54:11 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 21:54:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x0) [ 77.857924][ T6908] loop4: detected capacity change from 0 to 16383 [ 77.877113][ T6912] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=none:owns=io+mem 21:54:11 executing program 5: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4005ef3) fallocate(r0, 0x20, 0x2000, 0x102000000) fallocate(r0, 0x8, 0x2000, 0x101000000) 21:54:11 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x24}}, 0x0) 21:54:11 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x64, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ff"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001000000000000000200000001000600000000000000000000000000800029e314a5f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001000000000000000200000001000600000000000000000000000000800029e314a5f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4400}, {&(0x7f0000010800)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4600}, {&(0x7f0000010900)="53595a4b414c4c45522020080000eb80325132510000eb80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100089eb70325132510000eb70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200089eb70325132510000eb70325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c4532202020202020200089eb70325132510000eb70325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c200089eb70325132510000eb703251090064000000", 0x120, 0x4800}, {&(0x7f0000010b00)="2e20202020202020202020100089eb70325132510000eb7032510300000000002e2e202020202020202020100089eb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200089eb70325132510000eb70325104001a040000", 0x80, 0x5800}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6800}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x7800}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb800}], 0x0, &(0x7f0000011300)) 21:54:11 executing program 3: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x24, r0, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x24}}, 0x0) 21:54:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r2, 0x1}, 0x14}}, 0x0) 21:54:11 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f000037e000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000040)=0x800, 0x1f, 0x3) 21:54:11 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4) [ 78.061137][ T6948] loop2: detected capacity change from 0 to 184 21:54:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r2, 0x1}, 0x14}}, 0x0) 21:54:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() setpriority(0x0, r1, 0x80000002) r2 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setpriority(0x0, r0, 0x7) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) r8 = openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r8, 0x4b72, &(0x7f00000002c0)={0x2, 0x0, 0xd, 0x0, 0x0, &(0x7f0000000580)="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"}) io_uring_enter(r2, 0x393c, 0x0, 0x0, 0x0, 0x0) 21:54:11 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0201a6ffffff0a000000ff45ac0000ffffffa9000800000000000000024000ffffffbf000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 21:54:11 executing program 3: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0xfff) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff], 0x1) 21:54:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r2, 0x1}, 0x14}}, 0x0) 21:54:11 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mbind(&(0x7f000037e000/0x1000)=nil, 0x1000, 0x4002, &(0x7f0000000040)=0x800, 0x1f, 0x3) [ 78.311457][ T6978] loop2: detected capacity change from 0 to 1 [ 78.362212][ T6978] loop2: p1 p2 p3 p4 [ 78.374856][ T6978] loop2: p1 start 10 is beyond EOD, truncated [ 78.381316][ T6978] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 78.434380][ T6978] loop2: p3 start 225 is beyond EOD, truncated [ 78.440856][ T6978] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 78.528230][ T6978] loop2: detected capacity change from 0 to 1 [ 78.567070][ T6978] loop2: p1 p2 p3 p4 [ 78.571293][ T6978] loop2: p1 start 10 is beyond EOD, truncated [ 78.578772][ T6978] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 78.600142][ T6978] loop2: p3 start 225 is beyond EOD, truncated [ 78.606669][ T6978] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 78.616479][ T1027] loop2: p1 p2 p3 p4 [ 78.620562][ T1027] loop2: p1 start 10 is beyond EOD, truncated [ 78.626807][ T1027] loop2: p2 size 1073872896 extends beyond EOD, truncated [ 78.636405][ T1027] loop2: p3 start 225 is beyond EOD, truncated [ 78.642837][ T1027] loop2: p4 size 3657465856 extends beyond EOD, truncated 21:54:14 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x64, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ff"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r2, 0x1}, 0x14}}, 0x0) 21:54:14 executing program 0: clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x16) 21:54:14 executing program 3: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0xfff) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff], 0x1) 21:54:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() setpriority(0x0, r1, 0x80000002) r2 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setpriority(0x0, r0, 0x7) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) r8 = openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r8, 0x4b72, &(0x7f00000002c0)={0x2, 0x0, 0xd, 0x0, 0x0, &(0x7f0000000580)="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"}) io_uring_enter(r2, 0x393c, 0x0, 0x0, 0x0, 0x0) 21:54:14 executing program 2: r0 = fork() tkill(r0, 0x27) waitid(0x0, 0x0, 0x0, 0x8, 0x0) ioprio_set$pid(0x1, r0, 0x0) 21:54:14 executing program 0: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() poll(0x0, 0x0, 0xfffffffffffffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:54:14 executing program 4: keyctl$unlink(0x9, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="8000000000010b04000000000000000002000000240001801400018008000100ac141400080002007f0020010c00028005000100000000001c001080080003400000000008000140150000000800024000000000240002801400018008000100ac9414bb08000200000000000c0002800500010000000000080007"], 0x80}}, 0x4001) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x100000000000000) 21:54:14 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x2, 0x0, 0xa87) 21:54:14 executing program 3: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0xfff) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff], 0x1) 21:54:14 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff, 0x4}) 21:54:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000080)=0x13) [ 81.169281][ T25] audit: type=1326 audit(1619646854.627:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 [ 81.998005][ T25] audit: type=1326 audit(1619646855.457:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7067 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 21:54:17 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x64, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ff"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() setpriority(0x0, r1, 0x80000002) r2 = syz_io_uring_setup(0x7dbf, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x1000}, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) setpriority(0x0, r0, 0x7) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r7}, 0x0) r8 = openat$autofs(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r8, 0x4b72, &(0x7f00000002c0)={0x2, 0x0, 0xd, 0x0, 0x0, &(0x7f0000000580)="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"}) io_uring_enter(r2, 0x393c, 0x0, 0x0, 0x0, 0x0) 21:54:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 21:54:17 executing program 0: mkdir(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r1) chmod(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 21:54:17 executing program 3: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_POLL_REMOVE={0x7, 0x2}, 0xfff) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff], 0x1) 21:54:17 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = socket(0x1, 0x5, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) r3 = dup(r1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)) close_range(r0, 0xffffffffffffffff, 0x0) 21:54:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 21:54:17 executing program 2: r0 = perf_event_open(&(0x7f0000001a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x26040400) mmap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 21:54:17 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) shmctl$SHM_LOCK(0x0, 0xb) 21:54:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 21:54:17 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) sendmmsg(r0, &(0x7f0000007380)=[{{&(0x7f0000002480)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x2}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[{0x10, 0x1, 0x1}, {0x10}], 0x20}}], 0x1, 0x0) 21:54:17 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be", 0x11}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:54:20 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x64, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ff"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpgid(0x0, 0x0) 21:54:20 executing program 2: unshare(0x400) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/consoles\x00', 0x0, 0x0) ftruncate(r0, 0x0) 21:54:20 executing program 3: munmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x13) 21:54:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 21:54:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000400)={0x2, 0x4f00, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp_prespec={0x44, 0xc, 0x5, 0x3, 0x0, [{@broadcast}]}]}}}], 0x20}, 0x0) 21:54:20 executing program 3: prctl$PR_GET_FP_MODE(0x37) 21:54:20 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000500), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x5423, 0x0) 21:54:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 21:54:20 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7c, 0x46, 0x0, 0x3f, 0x0, 0x0, 0x20010, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x7ff, 0x3, 0x0, 0x7f, 0x0, 0x0, 0xfffffff8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffd28) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 21:54:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 21:54:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000900000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000300)=ANY=[]) [ 87.191308][ T7173] loop3: detected capacity change from 0 to 512 [ 87.233966][ T7173] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 87.283098][ T7173] ext4 filesystem being mounted at /root/syzkaller-testdir397278004/syzkaller.aeDwrX/86/file0 supports timestamps until 2038 (0x7fffffff) 21:54:23 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) sendmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x80000, @remote={0xfe, 0x18}}, 0x80, 0x0}}], 0x1, 0x0) 21:54:23 