0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000741300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:04 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x5}}]}) [ 1122.238958][T29082] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1122.247594][T29082] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1122.251428][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900007a1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1122.284712][T29087] UDF-fs: Scanning with blocksize 512 failed [ 1122.294500][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.311533][T29087] UDF-fs: Scanning with blocksize 1024 failed [ 1122.321824][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000a81300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1122.330789][T29087] UDF-fs: Scanning with blocksize 2048 failed [ 1122.337190][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.361818][T29087] UDF-fs: Scanning with blocksize 4096 failed 09:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1122.418713][T29082] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1122.427095][T29082] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1122.468571][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.476160][T29087] UDF-fs: Scanning with blocksize 512 failed [ 1122.490426][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.497828][T29087] UDF-fs: Scanning with blocksize 1024 failed 09:35:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000008}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x0, 0x40000007, 0xfffffffffffffffd, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r6, 0x4400ae8f, &(0x7f0000000380)={"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"}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:35:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000da1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1122.513738][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.524430][T29087] UDF-fs: Scanning with blocksize 2048 failed [ 1122.533826][T29087] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.545251][T29087] UDF-fs: Scanning with blocksize 4096 failed 09:35:05 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6}}]}) [ 1122.662276][T29122] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=416937225 (833874450 ns) > initial count (6366382 ns). Using initial count to start timer. [ 1122.687394][T29126] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=416937225 (833874450 ns) > initial count (6366382 ns). Using initial count to start timer. [ 1122.762100][T29134] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1122.775774][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.775804][T29134] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1122.798454][T29133] UDF-fs: Scanning with blocksize 512 failed [ 1122.807332][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.819284][T29133] UDF-fs: Scanning with blocksize 1024 failed [ 1122.868788][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.901805][T29133] UDF-fs: Scanning with blocksize 2048 failed [ 1122.925003][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1122.937156][T29133] UDF-fs: Scanning with blocksize 4096 failed [ 1123.018198][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.032584][T29133] UDF-fs: Scanning with blocksize 512 failed [ 1123.046101][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000fc1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:05 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000080)={0x1, [0x1]}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r2 = epoll_create1(0x0) read$FUSE(r1, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r2}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1123.066702][T29133] UDF-fs: Scanning with blocksize 1024 failed 09:35:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000140)) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x24201, 0x80}, 0x18) [ 1123.117604][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.151228][T29133] UDF-fs: Scanning with blocksize 2048 failed 09:35:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000fd1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1123.168192][T29133] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.231800][T29164] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1123.247429][T29164] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1123.262443][T29133] UDF-fs: Scanning with blocksize 4096 failed 09:35:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x5c, r2, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x31}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x34}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_PMKID={0x14, 0x55, "566835d21647f2bade161e83d8244f74"}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x200c0000) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:06 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7}}]}) [ 1123.442063][T29189] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1123.488202][T29189] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1123.514090][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.528501][T29196] UDF-fs: Scanning with blocksize 512 failed [ 1123.534899][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.547587][T29196] UDF-fs: Scanning with blocksize 1024 failed [ 1123.554770][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.562926][T29196] UDF-fs: Scanning with blocksize 2048 failed [ 1123.569587][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.577509][T29196] UDF-fs: Scanning with blocksize 4096 failed [ 1123.758226][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.772340][T29196] UDF-fs: Scanning with blocksize 512 failed [ 1123.801937][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.823438][T29196] UDF-fs: Scanning with blocksize 1024 failed [ 1123.846523][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x2000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1123.906739][T29196] UDF-fs: Scanning with blocksize 2048 failed 09:35:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001000034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) write$P9_RSYMLINK(r2, &(0x7f0000000080)={0x14, 0x11, 0x1, {0x40, 0x4, 0x3}}, 0x14) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000022c0)={@ipx={0x4, 0x5, 0x3, "fe20af18b5ec", 0x6}, {&(0x7f0000002200)=""/189, 0xbd}, &(0x7f0000000140), 0x55}, 0xa0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9020000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1123.948973][T29196] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1123.956346][T29196] UDF-fs: Scanning with blocksize 4096 failed 09:35:06 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x8}}]}) 09:35:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000007300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1124.034500][T29224] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1124.054534][T29224] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'erspan0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x10, 0x40, 0x8, 0x7, {{0x16, 0x4, 0x1, 0x8, 0x58, 0x64, 0x0, 0x8, 0x4, 0x0, @multicast1, @loopback, {[@rr={0x7, 0x17, 0x45, [@local, @rand_addr=0x64010101, @local, @broadcast, @local]}, @timestamp={0x44, 0x8, 0x17, 0x0, 0x7, [0x2]}, @timestamp_prespec={0x44, 0x14, 0x9, 0x3, 0x3, [{@private=0xa010101, 0x9}, {@multicast1, 0x9b}]}, @noop, @timestamp={0x44, 0xc, 0x9e, 0x0, 0x2, [0x9, 0x0]}, @end]}}}}}) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, 0x0, 0x103, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8001}, 0x4000010) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r7, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r9, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xa4, 0x0, 0x700, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0xf80}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x853}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x4}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20008080}, 0x48010) r10 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x402, 0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r0, &(0x7f0000000100)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) [ 1124.179441][T29222] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1124.203431][T29222] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1124.225133][T29237] UDF-fs: bad mount option "fileset=00000000000000000008" or missing value 09:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001304004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_SIOCDELRT(r1, 0x890c, &(0x7f0000000280)={0x0, @hci={0x1f, 0x4, 0x3}, @rc, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x33}}, 0x7, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)='veth0_to_bond\x00', 0x7, 0x88, 0xff}) r2 = epoll_create1(0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x200000, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) dup2(0xffffffffffffffff, r2) creat(&(0x7f0000000180)='./file0\x00', 0x40) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r3, &(0x7f00000036c0)={0x2020}, 0x2081) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r2}], 0x1, &(0x7f0000003680), 0x0, 0x0) [ 1124.390886][T29237] UDF-fs: bad mount option "fileset=00000000000000000008" or missing value [ 1124.394866][T29222] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013e8004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1124.433928][T29222] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x2400}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:07 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x9}}]}) 09:35:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013f0004700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) read$FUSE(r2, &(0x7f0000000140)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9bc47af, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1124.904692][T29285] UDF-fs: bad mount option "fileset=00000000000000000009" or missing value [ 1124.939082][T29289] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x2, 0x20) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000380)=@gcm_128={{0x303}, "eb7a9d538ba8ab5d", "5d6cac9f91d8bdb9d47ee4e0464e8326", "44efe61e", "e4e18d141b03e203"}, 0x28) r2 = epoll_create1(0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200000, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x5, 0x10002) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="77000000f3ac603d300e891adfe860b61745803bbae1dd9b82bc57f5eb512336e08521e1d70f681eeb92ad8c10eaf5f127de982fcfcd0102fed41fb169c37c77fba43afe541a65546a47ae407188bfbbe16695ea99656fb869464ba35354a5e9d0e0b8e72a069def97a99f86ae96298bd96527a054ebb84c4462fa"], &(0x7f0000000280)=0x7f) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000003c0)={r7, @in6={{0xa, 0x4e20, 0x7ad53cc4, @private1={0xfc, 0x1, [], 0x1}, 0xffffffff}}, 0x40, 0x9}, 0x90) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x189180, 0x0) read$FUSE(r8, &(0x7f00000036c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r10, 0xc05c5340, &(0x7f0000000140)={0xd6, 0x5, 0x8, {0x401, 0xffff}, 0xfffffffd, 0x772}) ppoll(&(0x7f0000003600)=[{r2}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130e014700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1124.967812][T29289] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200041, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x5, 0x7, 0x6}}, 0x28) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001302034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000140)={0x8000000c}) ppoll(&(0x7f0000000080)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) [ 1125.149522][T29285] UDF-fs: bad mount option "fileset=00000000000000000009" or missing value [ 1125.217775][T29289] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1125.233041][T29289] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x28ff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001303034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:08 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa}}]}) 09:35:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x36}}, @in6={0xa, 0x4e21, 0x7ff, @dev={0xfe, 0x80, [], 0x42}, 0xcf}, @in={0x2, 0x4e24, @local}], 0x3c) 09:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1125.844701][T29354] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1125.856642][T29354] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1125.882134][T29356] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001305034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1125.903522][T29356] UDF-fs: Scanning with blocksize 512 failed [ 1125.911126][T29356] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1125.918884][T29356] UDF-fs: Scanning with blocksize 1024 failed [ 1125.925143][T29356] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1125.932732][T29356] UDF-fs: Scanning with blocksize 2048 failed [ 1125.939080][T29356] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1125.946470][T29356] UDF-fs: Scanning with blocksize 4096 failed 09:35:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x101, 0x6, 0x4, 0x4000, 0xfffffffe, {r2, r3/1000+10000}, {0xd, 0xe, 0x3f, 0x3c, 0x1f, 0x6, "6b158c55"}, 0x6, 0x2, @offset=0x9, 0xffff, 0x0, r4}) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:08 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xb}}]}) [ 1126.069909][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.077742][T29385] UDF-fs: Scanning with blocksize 512 failed [ 1126.095218][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.106456][T29385] UDF-fs: Scanning with blocksize 1024 failed [ 1126.116020][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.126199][T29385] UDF-fs: Scanning with blocksize 2048 failed [ 1126.137350][T29389] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1126.145675][T29389] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1126.153856][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.170907][T29385] UDF-fs: Scanning with blocksize 4096 failed [ 1126.314031][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.322187][T29385] UDF-fs: Scanning with blocksize 512 failed [ 1126.336560][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.346861][T29385] UDF-fs: Scanning with blocksize 1024 failed [ 1126.358027][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.365461][T29385] UDF-fs: Scanning with blocksize 2048 failed [ 1126.376867][T29385] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.386211][T29385] UDF-fs: Scanning with blocksize 4096 failed 09:35:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x2ee0}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001306034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:09 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$DRM_IOCTL_MODE_GETGAMMA(0xffffffffffffffff, 0xc02064a4, &(0x7f0000000180)={0x800, 0x7, &(0x7f0000000000)=[0xde, 0x0, 0x4, 0x400, 0x6, 0x7, 0xdc], &(0x7f0000000080)=[0x1], &(0x7f0000000140)=[0x4, 0xf5, 0x906c, 0x101, 0x2, 0x8]}) ppoll(&(0x7f0000003600)=[{r1, 0x81}], 0x1, &(0x7f0000003680)={0x77359400}, 0x0, 0x0) 09:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xc000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:09 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc}}]}) 09:35:09 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000000)={0x7fffffff, 0x401}) write$binfmt_elf64(r0, &(0x7f0000002a40)=ANY=[@ANYBLOB="7f454c4603ff05061c0000000000000002003c000500000047020000000000004000000000000000e40200000000000000000100010438000100ff012000030006000000ff070000040000000000000002000000000000003f000000000000000180000000000000df0000000000000006000000000000000000007003000000d9eeffffffffffff0601000000000000feffffffffffffff0101000000000000010000000000000001000000000000008620047cec40b7f91febefdf45fdd65d640755940ffa8b042aa3b172d9bbce0c93756fb6cb7f628952bcb567bd3b4c95fad951c3053efd94627af9722c33447a7a8da5c36e898720606394c99f1066dba88a44f6099339000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cbc0c8dcc2c057e787d4d18474ff1700"/1814], 0x707) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000002940)='/dev/dsp1\x00', 0x800, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000002a00)={0x18, 0x0, 0x0, 0xfffffffd}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000002980)='/dev/full\x00', 0x208140, 0x0) ioctl$VIDIOC_G_CTRL(r4, 0xc008561b, &(0x7f00000029c0)={0x6, 0x5b9}) r5 = dup(r3) ioctl$MON_IOCG_STATS(r5, 0x80089203, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000140)={0x7, 0x2, 0x4, 0x4, 0xfff, {0x0, 0xea60}, {0x3, 0xc, 0x1f, 0x3, 0x2, 0xfe, "00000004"}, 0xc00000, 0x4, @offset, 0x4319, 0x0, r5}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_PREPARE(0xffffffffffffffff, 0x4140, 0x0) 09:35:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1126.777309][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.789328][T29421] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1126.800227][T29419] UDF-fs: Scanning with blocksize 512 failed 09:35:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001307034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1126.820554][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.835891][T29421] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1126.849465][T29419] UDF-fs: Scanning with blocksize 1024 failed [ 1126.872584][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1126.883679][T29419] UDF-fs: Scanning with blocksize 2048 failed [ 1126.896933][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:09 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) r2 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@alg, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000080), &(0x7f0000002200)=0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001308034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1126.931905][T29419] UDF-fs: Scanning with blocksize 4096 failed 09:35:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001309034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.060783][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.074096][T29419] UDF-fs: Scanning with blocksize 512 failed [ 1127.130249][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.156382][T29419] UDF-fs: Scanning with blocksize 1024 failed [ 1127.165673][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.176502][T29419] UDF-fs: Scanning with blocksize 2048 failed [ 1127.199420][T29419] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.206788][T29419] UDF-fs: Scanning with blocksize 4096 failed 09:35:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x3f00}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:10 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd}}]}) 09:35:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.603260][T29473] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1127.627553][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.633509][T29473] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130b034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.668082][T29475] UDF-fs: Scanning with blocksize 512 failed [ 1127.674237][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.683346][T29475] UDF-fs: Scanning with blocksize 1024 failed [ 1127.689551][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.696907][T29475] UDF-fs: Scanning with blocksize 2048 failed [ 1127.704944][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001304034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.719611][T29475] UDF-fs: Scanning with blocksize 4096 failed 09:35:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.836924][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.846059][T29473] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130d034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1127.912505][T29475] UDF-fs: Scanning with blocksize 512 failed [ 1127.940216][T29473] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1127.978221][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1127.993093][T29475] UDF-fs: Scanning with blocksize 1024 failed [ 1128.012092][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.032500][T29475] UDF-fs: Scanning with blocksize 2048 failed [ 1128.043467][T29475] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.055797][T29475] UDF-fs: Scanning with blocksize 4096 failed 09:35:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x4000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x2400}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:11 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe}}]}) [ 1128.470368][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.479556][T29528] UDF-fs: Scanning with blocksize 512 failed [ 1128.486308][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.498645][T29530] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1128.509816][T29528] UDF-fs: Scanning with blocksize 1024 failed 09:35:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130f034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1128.528430][T29530] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1128.546279][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.559683][T29528] UDF-fs: Scanning with blocksize 2048 failed [ 1128.566056][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.599236][T29530] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1128.607432][T29530] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1128.634190][T29528] UDF-fs: Scanning with blocksize 4096 failed 09:35:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001310034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1128.689117][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.701925][T29528] UDF-fs: Scanning with blocksize 512 failed [ 1128.709858][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.717229][T29528] UDF-fs: Scanning with blocksize 1024 failed [ 1128.723840][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.731631][T29528] UDF-fs: Scanning with blocksize 2048 failed 09:35:11 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf}}]}) 09:35:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1128.737901][T29528] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.745245][T29528] UDF-fs: Scanning with blocksize 4096 failed 09:35:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001311034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1128.940984][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.947170][T29573] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1128.948553][T29571] UDF-fs: Scanning with blocksize 512 failed [ 1128.957726][T29573] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1128.972094][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.981331][T29571] UDF-fs: Scanning with blocksize 1024 failed [ 1128.988294][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1128.995886][T29571] UDF-fs: Scanning with blocksize 2048 failed [ 1129.013992][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.023142][T29571] UDF-fs: Scanning with blocksize 4096 failed [ 1129.068808][T29573] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1129.077649][T29573] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1129.176740][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.188812][T29571] UDF-fs: Scanning with blocksize 512 failed [ 1129.203962][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.213777][T29571] UDF-fs: Scanning with blocksize 1024 failed [ 1129.220582][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.230009][T29571] UDF-fs: Scanning with blocksize 2048 failed [ 1129.236968][T29571] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.244644][T29571] UDF-fs: Scanning with blocksize 4096 failed 09:35:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x4102}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001312034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:12 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x10}}]}) 09:35:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001316034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1129.364299][T29596] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 1129.374131][T29592] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1129.389474][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.396822][T29603] UDF-fs: Scanning with blocksize 512 failed [ 1129.408801][T29592] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1129.420944][T29596] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 09:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1129.485170][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.502365][T29603] UDF-fs: Scanning with blocksize 1024 failed [ 1129.513169][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001317034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1129.533086][T29603] UDF-fs: Scanning with blocksize 2048 failed 09:35:12 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(0xffffffffffffffff, &(0x7f0000002200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x5c, r2, 0x4, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x31}}}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x34}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_PMKID={0x14, 0x55, "566835d21647f2bade161e83d8244f74"}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x200c0000) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) [ 1129.559097][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.572117][T29603] UDF-fs: Scanning with blocksize 4096 failed 09:35:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001318034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1129.759643][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.767021][T29603] UDF-fs: Scanning with blocksize 512 failed [ 1129.776965][T29636] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1129.786683][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.786688][T29603] UDF-fs: Scanning with blocksize 1024 failed [ 1129.786756][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.786760][T29603] UDF-fs: Scanning with blocksize 2048 failed [ 1129.786897][T29603] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1129.807850][T29636] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1129.827996][T29603] UDF-fs: Scanning with blocksize 4096 failed [ 1129.961311][T29636] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1129.971744][T29636] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000131c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:12 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x11}}]}) 09:35:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1130.278680][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.280161][T29664] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1130.286320][T29663] UDF-fs: Scanning with blocksize 512 failed [ 1130.312764][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000131e034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1130.324132][T29663] UDF-fs: Scanning with blocksize 1024 failed [ 1130.333808][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.344661][T29663] UDF-fs: Scanning with blocksize 2048 failed [ 1130.354930][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.403796][T29664] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1130.429962][T29663] UDF-fs: Scanning with blocksize 4096 failed 09:35:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001325034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfc000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1130.657504][T29664] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1130.669055][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.676417][T29663] UDF-fs: Scanning with blocksize 512 failed [ 1130.691742][T29664] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1130.701033][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.712633][T29663] UDF-fs: Scanning with blocksize 1024 failed [ 1130.719070][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.726460][T29663] UDF-fs: Scanning with blocksize 2048 failed [ 1130.734376][T29663] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1130.743412][T29663] UDF-fs: Scanning with blocksize 4096 failed 09:35:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5800}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001348034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000c1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x12000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:13 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x12}}]}) 09:35:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000134c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1131.102994][T29727] UDF-fs: bad mount option "fileset=00000000000000000018" or missing value [ 1131.118380][T29728] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1131.126532][T29728] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001360034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:14 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x25}}]}) [ 1131.269276][T29727] UDF-fs: bad mount option "fileset=00000000000000000018" or missing value [ 1131.282856][T29728] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1131.293694][T29728] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001368034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1131.475123][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.484303][T29770] UDF-fs: Scanning with blocksize 512 failed [ 1131.497582][T29775] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1131.505894][T29775] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1131.507089][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.541587][T29775] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1131.546036][T29770] UDF-fs: Scanning with blocksize 1024 failed [ 1131.551465][T29775] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1131.571980][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.582445][T29770] UDF-fs: Scanning with blocksize 2048 failed [ 1131.592022][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.602087][T29770] UDF-fs: Scanning with blocksize 4096 failed [ 1131.674678][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.692207][T29770] UDF-fs: Scanning with blocksize 512 failed [ 1131.717487][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.724883][T29770] UDF-fs: Scanning with blocksize 1024 failed [ 1131.739297][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.746659][T29770] UDF-fs: Scanning with blocksize 2048 failed [ 1131.761448][T29770] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1131.771840][T29770] UDF-fs: Scanning with blocksize 4096 failed 09:35:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x80fe}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000136c034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:14 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x48}}]}) 09:35:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1132.011596][T29802] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1132.013576][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.028235][T29802] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x202000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001374034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1132.059961][T29797] UDF-fs: Scanning with blocksize 512 failed [ 1132.066062][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.079775][T29797] UDF-fs: Scanning with blocksize 1024 failed [ 1132.086097][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000137a034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x25000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1132.171151][T29797] UDF-fs: Scanning with blocksize 2048 failed [ 1132.224194][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.257430][T29797] UDF-fs: Scanning with blocksize 4096 failed [ 1132.362164][T29827] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1132.372552][T29827] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1132.372631][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.437309][T29797] UDF-fs: Scanning with blocksize 512 failed [ 1132.443456][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.452231][T29797] UDF-fs: Scanning with blocksize 1024 failed [ 1132.458923][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.477317][T29797] UDF-fs: Scanning with blocksize 2048 failed [ 1132.483724][T29797] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.548685][T29797] UDF-fs: Scanning with blocksize 4096 failed 09:35:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x8c05}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013a8034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:15 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4c}}]}) 09:35:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013da034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1132.888835][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1132.896327][T29852] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1132.930886][T29852] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1132.949297][T29853] UDF-fs: Scanning with blocksize 512 failed [ 1132.959625][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013fc034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1133.068372][T29853] UDF-fs: Scanning with blocksize 1024 failed 09:35:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013fd034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1133.118999][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.145865][T29853] UDF-fs: Scanning with blocksize 2048 failed [ 1133.157461][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.165067][T29853] UDF-fs: Scanning with blocksize 4096 failed [ 1133.310785][T29889] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1133.334161][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.353351][T29889] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1133.368489][T29853] UDF-fs: Scanning with blocksize 512 failed 09:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1133.409400][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.449847][T29853] UDF-fs: Scanning with blocksize 1024 failed [ 1133.460497][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.472564][T29853] UDF-fs: Scanning with blocksize 2048 failed [ 1133.481740][T29853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1133.493140][T29853] UDF-fs: Scanning with blocksize 4096 failed 09:35:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xb804}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:16 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x5c}}]}) 09:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1133.737428][T29930] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1133.758425][T29930] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1133.773259][T29929] UDF-fs: bad mount option "fileset=00000000000000000092" or missing value 09:35:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) 09:35:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1133.786073][T29931] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1133.807316][T29931] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:16 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x60}}]}) [ 1133.950438][T29931] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1133.966755][T29931] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x40000800, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1133.997884][T29957] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1134.006635][T29957] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1134.116121][T29969] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1134.117162][T29967] UDF-fs: bad mount option "fileset=00000000000000000096" or missing value [ 1134.124537][T29969] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1134.153046][T29976] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1134.187397][T29976] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1134.317657][T29967] UDF-fs: bad mount option "fileset=00000000000000000096" or missing value [ 1134.326807][T29969] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1134.341833][T29969] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xe02e}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:17 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x68}}]}) 09:35:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4180a000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1134.616846][T30010] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1134.630295][T30010] UDF-fs: Scanning with blocksize 512 failed [ 1134.636424][T30010] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1134.653342][T30010] UDF-fs: Scanning with blocksize 1024 failed [ 1134.666792][T30009] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1134.666979][T30010] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1134.680392][T30009] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1134.694666][T30010] UDF-fs: Scanning with blocksize 2048 failed [ 1134.706329][T30010] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1134.724321][T30010] UDF-fs: Scanning with blocksize 4096 failed 09:35:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') 09:35:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:17 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6c}}]}) [ 1134.814138][T30032] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1134.822720][T30009] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1134.846122][T30009] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1134.853964][T30032] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1134.984811][T30042] UDF-fs: bad mount option "fileset=00000000000000000108" or missing value [ 1135.128682][T30042] UDF-fs: bad mount option "fileset=00000000000000000108" or missing value [ 1135.150190][T30062] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1135.175456][T30062] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1135.248806][T30061] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1135.277005][T30061] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfc00}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:18 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x74}}]}) 09:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x902000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1135.537849][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.553042][T30085] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1135.559828][T30083] UDF-fs: Scanning with blocksize 512 failed [ 1135.562541][T30085] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 09:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9bc47af00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x52020000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1135.613578][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.652210][T30083] UDF-fs: Scanning with blocksize 1024 failed [ 1135.673151][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.693909][T30083] UDF-fs: Scanning with blocksize 2048 failed [ 1135.703605][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300024700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1135.724153][T30083] UDF-fs: Scanning with blocksize 4096 failed [ 1135.767675][T30112] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1135.775821][T30112] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1135.930121][T30112] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1135.938321][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.945676][T30083] UDF-fs: Scanning with blocksize 512 failed [ 1135.954252][T30112] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1135.964266][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.971970][T30083] UDF-fs: Scanning with blocksize 1024 failed [ 1135.979224][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1135.988469][T30083] UDF-fs: Scanning with blocksize 2048 failed [ 1136.001613][T30083] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.013210][T30083] UDF-fs: Scanning with blocksize 4096 failed 09:35:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfe80}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300044700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:19 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7a}}]}) [ 1136.390924][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.415076][T30152] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300054700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1136.441975][T30149] UDF-fs: Scanning with blocksize 512 failed [ 1136.466429][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.474155][T30149] UDF-fs: Scanning with blocksize 1024 failed [ 1136.480608][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) 09:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300064700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1136.488091][T30149] UDF-fs: Scanning with blocksize 2048 failed [ 1136.489660][T30152] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1136.514914][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300074700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300084700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1136.607412][T30149] UDF-fs: Scanning with blocksize 4096 failed 09:35:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1136.734260][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.759316][T30149] UDF-fs: Scanning with blocksize 512 failed [ 1136.792340][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.804933][T30149] UDF-fs: Scanning with blocksize 1024 failed [ 1136.820618][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.832603][T30149] UDF-fs: Scanning with blocksize 2048 failed [ 1136.841881][T30149] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1136.853229][T30149] UDF-fs: Scanning with blocksize 4096 failed 09:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300094700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:20 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf2}}]}) 09:35:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff00}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000a4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1137.331543][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.340700][T30218] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1137.341910][T30216] UDF-fs: Scanning with blocksize 512 failed [ 1137.360689][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.365437][T30218] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000b4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000c4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000d4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1137.462201][T30216] UDF-fs: Scanning with blocksize 1024 failed [ 1137.496656][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000e4700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1137.524703][T30216] UDF-fs: Scanning with blocksize 2048 failed [ 1137.536267][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.547606][T30216] UDF-fs: Scanning with blocksize 4096 failed [ 1137.692999][T30245] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1137.701548][T30245] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1137.701587][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1137.742490][T30216] UDF-fs: Scanning with blocksize 512 failed [ 1137.754252][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.766919][T30216] UDF-fs: Scanning with blocksize 1024 failed [ 1137.775001][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.783972][T30216] UDF-fs: Scanning with blocksize 2048 failed [ 1137.790274][T30216] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1137.801723][T30216] UDF-fs: Scanning with blocksize 4096 failed [ 1137.827337][T30245] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1137.835813][T30245] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:20 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x10e}}]}) [ 1138.049191][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.056982][T30278] UDF-fs: Scanning with blocksize 512 failed [ 1138.063265][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.079208][T30278] UDF-fs: Scanning with blocksize 1024 failed [ 1138.085624][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff0f}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300104700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1138.097350][T30278] UDF-fs: Scanning with blocksize 2048 failed [ 1138.103586][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.118497][T30278] UDF-fs: Scanning with blocksize 4096 failed [ 1138.190919][T30293] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1138.191396][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.213711][T30278] UDF-fs: Scanning with blocksize 512 failed [ 1138.216718][T30293] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1138.230718][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000}, 0x1c) 09:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300114700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1138.238648][T30278] UDF-fs: Scanning with blocksize 1024 failed [ 1138.245197][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.256416][T30278] UDF-fs: Scanning with blocksize 2048 failed [ 1138.263811][T30278] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.273039][T30278] UDF-fs: Scanning with blocksize 4096 failed 09:35:21 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x204}}]}) 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300124700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1138.366767][T30293] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1138.379014][T30293] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034702bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1138.517142][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.528042][T30319] UDF-fs: Scanning with blocksize 512 failed [ 1138.534234][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.546017][T30319] UDF-fs: Scanning with blocksize 1024 failed [ 1138.569357][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.606643][T30319] UDF-fs: Scanning with blocksize 2048 failed [ 1138.613239][T30332] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1138.613981][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034703bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1138.629735][T30319] UDF-fs: Scanning with blocksize 4096 failed [ 1138.657918][T30332] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1138.780409][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.780432][T30332] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1138.787832][T30319] UDF-fs: Scanning with blocksize 512 failed [ 1138.797081][T30332] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1138.821224][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.846640][T30319] UDF-fs: Scanning with blocksize 1024 failed [ 1138.852917][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.868256][T30319] UDF-fs: Scanning with blocksize 2048 failed [ 1138.874477][T30319] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1138.899307][T30319] UDF-fs: Scanning with blocksize 4096 failed 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034704bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1139.034522][T30360] validate_nla: 17 callbacks suppressed [ 1139.034570][T30360] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.078859][T30360] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.117224][T30362] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) 09:35:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff28}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:21 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x300}}]}) 09:35:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034705bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1139.129819][T30362] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034706bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1139.190026][T30362] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1139.198840][T30381] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.202659][T30362] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1139.211579][T30381] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.307191][T30383] UDF-fs: bad mount option "fileset=00000000000000000768" or missing value 09:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1139.399354][T30398] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.425729][T30398] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034707bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1139.446332][T30383] UDF-fs: bad mount option "fileset=00000000000000000768" or missing value 09:35:22 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x30d}}]}) 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034708bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1139.524099][T30406] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1139.526355][T30412] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.545538][T30412] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.549954][T30406] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1139.608524][T30414] UDF-fs: bad mount option "fileset=00000000000000000781" or missing value [ 1139.656943][T30424] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.669845][T30424] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1139.684061][T30414] UDF-fs: bad mount option "fileset=00000000000000000781" or missing value [ 1139.693193][T30406] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1139.703479][T30406] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x50000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034709bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:22 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x402}}]}) 09:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1140.062467][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.070370][T30456] UDF-fs: Scanning with blocksize 512 failed [ 1140.083253][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.085072][T30459] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1140.098540][T30456] UDF-fs: Scanning with blocksize 1024 failed [ 1140.105307][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470bbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1140.119677][T30456] UDF-fs: Scanning with blocksize 2048 failed [ 1140.126431][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.129788][T30459] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1140.151009][T30456] UDF-fs: Scanning with blocksize 4096 failed 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470dbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1140.365587][T30459] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1140.375153][T30459] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1140.407434][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.428727][T30456] UDF-fs: Scanning with blocksize 512 failed [ 1140.445721][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.464831][T30456] UDF-fs: Scanning with blocksize 1024 failed [ 1140.474846][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.498116][T30456] UDF-fs: Scanning with blocksize 2048 failed [ 