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x80000005}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)) 21:54:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 21:54:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000900000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000300)=ANY=[]) 21:54:23 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7c, 0x46, 0x0, 0x3f, 0x0, 0x0, 0x20010, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x7ff, 0x3, 0x0, 0x7f, 0x0, 0x0, 0xfffffff8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffd28) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 21:54:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) utime(0x0, 0x0) 21:54:23 executing program 1: openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/252, 0xfc}, {0x0}, {&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000002c0)=""/191, 0xbf}], 0x4, 0x5, 0x0) [ 90.150833][ T7199] loop3: detected capacity change from 0 to 512 21:54:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/45, 0x2d}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/145, 0x91}], 0x1, 0x3f, 0x0) 21:54:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') 21:54:23 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) [ 90.260706][ T7199] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 90.278137][ T7220] loop4: detected capacity change from 0 to 264192 21:54:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001140), 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss, @mss, @window, @mss], 0x4) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100006046a14942ba8002000000080003"], 0x3c}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(r2, r1, 0x0, 0x100000002) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) 21:54:23 executing program 1: clock_adjtime(0x0, &(0x7f0000000200)={0x73903b25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}) [ 90.312923][ T7199] ext4 filesystem being mounted at /root/syzkaller-testdir397278004/syzkaller.aeDwrX/87/file0 supports timestamps until 2038 (0x7fffffff) 21:54:23 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000000c0)="a2e699f9", 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="c20314c8ea"], 0xfdef) 21:54:23 executing program 4: set_mempolicy(0x3, &(0x7f0000000180)=0x3, 0x800) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:54:23 executing program 0: timer_create(0xa, 0x0, 0x0) [ 90.417473][ T7233] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.5'. 21:54:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000900000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000300)=ANY=[]) 21:54:23 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7c, 0x46, 0x0, 0x3f, 0x0, 0x0, 0x20010, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x7ff, 0x3, 0x0, 0x7f, 0x0, 0x0, 0xfffffff8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffd28) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 21:54:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r1, 0x560d, &(0x7f0000000040)=""/142) 21:54:24 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 21:54:24 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x8) r1 = open(&(0x7f0000000040)='./bus\x00', 0x68000, 0x0) ftruncate(r0, 0x5) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) [ 90.567142][ T7264] loop3: detected capacity change from 0 to 512 21:54:24 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) [ 90.618550][ T7264] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 90.645598][ T7264] ext4 filesystem being mounted at /root/syzkaller-testdir397278004/syzkaller.aeDwrX/88/file0 supports timestamps until 2038 (0x7fffffff) 21:54:24 executing program 5: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_LINK_TIMEOUT={0xf, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 21:54:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000280)=@other={'decodes', ' ', 'io+mem'}, 0x8) 21:54:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000280)=@other={'decodes', ' ', 'io+mem'}, 0x8) 21:54:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000010200)="01000000000900000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000000040)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000300)=ANY=[]) 21:54:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000280)=@other={'decodes', ' ', 'io+mem'}, 0x8) 21:54:24 executing program 1: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x68, 0x0, &(0x7f0000000180)) 21:54:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001440)=@l2, 0xb, 0x0}}], 0x2, 0x0) [ 90.869857][ T7309] loop3: detected capacity change from 0 to 512 [ 90.906325][ T7309] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 21:54:24 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7c, 0x46, 0x0, 0x3f, 0x0, 0x0, 0x20010, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x0, 0xfff}, 0x0, 0x0, 0x7ff, 0x3, 0x0, 0x7f, 0x0, 0x0, 0xfffffff8, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0xfffffd28) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r1, 0x0) read(r1, &(0x7f0000000180)=""/19, 0xfffffe47) 21:54:24 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$vga_arbiter(r0, &(0x7f0000000280)=@other={'decodes', ' ', 'io+mem'}, 0x8) 21:54:24 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000016c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x1f}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 21:54:24 executing program 5: r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x81000200) r2 = epoll_create(0x800) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) inotify_rm_watch(r0, r1) ppoll(&(0x7f0000002a00)=[{r2}], 0x1, &(0x7f0000002ac0), 0x0, 0x0) [ 90.931910][ T7309] ext4 filesystem being mounted at /root/syzkaller-testdir397278004/syzkaller.aeDwrX/89/file0 supports timestamps until 2038 (0x7fffffff) 21:54:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) write$vga_arbiter(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='lock io'], 0x8) close_range(r1, 0xffffffffffffffff, 0x0) 21:54:25 executing program 1: keyctl$link(0x7, 0x0, 0x0) 21:54:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 3: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, r1+60000000}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000001c0), 0x0) 21:54:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 21:54:25 executing program 2: io_setup(0x10f1, &(0x7f0000000000)=0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000002040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) write$cgroup_freezer_state(r2, &(0x7f00000000c0)='THAWED\x00', 0x7) 21:54:25 executing program 3: set_mempolicy(0x1, &(0x7f0000000000)=0x3, 0x2) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@private1, 0x400, 0x0, 0x2, 0x2}, 0x20) 21:54:25 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) 21:54:25 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_pwait(r1, &(0x7f00000016c0)=[{}], 0x1, 0x0, 0x0, 0x0) 21:54:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, 0x0, &(0x7f00000000c0)) [ 91.649978][ T25] audit: type=1326 audit(1619646865.107:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7376 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 21:54:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, &(0x7f0000000080)) 21:54:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff4000}]}) nanosleep(&(0x7f0000000000), &(0x7f0000000080)) 21:54:25 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 21:54:25 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:25 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) [ 92.479969][ T25] audit: type=1326 audit(1619646865.937:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7376 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665f9 code=0x0 21:54:26 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10) read(r0, &(0x7f0000000000)=""/64, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x4b) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x2ffff, 0x0) 21:54:26 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAW(r0, 0x4b3a, 0x0) 21:54:26 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000180)={'lo\x00', @ifru_addrs=@xdp}) 21:54:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="240000001c0007031dfffd946fa2830004000a0009000000741d8568201ba3a20400ff7e280000002500ff1803abf53e21bca91d5384d97f9d22a839ddb89e4b34947fd7cb91d34e2009a05f", 0x4c}], 0x1}, 0x0) 21:54:26 executing program 3: unshare(0x20400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x40049409, 0x0) [ 92.560492][ T7426] tpacket_rcv: packet too big, clamped from 32820 to 32624. macoff=96 21:54:26 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 21:54:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) r2 = syz_open_pts(r1, 0x4000000000000002) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14}, 0xffffffde) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000140)={0x0, 0xfffffffb, 0x0, 0x0, 0x0, "601ff6097e5051e352f281a19704a3dd8059c7"}) fcntl$setstatus(r0, 0x4, 0x40800) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) 21:54:26 executing program 3: unshare(0x20400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x40049409, 0x0) [ 92.642613][ T7442] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 92.655560][ T7447] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 21:54:26 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 21:54:26 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e005f0014f9f40700090400020000000100000000000000080001", 0x1f) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0xac95, 0x0) 21:54:26 executing program 3: unshare(0x20400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x40049409, 0x0) 21:54:26 executing program 4: geteuid() 21:54:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 21:54:26 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 21:54:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, "80000002c76060e500"}) preadv(0xffffffffffffffff, &(0x7f0000001600)=[{0x0}, {0x0}, {&(0x7f0000000080)=""/41, 0x29}], 0x3, 0x1, 0x2) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7bcb9edbcc9d1dd33846e70f244f84592a3c90d46f3a6d4351fea355e11e6544e6768f92a8f07723fb63fc6fefa9b081ddd072bc035b568311aa58e58b081556c31beedaed8f0f437d2da06f7e3078b8f2420e0e2b138d6b8370c96632f9c165f115c4119813e5f3ff7a000b86fd"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000000000000090010000000001000"}) 21:54:26 executing program 3: unshare(0x20400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x40049409, 0x0) 21:54:26 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) move_pages(0x0, 0x20000047, &(0x7f0000000080), 0x0, &(0x7f0000000100), 0x0) 21:54:26 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000500)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:54:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000880), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000040)={0x28, r2, 0x37b194f8f4544653, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x28}}, 0x0) 21:54:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2363933ea1315b9532f3af2f5e153eb78020fa00eb29884a07da1f7cbee7547a405704878afe50a73a66faff77be062c5d8d5ac169242f35ef5f4a4077fe7d8b03e5c67d63192e8f8e56ce58a71298db370093b3a3e3a7640824926e", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r1, r2, &(0x7f00000000c0), 0xfff) fcntl$addseals(r2, 0x409, 0x8) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r3, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000180)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) dup3(r1, r2, 0x0) 21:54:27 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) 21:54:27 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000002440)) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 21:54:27 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000001c0)='hugetlb.2MB.limit_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200)=ANY=[], 0x208e24b) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000003) 21:54:27 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xb6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_pts(r0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/71, 0x47}], 0x1) ioctl$TCFLSH(r2, 0x540b, 0x1) 21:54:27 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000680)=ANY=[], 0x8) sendto$inet6(r0, &(0x7f00000000c0)="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"/1401, 0x579, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 21:54:27 executing program 0: set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0x7) clone3(&(0x7f00000013c0)={0xd020100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0x0], 0x1}, 0x58) 21:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, 0xee00, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r3) 21:54:27 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000680)=ANY=[], 0x8) sendto$inet6(r0, &(0x7f00000000c0)="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"/1401, 0x579, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 21:54:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r0, &(0x7f00000009c0)={0xa, 0x0, 0x0, @initdev, 0x2}, 0x1c) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r2, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r3, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r4, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r6, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r7, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r7, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r8, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r9 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r9, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r9, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r10, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r10, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) r11 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r11, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r11, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 21:54:27 executing program 0: set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0x7) clone3(&(0x7f00000013c0)={0xd020100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0x0], 0x1}, 0x58) 21:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, 0xee00, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r3) 21:54:27 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000680)=ANY=[], 0x8) sendto$inet6(r0, &(0x7f00000000c0)="0ed7b2f3ef1744c131b032517bd489b079d8f381c73ef92930aa67476222165fdca8f43386a7bab5a522424874be011b6fda6acac262feccaadfe6790531acb678f3ff79cf8c9b13a673fe4ca62931db0b40e152be606d980b0e1bb925a2c59e3752786d4824b75c0bad627d5142428b5ac0ec03316af5b975be002ebe04ded2c23b6aa22457a0d6dd6883bb6c075b0fd2a3b82b30bf9d3b0eeea2ce78c1817cb52641af490814da720e42a7b79d037d8b156bcb70e0c78f7fdf45fa574b937c7d267d3e62d57ed651f1b5baa5f4f83698743fdedeee7cd7d06ac108248d214af7f932fc97df9756ec4bc02f09b00f3546c904cac2450a11f5392e090644302d4b7d1e097e755456478be3527eb46ca57dbb7f4b74d674f1494357328f4526e03fa7ba32cbdb9afc7b3a19d0922ac3ab01365af2e6d680bcdb9ced1fa9220c17e78638f397cdca4eaf8457c1676622af814f8092b9a4e4705212a8b32766aff0c342d681dd45cbce49a3ed077b1f727c158cc2afc70cc350f36443333297e0cbf4cbbc3c48bad23e80f45e81fbf92b5b12e9a62184038f9261476eb679847c1a7c9f614cf972844661db0fa7535085615361ed2e8bcdf9d095251ae0d4032fa27b47824b68cd08dffde7acb47589f753a6ec30f34c12e09f564fbe789d74f892b61f4b55c583287e7177492f2d8b7edf397e260d88b00d40467b55da8240e86e7272ea179d0b4d7227f63740fe4fad9508735260a641a0e2b8d162baef639b9ea7e477a1f4800c2cb3d7561c929e576a7116547dacf47e31b3a3e52cd8d64f3e8a338fb3e7fade035733235d63bd9b00bb6c0abe336c391834b03b37275dbf3086334270a9fd65152184642388b01728c8b6c49dc0d76efb79b1ea4f29917e4e250ac0495782c2687236adb8f134b34fa55f967e9f47877c1d676d64b2a8b0a44e116276ae1f163605609315e0aa60885b5ef220ac670b90557c94344a18eebcb4cbce3652432a057ef8a36b23168f8a63684ab3b55d877d9dfd156bb8535cb98e118f544bece9be07da0a2a80f883cb356f4a7b1462be376d1445c1f1af0734057b2e70159d8b804f88230d7785be7384dd3e5af8659bcd516df18e8b92cb2abb86b2b5362518f2d36e8b08afe79a3412e7c356907057dc9675e07ba9b4e94f64a312eb5d434a6b7d73d3efdde70c96088efd51f9f10cd43d863c29a194eae77dda75883487c280a31803b9ec93023deb067eb6471eefaf5978b6f369ae9156d082e98f795a39e93692827d7aed3c808580fca71fd73f9d05605556dbfe4b9ad6dd522d4c699636017429d4cad45731f3cfa31c1b92906948ad13bb7c8f9a24ca31e0d0657736543342830f53bc950449767b964315931e69c22bd50304e183551fa5936e889c0771fb7f1165e3af6ea335321357db7f4a05769083affc13006b97bb44ee99a91f127cbc991276115a95f3a9b93e0e6e21a56968f711a7273abb0629a6280016ec79ffc717c56f4192e6297ca77950535d3c89d9b8efc953dfa40e06289322ce8ab19b9c6a8390e7d24e552fc5567e09f2a69b5d476434cb74c63b794e29f35ad03a1ccad46a7b5205d3f21d8832aa2263a87237534ba387af944992c118036c24009584f88cec8d1cbf5a54ca2cc6b41534e4a2fedb96d028bdb91376ff0607e19c859a8581cae73cac50328a05dd6435404d1a80a8b1edadd19b6c93b862da8fcfa0a8d373af051e92ada1d20bbb0e0abfd319057e0654167a1d0ab65387e3ec9e44daf505b96edf5f31b91587fe8006abe1336e1184ab998c712d10856e5e5db768acf929fe9ba7b006b20133c5266329fbfc6813ec1949d58b0da0318ba306b9df04af7ee297ca69daba743c7484a640c5ecb0d5cd494bbd67210072afc09ed951ec98f05cdd99a196bd0d5c999efcfbc63927ebd3180ae0c5dbee39da5c484d9e01f914b5a100"/1401, 0x579, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 21:54:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8165, 0x5) fallocate(r1, 0x0, 0x0, 0x801000) 21:54:27 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140), r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)={0x50, r2, 0x99bd9716a2430ce3, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}]}, 0x50}}, 0x0) 21:54:27 executing program 0: set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0x7) clone3(&(0x7f00000013c0)={0xd020100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0x0], 0x1}, 0x58) 21:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, 0xee00, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r3) 21:54:27 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000001700)=0x2, 0x4) sendmmsg$inet6(r0, &(0x7f00000018c0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x4008040) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 21:54:27 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000680)=ANY=[], 0x8) sendto$inet6(r0, &(0x7f00000000c0)="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"/1401, 0x579, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 21:54:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setresuid(0x0, 0xee00, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x275a, 0x0) 21:54:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000440)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) 21:54:27 executing program 1: r0 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x1c243911) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, 0xee00, r2) r3 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r3) 21:54:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000640)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0x4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}]}]}, 0x2c}}, 0x0) 21:54:27 executing program 0: set_mempolicy(0x3, &(0x7f00000000c0)=0x9, 0x7) clone3(&(0x7f00000013c0)={0xd020100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000012c0)=[0x0], 0x1}, 0x58) 21:54:27 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 21:54:27 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) keyctl$chown(0x12, 0x0, 0x0, 0x0) 21:54:28 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f00000005c0)={&(0x7f0000000140), 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x120, r1, 0x33b, 0x0, 0x0, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xa8, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x90, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0xfffffffffffffffe, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x120}}, 0x0) 21:54:28 executing program 1: unshare(0x600) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 21:54:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 21:54:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000440)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) 21:54:28 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 21:54:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) 21:54:28 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000001c0), 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000040)='\x7f\x00\x9d\x98\x06\x00\x8a\xe3\x7fs\x00\x00\xa0\xf4\xdb\xae\x00\x00\xed\x00\x00\x00\x00\x00', 0x0) keyctl$update(0x2, 0x0, 0x0, 0x0) 21:54:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000440)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) 21:54:28 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0xd) 21:54:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 21:54:28 executing program 4: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={[0xfffffffffffffffd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) io_setup(0x7, &(0x7f0000000280)=0x0) io_submit(r1, 0xf10, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x4000, 0x10, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 21:54:28 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1a, 0x1, 0x101, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000180), 0x0, 0x0, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000300)="00030000", 0x4, 0xfffffffffffffffb) 21:54:28 executing program 5: r0 = memfd_create(&(0x7f00000022c0)='{.