1140.504404][T30456] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.518721][T30456] UDF-fs: Scanning with blocksize 4096 failed 09:35:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x100000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:23 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x406}}]}) 09:35:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xad010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1140.967695][T30528] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1140.977245][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1140.984802][T30526] UDF-fs: Scanning with blocksize 512 failed [ 1140.994757][T30528] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003470fbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.021974][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4180a00000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xaf47bc09, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034710bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.064031][T30526] UDF-fs: Scanning with blocksize 1024 failed [ 1141.073603][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1141.084445][T30526] UDF-fs: Scanning with blocksize 2048 failed [ 1141.094617][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1141.105871][T30526] UDF-fs: Scanning with blocksize 4096 failed 09:35:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034711bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.273243][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1141.288566][T30526] UDF-fs: Scanning with blocksize 512 failed [ 1141.312328][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034712bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.326105][T30526] UDF-fs: Scanning with blocksize 1024 failed [ 1141.339944][T30557] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1141.351997][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1141.353085][T30557] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1141.360901][T30526] UDF-fs: Scanning with blocksize 2048 failed [ 1141.375337][T30526] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1141.386763][T30526] UDF-fs: Scanning with blocksize 4096 failed 09:35:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x1000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf6010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034716bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:24 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x500}}]}) 09:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034717bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.845245][T30588] UDF-fs: bad mount option "fileset=00000000000000001280" or missing value 09:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1141.889805][T30592] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1141.921520][T30588] UDF-fs: bad mount option "fileset=00000000000000001280" or missing value 09:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034718bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1141.970578][T30592] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003471cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:24 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x600}}]}) 09:35:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5202000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1142.166497][T30592] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1142.199163][T30592] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1142.235638][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.243706][T30622] UDF-fs: Scanning with blocksize 512 failed [ 1142.252603][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.260345][T30622] UDF-fs: Scanning with blocksize 1024 failed [ 1142.266858][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.274244][T30622] UDF-fs: Scanning with blocksize 2048 failed [ 1142.280727][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.289408][T30622] UDF-fs: Scanning with blocksize 4096 failed [ 1142.383730][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.406295][T30622] UDF-fs: Scanning with blocksize 512 failed [ 1142.433636][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.446293][T30622] UDF-fs: Scanning with blocksize 1024 failed [ 1142.452586][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.461583][T30622] UDF-fs: Scanning with blocksize 2048 failed [ 1142.469308][T30622] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1142.481315][T30622] UDF-fs: Scanning with blocksize 4096 failed 09:35:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x2000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003471ebb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:25 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x604}}]}) 09:35:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034725bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1142.699454][T30648] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1142.715848][T30648] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1142.729563][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.741074][T30649] UDF-fs: Scanning with blocksize 512 failed 09:35:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034748bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1142.762007][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.770908][T30649] UDF-fs: Scanning with blocksize 1024 failed [ 1142.802150][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.812449][T30649] UDF-fs: Scanning with blocksize 2048 failed [ 1142.820773][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.829896][T30649] UDF-fs: Scanning with blocksize 4096 failed 09:35:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003474cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1142.929112][T30648] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1142.957908][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1142.965272][T30649] UDF-fs: Scanning with blocksize 512 failed [ 1142.966707][T30648] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034760bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1143.009978][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.030450][T30649] UDF-fs: Scanning with blocksize 1024 failed [ 1143.045705][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.075193][T30649] UDF-fs: Scanning with blocksize 2048 failed [ 1143.086054][T30649] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.114141][T30681] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1143.124550][T30649] UDF-fs: Scanning with blocksize 4096 failed [ 1143.129492][T30681] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1143.347719][T30681] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1143.358439][T30681] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x3000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034768bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:26 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x700}}]}) 09:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003476cbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034774bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1143.588026][T30719] UDF-fs: bad mount option "fileset=00000000000000001792" or missing value [ 1143.597065][T30718] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1143.620004][T30718] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="39000000130003477abb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:26 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x900}}]}) [ 1143.691094][T30719] UDF-fs: bad mount option "fileset=00000000000000001792" or missing value [ 1143.700605][T30718] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1143.714089][T30718] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000347a8bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1143.908163][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.918952][T30752] UDF-fs: Scanning with blocksize 512 failed [ 1143.956342][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.971045][T30752] UDF-fs: Scanning with blocksize 1024 failed [ 1143.982179][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1143.993056][T30752] UDF-fs: Scanning with blocksize 2048 failed [ 1144.003671][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.014422][T30752] UDF-fs: Scanning with blocksize 4096 failed 09:35:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfd010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1144.103170][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.112423][T30752] UDF-fs: Scanning with blocksize 512 failed [ 1144.140557][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.166123][T30764] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1144.174159][T30752] UDF-fs: Scanning with blocksize 1024 failed [ 1144.174624][T30764] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1144.199512][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.219412][T30752] UDF-fs: Scanning with blocksize 2048 failed [ 1144.231818][T30764] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1144.236756][T30752] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.240253][T30764] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1144.263943][T30752] UDF-fs: Scanning with blocksize 4096 failed 09:35:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x4000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000347dabb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:27 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa00}}]}) 09:35:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000347fcbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1144.441115][T30783] validate_nla: 48 callbacks suppressed [ 1144.441123][T30783] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.469249][T30783] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.518701][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.526167][T30787] UDF-fs: Scanning with blocksize 512 failed [ 1144.529532][T30785] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1144.532220][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.547875][T30787] UDF-fs: Scanning with blocksize 1024 failed [ 1144.556949][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.571395][T30787] UDF-fs: Scanning with blocksize 2048 failed [ 1144.577789][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.585228][T30787] UDF-fs: Scanning with blocksize 4096 failed [ 1144.586775][T30785] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1144.596451][T30800] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.611852][T30800] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900000013000347fdbb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1144.699337][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.708454][T30787] UDF-fs: Scanning with blocksize 512 failed [ 1144.714663][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.723824][T30787] UDF-fs: Scanning with blocksize 1024 failed [ 1144.733347][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.741914][T30812] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.747441][T30785] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1144.749999][T30787] UDF-fs: Scanning with blocksize 2048 failed [ 1144.764925][T30812] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.773203][T30787] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1144.786785][T30787] UDF-fs: Scanning with blocksize 4096 failed 09:35:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb0ae1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1144.803416][T30785] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:27 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xb00}}]}) [ 1144.888204][T30821] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1144.902402][T30821] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1145.046863][T30826] UDF-fs: bad mount option "fileset=00000000000000002816" or missing value [ 1145.108692][T30826] UDF-fs: bad mount option "fileset=00000000000000002816" or missing value 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb25e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc00}}]}) 09:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x5000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e43d0006000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.326493][T30856] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1145.335475][T30856] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e43e0006000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.382942][T30854] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1145.393263][T30853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1145.397077][T30854] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1145.402906][T30853] UDF-fs: Scanning with blocksize 512 failed 09:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1145.452429][T30853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1145.473535][T30853] UDF-fs: Scanning with blocksize 1024 failed 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e46f0006000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.505859][T30853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1145.529984][T30853] UDF-fs: Scanning with blocksize 2048 failed 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e43dff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.549522][T30854] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1145.570840][T30853] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1145.578408][T30854] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xad01000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e43eff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.626663][T30853] UDF-fs: Scanning with blocksize 4096 failed 09:35:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd00}}]}) 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e46fff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1145.844119][T30902] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1145.854234][T30902] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1145.876408][T30907] UDF-fs: bad mount option "fileset=00000000000000003328" or missing value [ 1145.970756][T30902] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1145.979392][T30907] UDF-fs: bad mount option "fileset=00000000000000003328" or missing value [ 1145.988101][T30902] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x6000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf601000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd03}}]}) 09:35:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1146.175098][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.183877][T30932] UDF-fs: Scanning with blocksize 512 failed [ 1146.194847][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.202511][T30936] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ff3d06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1146.225008][T30936] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1146.238021][T30932] UDF-fs: Scanning with blocksize 1024 failed [ 1146.244298][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.255608][T30932] UDF-fs: Scanning with blocksize 2048 failed [ 1146.265685][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.281232][T30932] UDF-fs: Scanning with blocksize 4096 failed [ 1146.354029][T30936] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1146.378522][T30936] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ff3e06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1146.406875][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.421445][T30932] UDF-fs: Scanning with blocksize 512 failed [ 1146.435684][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.444303][T30932] UDF-fs: Scanning with blocksize 1024 failed 09:35:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ff6f06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1146.453025][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.460518][T30932] UDF-fs: Scanning with blocksize 2048 failed [ 1146.466804][T30932] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1146.474181][T30932] UDF-fs: Scanning with blocksize 4096 failed 09:35:29 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe00}}]}) [ 1146.640569][T30975] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1146.649144][T30975] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1146.718479][T30980] UDF-fs: bad mount option "fileset=00000000000000003584" or missing value [ 1146.737838][T30975] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1146.751907][T30975] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1146.826588][T30980] UDF-fs: bad mount option "fileset=00000000000000003584" or missing value 09:35:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x7000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4fffe06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:29 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe01}}]}) 09:35:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff05000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1147.041722][T31005] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1147.053067][T31011] UDF-fs: bad mount option "fileset=00000000000000003585" or missing value [ 1147.062184][T31005] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff09000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:30 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf00}}]}) [ 1147.189767][T31011] UDF-fs: bad mount option "fileset=00000000000000003585" or missing value [ 1147.202505][T31005] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1147.225818][T31005] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff1c000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1147.363925][T31040] UDF-fs: bad mount option "fileset=00000000000000003840" or missing value [ 1147.418369][T31040] UDF-fs: bad mount option "fileset=00000000000000003840" or missing value [ 1147.540726][T31049] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1147.570990][T31049] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x8000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff81ffffff010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfd01000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:30 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x1020}}]}) 09:35:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000004000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1148.027101][T31073] UDF-fs: bad mount option "fileset=00000000000000004128" or missing value 09:35:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06020000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1148.068123][T31072] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1148.092568][T31072] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06030000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1148.224298][T31073] UDF-fs: bad mount option "fileset=00000000000000004128" or missing value [ 1148.227865][T31072] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x1100}}]}) [ 1148.285704][T31072] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1148.480011][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.508309][T31114] UDF-fs: Scanning with blocksize 512 failed [ 1148.516996][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.525142][T31114] UDF-fs: Scanning with blocksize 1024 failed [ 1148.531603][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.539234][T31114] UDF-fs: Scanning with blocksize 2048 failed [ 1148.545586][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.553855][T31114] UDF-fs: Scanning with blocksize 4096 failed [ 1148.638845][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.646394][T31114] UDF-fs: Scanning with blocksize 512 failed [ 1148.652720][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.660206][T31114] UDF-fs: Scanning with blocksize 1024 failed [ 1148.667413][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.674802][T31114] UDF-fs: Scanning with blocksize 2048 failed 09:35:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x9000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06040000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1148.682476][T31114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1148.690141][T31114] UDF-fs: Scanning with blocksize 4096 failed 09:35:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x1200}}]}) 09:35:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06050000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1148.804269][T31134] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1148.813256][T31134] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06060000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06070000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1148.920389][T31148] UDF-fs: bad mount option "fileset=00000000000000004608" or missing value [ 1148.923008][T31134] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1148.953634][T31134] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2000}}]}) 09:35:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1149.181551][T31176] UDF-fs: bad mount option "fileset=00000000000000008192" or missing value [ 1149.237424][T31175] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1149.247334][T31175] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1149.376252][T31176] UDF-fs: bad mount option "fileset=00000000000000008192" or missing value 09:35:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xa000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06080000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:32 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2010}}]}) 09:35:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1149.701221][T31202] validate_nla: 44 callbacks suppressed [ 1149.701227][T31202] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1149.724856][T31202] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1149.738140][T31200] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06090000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1149.747455][T31201] UDF-fs: bad mount option "fileset=00000000000000008208" or missing value [ 1149.749453][T31200] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1149.878361][T31201] UDF-fs: bad mount option "fileset=00000000000000008208" or missing value 09:35:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1149.921494][T31225] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1149.931164][T31225] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1149.981243][T31231] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1150.004155][T31231] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1150.090004][T31231] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1150.098992][T31231] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xf000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:33 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2500}}]}) 09:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1150.656561][T31259] UDF-fs: bad mount option "fileset=00000000000000009472" or missing value [ 1150.667253][T31264] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1150.675100][T31261] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1150.689786][T31261] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1150.691884][T31264] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:33 executing program 0: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060b0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1150.798932][T31259] UDF-fs: bad mount option "fileset=00000000000000009472" or missing value [ 1150.858420][T31284] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:33 executing program 0: r0 = getpid() rt_tgsigqueueinfo(0x0, r0, 0x13, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1150.905857][T31284] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1150.981195][T31288] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1150.991355][T31288] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x10000120}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:34 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x3f00}}]}) 09:35:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:34 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x13, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1151.502270][T31317] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1151.512012][T31315] UDF-fs: bad mount option "fileset=00000000000000016128" or missing value [ 1151.535055][T31317] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:34 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000100)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060d0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1151.548598][T31324] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1151.561451][T31324] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:34 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4000}}]}) 09:35:34 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 1151.618285][T31315] UDF-fs: bad mount option "fileset=00000000000000016128" or missing value 09:35:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060e0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060f0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1151.733081][T31324] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1151.764442][T31324] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1151.807352][T31350] UDF-fs: bad mount option "fileset=00000000000000016384" or missing value [ 1151.992600][T31350] UDF-fs: bad mount option "fileset=00000000000000016384" or missing value 