#\x00', 0x0) preadv(r0, &(0x7f0000000340)=[{0x0}, {0xfffffffffffffffe}], 0x2, 0x0, 0x0) 21:54:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 21:54:28 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1a, 0x1, 0x101, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000180), 0x0, 0x0, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000300)="00030000", 0x4, 0xfffffffffffffffb) 21:54:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000440)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0) 21:54:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) getsockopt$inet6_tcp_buf(r0, 0x6, 0x14, 0x0, &(0x7f0000001180)) [ 94.724342][ T7645] dns_resolver: Unsupported content type (3) 21:54:28 executing program 5: mlock(&(0x7f0000800000/0x800000)=nil, 0x800000) munmap(&(0x7f0000de0000/0x4000)=nil, 0x1d8c6000) 21:54:28 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000262000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ad6000/0x1000)=nil, 0x1000, 0x3) 21:54:28 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000002c0)) 21:54:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 21:54:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x31, 0x0, 0x0) 21:54:28 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1a, 0x1, 0x101, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000180), 0x0, 0x0, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000300)="00030000", 0x4, 0xfffffffffffffffb) 21:54:28 executing program 1: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x11, 0x0, 0x0, 0x0) 21:54:28 executing program 3: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x40]}, 0x8, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000100)="8f2fe97fd801fbb6e3640874b15a8e480ed6a741ebb58a8f3756ce6dbdad4f6a1d93910523d64ad04f9f4d940d8d590825cbcc9e50482c39e72a2d9f0ff2ea533d74370f7fb157149027f561d21fb2ad350ec3f4b147438cea74b2b327b5a5bd43cde87c8b628afd51960e813ebf61456e149abd37ea1bec581ef6daf291933ff10de99f201b32a900000000000000329f0296b85de0f3b62836794428b7d660afad69a1480000", 0xa7, 0xfffffffffffffffb) [ 94.856392][ T7675] dns_resolver: Unsupported content type (3) 21:54:28 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x45}, {0x20, 0x0, 0x0, 0x10}, {0x6}]}) 21:54:28 executing program 0: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair(0x1a, 0x1, 0x101, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f0000000180), 0x0, 0x0, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000300)="00030000", 0x4, 0xfffffffffffffffb) 21:54:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 94.954160][ T7688] dns_resolver: Unsupported content type (3) [ 94.956232][ T7696] Invalid option length (129) for dns_resolver key [ 94.982094][ T7702] Invalid option length (129) for dns_resolver key 21:54:28 executing program 3: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x40]}, 0x8, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000100)="8f2fe97fd801fbb6e3640874b15a8e480ed6a741ebb58a8f3756ce6dbdad4f6a1d93910523d64ad04f9f4d940d8d590825cbcc9e50482c39e72a2d9f0ff2ea533d74370f7fb157149027f561d21fb2ad350ec3f4b147438cea74b2b327b5a5bd43cde87c8b628afd51960e813ebf61456e149abd37ea1bec581ef6daf291933ff10de99f201b32a900000000000000329f0296b85de0f3b62836794428b7d660afad69a1480000", 0xa7, 0xfffffffffffffffb) 21:54:28 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x6, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14d, &(0x7f0000000280)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:28 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)=@flushsa={0x20, 0x1c, 0x101, 0x0, 0x0, {}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0x20}}, 0x0) 21:54:28 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x4, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) 21:54:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 95.010710][ T7706] dns_resolver: Unsupported content type (3) [ 95.028056][ T25] audit: type=1326 audit(1619646868.477:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7698 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 21:54:28 executing program 3: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x40]}, 0x8, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000100)="8f2fe97fd801fbb6e3640874b15a8e480ed6a741ebb58a8f3756ce6dbdad4f6a1d93910523d64ad04f9f4d940d8d590825cbcc9e50482c39e72a2d9f0ff2ea533d74370f7fb157149027f561d21fb2ad350ec3f4b147438cea74b2b327b5a5bd43cde87c8b628afd51960e813ebf61456e149abd37ea1bec581ef6daf291933ff10de99f201b32a900000000000000329f0296b85de0f3b62836794428b7d660afad69a1480000", 0xa7, 0xfffffffffffffffb) 21:54:28 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x6, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14d, &(0x7f0000000280)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) [ 95.062677][ T7715] Invalid option length (129) for dns_resolver key 21:54:28 executing program 1: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r0, 0x56) 21:54:28 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) [ 95.134910][ T7727] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 21:54:28 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}}, {{&(0x7f0000000080)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@generic={0x7, 0x3, "d2"}, @timestamp_addr={0x44, 0x4, 0x3f}, @timestamp_prespec={0x44, 0x4}]}}}], 0x20}}], 0x2, 0x0) 21:54:28 executing program 3: ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x40]}, 0x8, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000100)="8f2fe97fd801fbb6e3640874b15a8e480ed6a741ebb58a8f3756ce6dbdad4f6a1d93910523d64ad04f9f4d940d8d590825cbcc9e50482c39e72a2d9f0ff2ea533d74370f7fb157149027f561d21fb2ad350ec3f4b147438cea74b2b327b5a5bd43cde87c8b628afd51960e813ebf61456e149abd37ea1bec581ef6daf291933ff10de99f201b32a900000000000000329f0296b85de0f3b62836794428b7d660afad69a1480000", 0xa7, 0xfffffffffffffffb) 21:54:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)={0x30, r1, 0x615, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x10}]}]}, 0x30}}, 0x0) 21:54:28 executing program 1: syz_open_dev$loop(&(0x7f0000000040), 0xffffffffffffffff, 0x0) [ 95.175559][ T7733] Invalid option length (129) for dns_resolver key 21:54:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') setgroups(0x0, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000980)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 21:54:28 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x6, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14d, &(0x7f0000000280)="c4c691019919da078a0098d1e0a593b0c52606991437be044fa4ea57ff22eafabe19af3dc4a01419cd2386ad59157689c9c6a47312334cd4afab5d8673c6f1e036a1fd1bb12a96ac2b7f0fb4aabebae8dc5dffbcd48a70502156e2bb08487ddca7fdb8e4189ebe84c95ed983ac128b83e5150eaa22c1b17e8b0686d3b5a92c184464c96a362a3bbd14db5b4763ba080000001ba9f11e37b4944bd60bb0b536473b19cbbfdaddf5a30f0e8ff6ad7fd0edd5f52735999a5f62287f651c37a552be88aaa77a8ce88cb9d8fabace9135398c898c4be4cdb94fbaeadd3684af6a1469edb7e81cadff903172d069b7063c799b9365b5478149404407044f4c7bbe5b0008f60386d77b15c951b3fdb0ff2d2448879d0fa7d67a903ae5f6c76851a5be95099085c1d039b0c46904ab652a41ced0ccbd142563a177e6b805bc09c114343940cfe957650b67b7167bdd9057"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:28 executing program 4: keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) 21:54:28 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={&(0x7f0000000540)={0xa, 0x0, 0x0, @local}, 0x18, 0x0}, 0x24004800) 21:54:28 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xdc}, {}, {}, @time}, {0x0, 0x72, 0x0, 0x0, @time={0xfffffff8}}], 0x38) [ 95.253557][ T7753] Invalid option length (129) for dns_resolver key 21:54:28 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=ANY=[]) 21:54:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/235, 0xffffffa8) 21:54:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800004, 0x12, r0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x2) getsockopt$inet6_opts(r1, 0x29, 0x19, 0x0, &(0x7f00000014c0)) 21:54:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000080)) poll(0x0, 0x0, 0x201) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:54:28 executing program 5: ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x6, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x14d, &(0x7f0000000280)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:28 executing program 3: unshare(0x8020600) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x13, 0x0, 0x4) 21:54:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="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", 0x15d, 0x400}], 0x0, &(0x7f0000000040)=ANY=[]) 21:54:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x6, 0x45, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000240)="082f7b807037", 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0}) 21:54:28 executing program 5: clone(0x20087104ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') exit_group(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 21:54:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() poll(0x0, 0x0, 0xffdffff8) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)="66530700ae897094e7b126b097eaa769be6d05c41bd36ab95156e9962f38ee9611b9774e677d114b65", 0x29}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x4) 21:54:28 executing program 3: symlinkat(&(0x7f0000000000)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file1\x00', 0x0) 21:54:28 executing program 4: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:cgroup_t:s0\x00', 0x1e) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) 21:54:28 executing program 3: r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r0, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x2fc1, 0x0, 0x0, 0x0, 0x0) [ 95.449866][ T7795] loop1: detected capacity change from 0 to 4 [ 95.461472][ T7795] EXT4-fs (loop1): Unrecognized mount option "" or missing value 21:54:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/235, 0xffffffa8) 21:54:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) flistxattr(r0, &(0x7f0000000040)=""/144, 0x90) [ 95.537480][ T25] audit: type=1400 audit(1619646868.997:86): avc: denied { create } for pid=7822 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=rawip_socket permissive=1 [ 95.591318][ T25] audit: type=1400 audit(1619646869.017:87): avc: denied { bind } for pid=7822 comm="syz-executor.4" lport=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=rawip_socket permissive=1 [ 95.640940][ T25] audit: type=1400 audit(1619646869.017:88): avc: denied { node_bind } for pid=7822 comm="syz-executor.4" scontext=system_u:object_r:cgroup_t:s0 tcontext=system_u:object_r:node_t:s0 tclass=rawip_socket permissive=1 21:54:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000080)) poll(0x0, 0x0, 0x201) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:54:29 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x8) r1 = epoll_create(0x8000) epoll_pwait(r1, &(0x7f00000000c0)=[{}], 0x1, 0x1ff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x80000001}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000080)={0x40000006}) 21:54:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) flistxattr(r0, &(0x7f0000000040)=""/144, 0x90) 21:54:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/235, 0xffffffa8) 21:54:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) flistxattr(r0, &(0x7f0000000040)=""/144, 0x90) 21:54:29 executing program 4: prctl$PR_SET_MM(0x4, 0x3, &(0x7f0000ffc000/0x2000)=nil) 21:54:31 executing program 5: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffff8]}, 0x8) read(r1, &(0x7f0000000740)=""/384, 0x200008c0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:54:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x3}, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x52, 0x1, 0x0, 0x0, {0x2}, [@typed={0x4, 0x8}]}, 0x18}}, 0x0) 21:54:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/235, 0xffffffa8) 21:54:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r1, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) flistxattr(r0, &(0x7f0000000040)=""/144, 0x90) 21:54:31 executing program 3: r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r0, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x2fc1, 0x0, 0x0, 0x0, 0x0) 21:54:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000080)) poll(0x0, 0x0, 0x201) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:54:32 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast1}, {@in=@broadcast, 0x0, 0x3c}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 21:54:32 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x0) 21:54:32 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000001c0)="bbc38b4a4254c94e44ab8dd21313696d16da0f8d4bba12eb138983a58516d3157182d6574910cea8b038daa235129b3a852c64b1510b787c8914452be475d53ca80b1ab0ba1c06b96e985e737c408216558eb2f5d79352102ae2e6965e26089ff576e3bd030f791014b033f0a1a3be9ddc72cc8d0546401095") exit_group(0x0) 21:54:32 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{0x2}, {@void, @val={0xc}}}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x4}]}, 0x24}}, 0x0) 21:54:32 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000004c0)=0x5) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0x79000000, 0x0, 0x1, 0x0, r0, 0x0}]) 21:54:32 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) 21:54:32 executing program 5: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffff8]}, 0x8) read(r1, &(0x7f0000000740)=""/384, 0x200008c0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:54:32 executing program 1: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001700), 0x0, &(0x7f0000001800)={[{@session={'session', 0x3d, 0x900}}]}) 21:54:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r0, &(0x7f0000000000)="a9", 0x1) 21:54:32 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="f800000016003d410000000000000000200100000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0a010100000000000000000000000000000000006c000000ff010000000000000000000000000001610000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ebffffff000000000a"], 0xf8}}, 0x0) 21:54:32 executing program 3: r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r0, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x2fc1, 0x0, 0x0, 0x0, 0x0) 21:54:32 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000080)) poll(0x0, 0x0, 0x201) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:54:32 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='\xf3e\t\xa9\xff\vty\x01se\x83ux\x00\xc9\xf8\xfa\x8a\x87\x90\xe6\xbe\x05\x9f\x80\xd0\xcf\xb2 \xf6Xkq3\x11*F\x1f\xd9L\r\xe7\xc6\xee\x10\x8e3\xf1\b\xe61??C\f\x16\xa5\xb6\xaa\xf8W\xa7]\x8e\xe9Hh\x8c\x03\xb3\xe4\xff\xca\x97\xbd\t\xbc@\x9e\x04\xfa\x87Y\xd7\xab\xfd\x1f\x13J\xa2,\xee\xf9\xa4\x94S\xb7\xb3\xdf\x01\x85\xe7\x03d\xfb@FO\xd6\"\x14\x19t\xa9\xa7\xe7\x85', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0/../file0\x00') 21:54:32 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x80, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x4, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @multicast2}}}]}]}, 0x80}}, 0x0) 21:54:32 executing program 5: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffff8]}, 0x8) read(r1, &(0x7f0000000740)=""/384, 0x200008c0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:54:32 executing program 1: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) io_setup(0x100, &(0x7f00000003c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000400)="9936", 0x20000402, 0x2}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 21:54:32 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x32}, 0x0, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x7}}, 0xe8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:54:32 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x56, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f710e7d5b925c099710cb6422ec536070ff7ae78886cb6508e094cf05f7512668917458e9f9694c0585fe8411e858d5f2eb3b53dd3d8f71b1cdfcc5b2af289981079bb6fc3"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000000080)={{0x14}, [], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x28}}, 0x0) [ 99.410590][ T7966] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 99.420004][ T7966] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 21:54:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa7", 0xf}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 21:54:32 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 21:54:32 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 99.533703][ T703] print_req_error: 35 callbacks suppressed [ 99.533719][ T703] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 99.552551][ T7997] EXT4-fs (loop3): unable to read superblock [ 99.562171][ T25] audit: type=1326 audit(1619646873.018:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 99.631435][ T25] audit: type=1326 audit(1619646873.048:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=267 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 99.649240][ T703] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 99.667262][ T8006] EXT4-fs (loop3): unable to read superblock [ 99.670759][ T25] audit: type=1326 audit(1619646873.048:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 99.698480][ T25] audit: type=1326 audit(1619646873.048:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665f9 code=0x7ffc0000 [ 99.722870][ T25] audit: type=1326 audit(1619646873.048:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7994 comm="syz-executor.0" exe="/root/syz-executor.0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7ffc0000 21:54:33 executing program 3: r0 = syz_io_uring_setup(0x6b52, &(0x7f0000000080), &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000180), &(0x7f0000000040)) syz_io_uring_setup(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x3}, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0, 0x0) io_uring_enter(r0, 0x0, 0x45c5, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, 0x0, 0x1) io_uring_enter(r0, 0x2fc1, 0x0, 0x0, 0x0, 0x0) 21:54:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x4) 21:54:33 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 21:54:33 executing program 5: rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0xc, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) r1 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffff8]}, 0x8) read(r1, &(0x7f0000000740)=""/384, 0x200008c0) ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:54:33 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x192, &(0x7f0000000400)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000040)={0x0, 0x4, '\x00', [@calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @generic={0x0, 0x4, "5bee9ba9"}]}, 0x28) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 21:54:33 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 21:54:33 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000375000/0x1000)=nil, 0x1000, 0x8003, &(0x7f0000000000)=0xfeb, 0x7, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00006f0000/0x1000)=nil, 0x2) [ 100.323107][ T966] blk_update_request: I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 100.334937][ T8023] EXT4-fs (loop3): unable to read superblock 21:54:33 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:54:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={[], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}, 0x31}]}) 21:54:35 executing program 1: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 21:54:35 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000440)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='vfat\x00', 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 21:54:35 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clock_nanosleep(0xfffffffffffffff0, 0x0, &(0x7f0000000100)={0x77359400}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000100)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 21:54:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:35 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x200000000000c8, &(0x7f0000000040), 0x4) 21:54:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) [ 102.539721][ T703] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 102.559149][ T8074] FAT-fs (loop1): unable to read boot sector [ 102.576282][ T966] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 21:54:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x14, r1, 0x1, 0x0, 0x0, {0x10}}, 0x14}}, 0x0) 21:54:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000780)=[{{&(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10, 0x0}}, {{&(0x7f00000000c0)={0x2, 0x4e22, @dev}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @loopback}}}], 0x20}}], 0x2, 0x0) 21:54:36 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffffffffffffffd]}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000000)) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003be) [ 102.597181][ T8074] FAT-fs (loop1): unable to read boot sector 21:54:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:36 executing program 0: set_mempolicy(0x1, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 21:54:36 executing program 1: r0 = eventfd(0x0) write$eventfd(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x8) 21:54:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:54:36 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', 0x0, 0x80000, 0x3, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010400), 0x0, 0x802}, {0x0}], 0x0, &(0x7f0000000540)=ANY=[]) 21:54:36 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat2(0xffffffffffffff9c, &(0x7f00000008c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f0000000940)={0x40}, 0xfe8) 21:54:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x18, r1, 0x301, 0x0, 0x0, {0x9}, [@HEADER={0x4}]}, 0x18}}, 0x0) 21:54:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x20, r2, 0x303, 0x0, 0x0, {0xb}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}}, 0x0) 21:54:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:36 executing program 2: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvmmsg(r0, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/164, 0xa4}}], 0x1, 0x2022, 0x0) 21:54:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() 21:54:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/247, 0xf7}], 0x1, 0x33, 0x0) [ 103.469646][ T8143] loop1: detected capacity change from 0 to 1024 21:54:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x32, 0x0, 0x0) 21:54:37 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4edcce412245d", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) exit_group(0x0) 21:54:37 executing program 3: r0 = io_uring_setup(0x2d08, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x9, 0x0, 0x1) 21:54:37 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/zoneinfo\x00', 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x3}) 21:54:37 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {}, 0x2c, {[{@version_L}]}}) syz_open_pts(0xffffffffffffffff, 0x0) 21:54:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x110, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 21:54:37 executing program 2: r0 = syz_io_uring_setup(0x6b50, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x3f3, 0x0, 0x9, 0x0, 0x18) 21:54:37 executing program 5: setgroups(0x0, 0x0) setgid(0x0) [ 103.869056][ T8189] 9pnet: p9_fd_create_tcp (8189): problem connecting socket to 127.0.0.1 [ 103.882315][ T8206] 9pnet: p9_fd_create_tcp (8206): problem connecting socket to 127.0.0.1 21:54:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:37 executing program 1: set_mempolicy(0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) 21:54:37 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {}, 0x2c, {[{@version_L}]}}) syz_open_pts(0xffffffffffffffff, 0x0) 21:54:37 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000240)="53000000fcfffffffeffffff02000400b8c2d4fffd1ed31723c2f92c657296a3458a9a45f62e270000a40000000000348a67b68c4cc357ec6c000000001b1bab0525dcda9f60020000002c76d61bd85f96051133e085e09d", 0x58}], 0x2) 21:54:37 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x5e, &(0x7f00000013c0)=ANY=[@ANYBLOB="2000000000000000bd9a3a126d0000002e0f97f2570a4652e504f25221d00000"], 0x20}, 0x0) 21:54:37 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {}, 0x2c, {[{@version_L}]}}) syz_open_pts(0xffffffffffffffff, 0x0) 21:54:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:38 executing program 3: r0 = socket$inet6(0xa, 0x2000000080803, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x2b}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) [ 104.554820][ T8224] 9pnet: p9_fd_create_tcp (8224): problem connecting socket to 127.0.0.1 [ 104.566433][ T25] audit: type=1326 audit(1619646878.028:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=8218 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 21:54:38 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) [ 104.786914][ T8235] 9pnet: p9_fd_create_tcp (8235): problem connecting socket to 127.0.0.1 21:54:38 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f00000007c0)={'trans=tcp,', {}, 0x2c, {[{@version_L}]}}) syz_open_pts(0xffffffffffffffff, 0x0) [ 104.942498][ T8263] 9pnet: p9_fd_create_tcp (8263): problem connecting socket to 127.0.0.1 21:54:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:38 executing program 3: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 3: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:38 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:39 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:39 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 3: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 2: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:39 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADDIR(r3, &(0x7f0000000080)={0xb}, 0xb) 21:54:40 executing program 3: mlockall(0x2) io_setup(0x9, &(0x7f0000000900)) 21:54:40 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:40 executing program 1: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000040)={'vcan0\x00'}) 21:54:40 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0], 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=[0x0], &(0x7f00000001c0)=[0x0], 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01010101", 0x4) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x42, 0x0) close(r2) execveat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0], 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x1ff) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0], 0x0) 21:54:40 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x5a, 0x0}) 21:54:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000040)={'vcan0\x00'}) 21:54:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000040)=0x46, 0x4) 21:54:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) 21:54:40 executing program 4: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) lchown(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='ext2\x00', 0x0, 0x0) 21:54:40 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000003c0)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x0}}}, 0x1}, 0x90) [ 107.202398][ T966] blk_update_request: I/O error, dev loop9, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 107.216762][ T8423] EXT4-fs (loop9): unable to read superblock [ 107.225469][ T703] blk_update_request: I/O error, dev loop9, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 107.242909][ T8430] EXT4-fs (loop9): unable to read superblock 21:54:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x20}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfe6f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000780), 0x12) write$cgroup_subtree(r2, 0x0, 0x200600) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000440)={0x0, 0xdfe, 0x5}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r0}) 21:54:40 executing program 0: syz_io_uring_setup(0xd26, &(0x7f0000000000)={0x0, 0x245c, 0x8}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 21:54:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f13631805f4caefe5a73f0500bb9fb245f2d1eaa302ab6c2fef23f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000008000fb8005128e7e4d939955f8271856f94cdeecf13029fff23c21b372cc73fb2bd3006f5385e3266f601052a09ab772d473f38ec770c9dd9bae00001100000000000008a480993baa222704", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000400)=""/52, 0x34}], 0x1, 0x7fff, 0x0) 21:54:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000040)={'vcan0\x00'}) 21:54:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000340)=@filename='./file0\x00', &(0x7f0000187ff8)='.', 0x0, 0x1006014, 0x0) 21:54:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f13631805f4caefe5a73f0500bb9fb245f2d1eaa302ab6c2fef23f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000008000fb8005128e7e4d939955f8271856f94cdeecf13029fff23c21b372cc73fb2bd3006f5385e3266f601052a09ab772d473f38ec770c9dd9bae00001100000000000008a480993baa222704", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:41 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x402c5342, &(0x7f0000000480)={0x0, 0x8, 0x2, 0x0, 0x3}) 21:54:41 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007f1600fe05b2a4a280930a060001fe80000205000000390009002d0050000200000025000540039b846ef75afb83de441114ae20ca3ab8220000060cec4fc091d471cd34938c42f030dd941e7931ff", 0x55}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 21:54:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, 0x0, &(0x7f0000000000)=0x31) 21:54:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000040)={'vcan0\x00'}) 21:54:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f13631805f4caefe5a73f0500bb9fb245f2d1eaa302ab6c2fef23f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000008000fb8005128e7e4d939955f8271856f94cdeecf13029fff23c21b372cc73fb2bd3006f5385e3266f601052a09ab772d473f38ec770c9dd9bae00001100000000000008a480993baa222704", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000340)=@filename='./file0\x00', &(0x7f0000187ff8)='.', 0x0, 0x1006014, 0x0) 21:54:41 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf", 0x55}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) setgroups(0x1, &(0x7f0000000180)=[0x0]) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(0xffffffffffffffff, 0x50009401, &(0x7f0000000680)={{r2}, "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"}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000540)=""/245, 0xf5}], 0x1, 0xffffffff, 0x0) 21:54:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x163, &(0x7f00000005c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 21:54:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f13631805f4caefe5a73f0500bb9fb245f2d1eaa302ab6c2fef23f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560001000000008000fb8005128e7e4d939955f8271856f94cdeecf13029fff23c21b372cc73fb2bd3006f5385e3266f601052a09ab772d473f38ec770c9dd9bae00001100000000000008a480993baa222704", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000340)=@filename='./file0\x00', &(0x7f0000187ff8)='.', 0x0, 0x1006014, 0x0) 21:54:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x74, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@beacon=[@NL80211_ATTR_BEACON_HEAD={0x28, 0xe, {@wo_ht={{}, {}, @broadcast, @device_a, @from_mac}, 0x0, @default, 0x1, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void, @void}}], @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_AUTH_TYPE={0x8}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}]}, 0x74}}, 0x0) 21:54:41 executing program 2: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000180)=@IORING_OP_EPOLL_CTL=@del={0x1d, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x1}, 0x37c) unshare(0x48000000) 21:54:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x8901, &(0x7f0000000080)={0x2, @l2tp={0x2, 0x0, @multicast1}, @phonet, @nfc, 0x0, 0x0, 0x0, 0xb00}) 21:54:41 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r3, &(0x7f0000003500)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0, 0x0) close(r3) socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f0000000000", 0x1a}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 21:54:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) mount(&(0x7f0000000340)=@filename='./file0\x00', &(0x7f0000187ff8)='.', 0x0, 0x1006014, 0x0) 21:54:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x2}]) 21:54:41 executing program 0: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 21:54:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@block={'block', 0x3d, 0x200}}]}) 21:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c6530202d2728941246512040ff207b20272b7d205e2e292c5b5dc87d97b2638a613e3df0b0817a16504fa0b48b98ac9935a6e098364c5bc28b4d8a4966ff344a483555535e320c2475b46b59a2c3708043927e85dcd936057f688b6622393a9dcd3ac5407c96f0cf31ce70b5d8e893310b454a9decdbe6db11cf9423070ad580d2e2808b"], 0xdb) 21:54:41 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0xffffffff, 0x74e) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) 21:54:41 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 21:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c6530202d2728941246512040ff207b20272b7d205e2e292c5b5dc87d97b2638a613e3df0b0817a16504fa0b48b98ac9935a6e098364c5bc28b4d8a4966ff344a483555535e320c2475b46b59a2c3708043927e85dcd936057f688b6622393a9dcd3ac5407c96f0cf31ce70b5d8e893310b454a9decdbe6db11cf9423070ad580d2e2808b"], 0xdb) 21:54:41 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000400)="240000001a0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c6530202d2728941246512040ff207b20272b7d205e2e292c5b5dc87d97b2638a613e3df0b0817a16504fa0b48b98ac9935a6e098364c5bc28b4d8a4966ff344a483555535e320c2475b46b59a2c3708043927e85dcd936057f688b6622393a9dcd3ac5407c96f0cf31ce70b5d8e893310b454a9decdbe6db11cf9423070ad580d2e2808b"], 0xdb) [ 107.893156][ T8545] hugetlbfs: syz-executor.0 (8545): Using mlock ulimits for SHM_HUGETLB is deprecated [ 107.893665][ T8547] ISOFS: Unable to identify CD-ROM format. 21:54:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@block={'block', 0x3d, 0x200}}]}) 21:54:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861ff11495d58553d8c11c606e13da9b8d26a566833fe1f9c73899301d879b51848164e7b988889c753ba801e880c49a91e7b9486916ea7a348947d85d038e1ac9522c11a448eb497c3e3c53f1fab7d652fe3f5f47c19680532dc8a190e522fe2f99859d8b1ebeb5113b7ee64dd6215e563ef2ce8f28e89e5796e91ec09ed1685111dd9fdd786342", 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB="1000020000000000"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:41 executing program 3: unshare(0x8020600) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000000)=""/39, &(0x7f0000000040)=0x27) 21:54:41 executing program 0: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 21:54:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_script(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="2321202e2f66696c6530202d2728941246512040ff207b20272b7d205e2e292c5b5dc87d97b2638a613e3df0b0817a16504fa0b48b98ac9935a6e098364c5bc28b4d8a4966ff344a483555535e320c2475b46b59a2c3708043927e85dcd936057f688b6622393a9dcd3ac5407c96f0cf31ce70b5d8e893310b454a9decdbe6db11cf9423070ad580d2e2808b"], 0xdb) 21:54:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3020000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@minixdf}, {@usrjquota}]}) 21:54:41 executing program 0: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 21:54:41 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 108.067441][ T8583] ISOFS: Unable to identify CD-ROM format. 21:54:41 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) 21:54:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@block={'block', 0x3d, 0x200}}]}) 21:54:41 executing program 0: setresgid(0xee00, 0xee01, 0x0) setgroups(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r1) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 21:54:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)={0x58, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x2c, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfdfc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x58}}, 0x0) [ 108.150917][ T8614] loop1: detected capacity change from 0 to 98560 21:54:41 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) [ 108.218184][ T8614] EXT4-fs (loop1): mounted filesystem without journal. Opts: minixdf,usrjquota=,,errors=continue. Quota mode: none. [ 108.243378][ T8614] ext4 filesystem being mounted at /root/syzkaller-testdir723604475/syzkaller.LCeUkP/149/file0 supports timestamps until 2038 (0x7fffffff) 21:54:41 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000300)) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x40002015}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r2, &(0x7f00000000c0)={0x9}) 21:54:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3020000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@minixdf}, {@usrjquota}]}) 21:54:41 executing program 2: syz_io_uring_setup(0x1ff4, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0, 0x0) mincore(&(0x7f0000fee000/0x12000)=nil, 0x12000, &(0x7f0000000180)=""/192) [ 108.265268][ T8621] ISOFS: Unable to identify CD-ROM format. 21:54:41 executing program 0: r0 = socket(0xa, 0x3, 0xff) sendto$unix(r0, &(0x7f0000000040)="7a4d544ef339ea4c262be376c9cde4cc823cef9ca80553d29728b3607e8464545b2e3f4c6bb1cc1a", 0x28, 0x8812, &(0x7f0000000080)=@abs, 0x6e) 21:54:41 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x420000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1145042, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) sendfile(r3, r0, 0x0, 0x800000000004) 21:54:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@block={'block', 0x3d, 0x200}}]}) [ 108.381712][ T8659] loop1: detected capacity change from 0 to 98560 [ 108.403536][ T8664] ISOFS: Unable to identify CD-ROM format. [ 108.441151][ T8659] EXT4-fs (loop1): mounted filesystem without journal. Opts: minixdf,usrjquota=,,errors=continue. Quota mode: none. [ 108.459495][ T8659] ext4 filesystem being mounted at /root/syzkaller-testdir723604475/syzkaller.LCeUkP/150/file0 supports timestamps until 2038 (0x7fffffff) 21:54:44 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 21:54:44 executing program 2: unshare(0x480) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000040), 0x4) 21:54:44 executing program 4: move_pages(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 21:54:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3020000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@minixdf}, {@usrjquota}]}) 21:54:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = fork() rt_tgsigqueueinfo(r2, r2, 0x18, &(0x7f0000001580)={0x0, 0x0, 0xfffffffb}) 21:54:44 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0x9201, 0x0) 21:54:44 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x2c, 0x2, 0x2, 0x801, 0x0, 0x0, {0xa}, [@CTA_EXPECT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x5, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8}}}]}]}, 0x2c}}, 0x0) [ 111.172094][ T8699] loop1: detected capacity change from 0 to 98560 [ 111.206776][ T8699] EXT4-fs (loop1): mounted filesystem without journal. Opts: minixdf,usrjquota=,,errors=continue. Quota mode: none. 21:54:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 21:54:44 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x1) r2 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0xa0000011}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)) 21:54:44 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3020000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {0x0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@minixdf}, {@usrjquota}]}) [ 111.215704][ T8712] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 111.237799][ T8699] ext4 filesystem being mounted at /root/syzkaller-testdir723604475/syzkaller.LCeUkP/151/file0 supports timestamps until 2038 (0x7fffffff) 21:54:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) [ 111.349859][ T8739] loop1: detected capacity change from 0 to 98560 [ 111.362298][ T8739] EXT4-fs (loop1): mounted filesystem without journal. Opts: minixdf,usrjquota=,,errors=continue. Quota mode: none. [ 111.376283][ T8739] ext4 filesystem being mounted at /root/syzkaller-testdir723604475/syzkaller.LCeUkP/152/file0 supports timestamps until 2038 (0x7fffffff) 21:54:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="66530700ae897094e71b0fb1f147a825d86800278dcff47d01000067dd32", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:47 executing program 2: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 21:54:47 executing program 4: syz_open_dev$vcsa(&(0x7f0000000140), 0x0, 0x201) 21:54:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x4000000c}) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 21:54:47 executing program 1: keyctl$restrict_keyring(0x5, 0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='\x00', 0x0) 21:54:47 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000980)="66530700ae", 0x5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x2) 21:54:47 executing program 4: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) clone3(&(0x7f0000000380)={0x201083200, &(0x7f0000000140), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) 21:54:47 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001b000000070021"], 0x24}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit(0x0) 21:54:47 executing program 0: r0 = syz_io_uring_setup(0x89, &(0x7f0000000080), &(0x7f0000ee7000/0x3000)=nil, &(0x7f00006d5000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000100)) close_range(r0, 0xffffffffffffffff, 0x2) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 114.212627][ T8767] new mount options do not match the existing superblock, will be ignored [ 114.229963][ T8767] new mount options do not match the existing superblock, will be ignored [ 114.241960][ T8777] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 21:54:47 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001b000000070021"], 0x24}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit(0x0) 21:54:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x1000000000016) ptrace(0x4206, r0) rt_tgsigqueueinfo(r0, r0, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffc58b}) ptrace(0x4208, r0) [ 114.255862][ T8777] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 114.302032][ T8797] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 21:54:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:50 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001b000000070021"], 0x24}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit(0x0) 21:54:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ppoll(&(0x7f0000000380)=[{r0}], 0x1, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) 21:54:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)) syz_mount_image$tmpfs(&(0x7f00000001c0), &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x37, 0x65]}}]}) 21:54:50 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) rt_sigtimedwait(&(0x7f0000003f40), 0x0, &(0x7f0000004000), 0x8) [ 117.232401][ T8825] tmpfs: Too small a size for current use [ 117.233934][ T8827] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 117.245098][ T8829] tmpfs: Too small a size for current use 21:54:50 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8368f364602266c2bc138ffff15d981621df4cb634fc5839e43e90610584ee437c2b6978df86cc866e4ff4aef1d034eedc55914029c1deaede6f8ff783f189ee1c73476daac4c9818be18e9843e381877be5e108fe4a3484a183df671a20ca10c3fa5940b9ccb80730519d283423361360f040000000000000000000000d2a7996dd5592b39e95600c6b98a66152433d378d2ed19938aa273e0a2a659361d8b8260635c0d9165a20e8b825b5d31f037759779bfd2bdcbc9ca", 0xc7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:54:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "eaff18e2090000000000000200000000010051"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000000000001000"}) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x2, 0x0, "d25cdda725f4a0f02953324d519f16ae3ef063"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000003000000000000000000001000"}) [ 117.409027][ T8837] new mount options do not match the existing superblock, will be ignored 21:54:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b31a53bad1ec3533c791a753a1fef2c560015000000000000fb8005128e7e4d939955f8ac396203784000400f", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x5) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:54:50 executing program 4: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup2(r2, r0) r3 = syz_open_pts(r1, 0x2042) dup3(r3, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x6b}}) 21:54:51 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000001b000000070021"], 0x24}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit(0x0) 21:54:51 executing program 4: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) 21:54:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[], 0x4c, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x1, 0x0, 0x8, 0x0, 0x1f}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000200), 0x175d900f) capget(0x0, 0x0) [ 118.107071][ T8897] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 21:54:53 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0xc0189436, 0xfffffffffffffffe) 21:54:53 executing program 4: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0x0, &(0x7f00000001c0)=0x0) r3 = socket(0x10, 0x3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x1276, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0x0) 21:54:53 executing program 2: set_mempolicy(0x1, &(0x7f00000000c0)=0x10001, 0x7) syz_open_procfs(0x0, &(0x7f0000000240)='smaps_rollup\x00') 21:54:53 executing program 5: r0 = semget$private(0x0, 0x4000000009, 0x0) semtimedop(r0, &(0x7f0000000080)=[{0x0, 0x1}], 0x1, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xfffe}], 0x1) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x8000}], 0x1, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x1}], 0x1, 0x0) 21:54:53 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={0x14, 0x6, 0x10, 0x201}, 0x14}}, 0x0) 21:54:53 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0xd, &(0x7f00000005c0)=@req3={0x1000, 0xa8d2, 0x300, 0x34c1a}, 0x1c) 21:54:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 21:54:53 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f00000035c0)=0x1000baa) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x1) write(r1, &(0x7f0000000000)="d5", 0xfffffedf) r2 = dup(r1) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "42f1b4a820d8354a7770ed9516e7149c37dd57"}) 21:54:53 executing program 4: r0 = memfd_create(&(0x7f0000000080)='prodM\xb0\xea\a\x84c\xaen/\xce\x17\xbb\xa61fode\xd0\x00\x00\x82\x97\x8at\xa24>X@0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 121.441146][ T9016] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 121.497786][ T9022] loop3: detected capacity change from 0 to 256 [ 121.507979][ T9022] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 121.545779][ T9035] ================================================================== [ 121.553934][ T9035] BUG: KCSAN: data-race in __io_cqring_fill_event / io_req_defer [ 121.562377][ T9035] [ 121.564714][ T9035] write to 0xffff888106aa8440 of 4 bytes by task 9037 on cpu 1: [ 121.572360][ T9035] __io_cqring_fill_event+0x135/0x400 [ 121.577734][ T9035] io_req_complete_post+0x49/0x570 [ 121.582853][ T9035] __io_complete_rw+0x3a0/0x430 [ 121.587693][ T9035] io_complete_rw+0x1b/0x20 [ 121.592215][ T9035] kiocb_done+0x1d3/0x8d0 [ 121.596531][ T9035] io_issue_sqe+0x410a/0x6080 [ 121.601207][ T9035] io_wq_submit_work+0x112/0x300 [ 121.606132][ T9035] io_worker_handle_work+0xbbb/0xe20 [ 121.611415][ T9035] io_wqe_worker+0x1e5/0x580 [ 121.615986][ T9035] ret_from_fork+0x1f/0x30 [ 121.620497][ T9035] [ 121.622823][ T9035] read to 0xffff888106aa8440 of 4 bytes by task 9035 on cpu 0: [ 121.630347][ T9035] io_req_defer+0x344/0x470 [ 121.634931][ T9035] io_queue_sqe+0x18/0x160 [ 121.639337][ T9035] io_submit_sqe+0x15c7/0x30c0 [ 121.644088][ T9035] io_submit_sqes+0x61f/0xaf0 [ 121.648778][ T9035] __se_sys_io_uring_enter+0x217/0xb20 [ 121.654344][ T9035] __x64_sys_io_uring_enter+0x74/0x80 [ 121.659706][ T9035] do_syscall_64+0x4a/0x90 [ 121.664111][ T9035] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 121.670012][ T9035] [ 121.672417][ T9035] Reported by Kernel Concurrency Sanitizer on: [ 121.678632][ T9035] CPU: 0 PID: 9035 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 21:54:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40042, 0x0) 21:54:55 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0xd, &(0x7f00000005c0)=@req3={0x1000, 0xa8d2, 0x300, 0x34c1a}, 0x1c) [ 121.686979][ T9035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.697039][ T9035] ================================================================== [ 121.713708][ T1782] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 121.805249][ T9052] loop3: detected capacity change from 0 to 256 [ 121.819683][ T9052] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 121.861348][ T8] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:54:57 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000080)="9e384171658e1d88"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:54:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 21:54:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 21:54:57 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 21:54:57 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40042, 0x0) 21:54:57 executing program 0: r0 = socket(0x11, 0x2, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0xd, &(0x7f00000005c0)=@req3={0x1000, 0xa8d2, 0x300, 0x34c1a}, 0x1c) 21:54:57 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 124.362262][ T9069] loop3: detected capacity change from 0 to 256 [ 124.390348][ T9069] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:54:57 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736616e0ca00088020000400000004f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x40042, 0x0) 21:54:57 executing program 1: set_mempolicy(0x3, &(0x7f0000000000)=0x1, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x2de1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 124.461635][ T1782] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 21:54:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) copy_file_range(r0, 0xfffffffffffffffc, r1, 0x0, 0x0, 0x0) 21:54:58 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 21:54:58 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 124.546916][ T9106] loop3: detected capacity change from 0 to 256 [ 124.563123][ T9106] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 124.624718][ T703] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 124.635769][ T9121] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 124.648959][ T1782] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 124.662019][ T703] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 124.673077][ T9127] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 21:55:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:55:00 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000080)="9e384171658e1d88"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:55:00 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x540c, 0x0) 21:55:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc04c5349, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{}, 'port0\x00'}) tkill(r1, 0x7) 21:55:00 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 21:55:00 executing program 2: prlimit64(0x0, 0x8, &(0x7f00000002c0), 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) dup2(r0, r1) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r1, 0x0) 21:55:00 executing program 3: mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={0x100002, 0x11}, 0x20) 21:55:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='size=8G']) 21:55:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @broadcast}, 0x10) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004600400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 127.403080][ T966] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 127.414337][ T9148] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 21:55:00 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) 21:55:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:55:00 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x0, 0x0) [ 127.457301][ T9164] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 127.479232][ T966] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 127.481836][ T9164] device lo entered promiscuous mode [ 127.491104][ T9171] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 [ 127.537394][ T966] blk_update_request: I/O error, dev loop1, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 127.549925][ T9178] isofs_fill_super: bread failed, dev=loop1, iso_blknum=16, block=32 21:55:03 executing program 4: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8, &(0x7f0000000080)="9e384171658e1d88"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:55:03 executing program 2: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000500)=[{}], 0x1, 0x10001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @empty}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x9000000c}) 21:55:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @broadcast}, 0x10) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004600400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 21:55:03 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x2) clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:55:03 executing program 5: r0 = epoll_create1(0x0) r1 = syz_io_uring_setup(0x240b, &(0x7f0000001740), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x60000007}) syz_io_uring_complete(r2) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)={0x80000031}) 21:55:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @broadcast}, 0x10) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004600400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) 21:55:03 executing program 0: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) read$usbmon(r0, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) [ 130.416139][ T9195] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 130.424464][ T9195] device lo left promiscuous mode [ 130.431768][ T9195] device lo entered promiscuous mode 21:55:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x20, 0x16, 0xa01, 0x0, 0x0, {0x2}, [@nested={0x4}, @nested={0x8, 0xa, 0x0, 0x1, [@generic="1221679b"]}]}, 0x20}}, 0x0) 21:55:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:55:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket(0x11, 0x800000003, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000400)={r6, 0x3, 0x6, @broadcast}, 0x10) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004600400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) [ 130.468527][ T9201] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 130.488411][ T9201] device lo left promiscuous mode [ 130.495876][ T9201] device lo entered promiscuous mode 21:55:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x7) 21:55:04 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x4000, @loopback}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x24}}}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 130.555765][ T9234] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 130.580521][ T9234] device lo left promiscuous mode [ 130.592837][ T9234] device lo entered promiscuous mode