09:35:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x18020000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06100000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:35 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:35 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4800}}]}) 09:35:35 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06110000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1152.382887][T31375] UDF-fs: bad mount option "fileset=00000000000000018432" or missing value 09:35:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06120000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1152.468969][T31375] UDF-fs: bad mount option "fileset=00000000000000018432" or missing value [ 1152.477778][T31384] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1152.495602][T31384] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:35 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06160000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1152.648394][T31384] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1152.685329][T31384] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x20000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:35 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4c00}}]}) 09:35:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06170000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:35 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 09:35:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:36 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 09:35:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06180000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:36 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 09:35:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff061c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1153.275730][T31434] UDF-fs: bad mount option "fileset=00000000000000019456" or missing value [ 1153.307937][T31437] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1153.316990][T31437] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff061e0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1153.460527][T31434] UDF-fs: bad mount option "fileset=00000000000000019456" or missing value [ 1153.496660][T31437] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1153.509416][T31437] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x20010010}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:36 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000), 0x1c) 09:35:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06250000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:36 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x5c00}}]}) 09:35:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1154.104347][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.121830][T31494] UDF-fs: Scanning with blocksize 512 failed [ 1154.136618][T31502] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06480000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1154.148320][T31502] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1154.148398][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.167201][T31494] UDF-fs: Scanning with blocksize 1024 failed [ 1154.174607][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.184781][T31494] UDF-fs: Scanning with blocksize 2048 failed [ 1154.191473][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:37 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000), 0x1c) 09:35:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff064c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1154.204762][T31494] UDF-fs: Scanning with blocksize 4096 failed 09:35:37 executing program 0: getpid() rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000), 0x1c) [ 1154.306510][T31502] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1154.321147][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.333990][T31494] UDF-fs: Scanning with blocksize 512 failed [ 1154.336529][T31502] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1154.349600][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.362300][T31494] UDF-fs: Scanning with blocksize 1024 failed [ 1154.388803][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06600000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1154.405097][T31494] UDF-fs: Scanning with blocksize 2048 failed [ 1154.411624][T31494] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.421626][T31494] UDF-fs: Scanning with blocksize 4096 failed 09:35:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x24000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xf000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:37 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6000}}]}) 09:35:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06680000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1154.956636][T31553] validate_nla: 30 callbacks suppressed [ 1154.956642][T31553] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1154.961356][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.963502][T31553] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1154.972042][T31552] UDF-fs: Scanning with blocksize 512 failed [ 1154.992483][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1154.993164][T31556] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1155.000291][T31552] UDF-fs: Scanning with blocksize 1024 failed [ 1155.021445][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.022133][T31556] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1155.029171][T31552] UDF-fs: Scanning with blocksize 2048 failed [ 1155.044801][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff066c0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1155.053216][T31552] UDF-fs: Scanning with blocksize 4096 failed 09:35:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1155.135317][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.147602][T31552] UDF-fs: Scanning with blocksize 512 failed [ 1155.158467][T31577] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.170286][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.178358][T31577] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.188396][T31552] UDF-fs: Scanning with blocksize 1024 failed [ 1155.215018][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.222395][T31552] UDF-fs: Scanning with blocksize 2048 failed 09:35:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06740000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1155.249510][T31556] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1155.266827][T31556] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1155.323235][T31552] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1155.364988][T31552] UDF-fs: Scanning with blocksize 4096 failed [ 1155.382059][T31595] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.396187][T31595] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.535840][T31603] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1155.546022][T31603] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1155.638488][T31603] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1155.647200][T31603] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x28ff0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:38 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6800}}]}) 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067a0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfc000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:38 executing program 0: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2000}}]}) [ 1155.817044][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.825222][T31630] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.835901][T31627] UDF-fs: Scanning with blocksize 512 failed [ 1155.843689][T31633] UDF-fs: bad mount option "fileset=00000000000000008192" or missing value [ 1155.853814][T31631] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06a80000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1155.856859][T31630] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1155.870630][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.880881][T31631] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1155.890941][T31627] UDF-fs: Scanning with blocksize 1024 failed [ 1155.901924][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.910058][T31627] UDF-fs: Scanning with blocksize 2048 failed [ 1155.923593][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1155.933208][T31627] UDF-fs: Scanning with blocksize 4096 failed 09:35:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06da0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1156.007467][T31650] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1156.016340][T31650] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06fc0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1156.105471][T31631] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1156.118393][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1156.130187][T31627] UDF-fs: Scanning with blocksize 512 failed [ 1156.130973][T31631] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1156.176509][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1156.183875][T31627] UDF-fs: Scanning with blocksize 1024 failed 09:35:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06fd0000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1156.219370][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1156.231066][T31627] UDF-fs: Scanning with blocksize 2048 failed [ 1156.240197][T31627] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1156.252182][T31627] UDF-fs: Scanning with blocksize 4096 failed 09:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff066a0100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:39 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6c00}}]}) 09:35:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x3f000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff066c0100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1156.714445][T31702] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1156.723886][T31703] UDF-fs: bad mount option "fileset=00000000000000027648" or missing value [ 1156.734144][T31702] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x1000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06700100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1156.867507][T31703] UDF-fs: bad mount option "fileset=00000000000000027648" or missing value 09:35:39 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7400}}]}) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06800100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1156.993016][T31728] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1157.001344][T31728] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06840100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1157.080457][T31736] UDF-fs: bad mount option "fileset=00000000000000029696" or missing value [ 1157.118270][T31728] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x404, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06ea0100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1157.132981][T31728] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x202000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1157.191709][T31736] UDF-fs: bad mount option "fileset=00000000000000029696" or missing value [ 1157.288573][T31764] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1157.297216][T31764] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:40 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7a00}}]}) 09:35:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x405, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x40000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1157.599411][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.607993][T31783] UDF-fs: Scanning with blocksize 512 failed [ 1157.614250][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.630540][T31783] UDF-fs: Scanning with blocksize 1024 failed [ 1157.639349][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.650487][T31783] UDF-fs: Scanning with blocksize 2048 failed [ 1157.672052][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) 09:35:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067e0200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff068e0200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1157.705806][T31783] UDF-fs: Scanning with blocksize 4096 failed 09:35:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x406, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1157.829947][T31795] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1157.833207][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.849267][T31795] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06920200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1157.894752][T31783] UDF-fs: Scanning with blocksize 512 failed [ 1157.924745][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.932142][T31783] UDF-fs: Scanning with blocksize 1024 failed [ 1157.954671][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.967935][T31783] UDF-fs: Scanning with blocksize 2048 failed [ 1157.974184][T31783] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1157.988374][T31783] UDF-fs: Scanning with blocksize 4096 failed 09:35:40 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xedc0}}]}) 09:35:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x407, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06940200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1158.091176][T31795] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1158.101711][T31795] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1158.254789][T31823] UDF-fs: bad mount option "fileset=00000000000000060864" or missing value 09:35:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x41020000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1158.409468][T31823] UDF-fs: bad mount option "fileset=00000000000000060864" or missing value 09:35:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff0f}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06240300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x408, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1158.525450][T31841] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:41 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf200}}]}) [ 1158.570917][T31841] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06390300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06560300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1158.738984][T31869] UDF-fs: bad mount option "fileset=00000000000000061952" or missing value 09:35:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x409, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1158.820312][T31869] UDF-fs: bad mount option "fileset=00000000000000061952" or missing value [ 1158.830802][T31881] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1158.841378][T31881] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06c60300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1158.985396][T31881] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1158.993780][T31881] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x50000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:42 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfeff}}]}) 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06f60300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1159.267943][T31914] UDF-fs: bad mount option "fileset=00000000000000065279" or missing value [ 1159.346980][T31914] UDF-fs: bad mount option "fileset=00000000000000065279" or missing value 09:35:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x41020000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40a, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06fa0300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:42 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xff0f}}]}) 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1159.487853][T31933] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1159.501102][T31933] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1159.565176][T31937] UDF-fs: bad mount option "fileset=00000000000000065295" or missing value 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1159.655587][T31937] UDF-fs: bad mount option "fileset=00000000000000065295" or missing value [ 1159.760837][T31963] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1159.783873][T31963] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1159.953008][T31963] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1159.972789][T31963] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x58000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40b, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1160.141814][T31984] validate_nla: 46 callbacks suppressed [ 1160.141822][T31984] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1160.181722][T31984] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:43 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffe}}]}) 09:35:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40c, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1160.319727][T32006] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1160.350028][T32006] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000b00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1160.370317][T32008] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 1160.385857][T32000] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1160.392029][T32008] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1160.403641][T32000] UDF-fs: Scanning with blocksize 512 failed [ 1160.403738][T32001] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1160.434416][T32001] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1160.442630][T32000] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1160.459837][T32016] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1160.469734][T32000] UDF-fs: Scanning with blocksize 1024 failed [ 1160.471807][T32016] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390001ea1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1160.486985][T32000] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1160.514547][T32000] UDF-fs: Scanning with blocksize 2048 failed [ 1160.521171][T32000] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1160.537305][T32000] UDF-fs: Scanning with blocksize 4096 failed 09:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40d, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1160.634323][T32001] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1160.643377][T32001] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1160.715813][T32029] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1160.739818][T32029] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:43 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x59f4b48a}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:43 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x20000}}]}) 09:35:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390001ea1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000d00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40e, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1161.043862][T32053] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1161.048954][T32055] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1161.061046][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390001ea1300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1161.092995][T32053] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1161.121658][T32051] UDF-fs: Scanning with blocksize 512 failed [ 1161.139469][T32055] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1161.148213][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.155833][T32051] UDF-fs: Scanning with blocksize 1024 failed [ 1161.163311][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.171193][T32051] UDF-fs: Scanning with blocksize 2048 failed 09:35:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:44 executing program 0: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0xfdffffff00000000, &(0x7f00000022c0)={[{@fileset={'fileset'}}]}) 09:35:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1161.188606][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.203068][T32051] UDF-fs: Scanning with blocksize 4096 failed 09:35:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40f, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1161.410266][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.420778][T32051] UDF-fs: Scanning with blocksize 512 failed [ 1161.458802][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.480126][T32051] UDF-fs: Scanning with blocksize 1024 failed [ 1161.496050][T32088] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1161.504194][T32088] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1161.518390][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.525929][T32051] UDF-fs: Scanning with blocksize 2048 failed [ 1161.532443][T32051] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.541158][T32051] UDF-fs: Scanning with blocksize 4096 failed [ 1161.644175][T32088] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1161.661731][T32088] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:44 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x8ab4f459}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:44 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x40000}}]}) 09:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x416, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1161.880260][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.914434][T32114] UDF-fs: Scanning with blocksize 512 failed 09:35:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1161.933325][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.954372][T32114] UDF-fs: Scanning with blocksize 1024 failed [ 1161.978090][T32121] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 1161.987996][T32120] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1161.991840][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1161.996199][T32120] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1162.010517][T32121] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 09:35:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1300, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06fb1200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1162.042771][T32114] UDF-fs: Scanning with blocksize 2048 failed [ 1162.062176][T32120] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1162.071240][T32120] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x902000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1162.089395][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1162.113206][T32114] UDF-fs: Scanning with blocksize 4096 failed 09:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1162.265761][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1162.285063][T32114] UDF-fs: Scanning with blocksize 512 failed [ 1162.300942][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1162.311502][T32114] UDF-fs: Scanning with blocksize 1024 failed [ 1162.317921][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1162.326078][T32114] UDF-fs: Scanning with blocksize 2048 failed [ 1162.332290][T32157] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1162.332381][T32114] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1162.348172][T32114] UDF-fs: Scanning with blocksize 4096 failed [ 1162.356992][T32157] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1162.512319][T32157] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1162.525810][T32157] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:45 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x8c050000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:45 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x60000}}]}) 09:35:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2600, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x9bc47af00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1162.797534][T32179] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1162.810877][T32180] UDF-fs: bad mount option "fileset=00000000000000393216" or missing value [ 1162.812859][T32179] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1162.946565][T32180] UDF-fs: bad mount option "fileset=00000000000000393216" or missing value 09:35:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:45 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x80000}}]}) [ 1163.135636][T32213] UDF-fs: bad mount option "fileset=00000000000000524288" or missing value [ 1163.234390][T32213] UDF-fs: bad mount option "fileset=00000000000000524288" or missing value 09:35:46 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x8dffffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x27d1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06002000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:35:46 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x80040}}]}) 09:35:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06032400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1163.646747][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1163.684766][T32241] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1163.693572][T32235] UDF-fs: Scanning with blocksize 512 failed [ 1163.697056][T32241] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1163.740186][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1163.748033][T32235] UDF-fs: Scanning with blocksize 1024 failed [ 1163.756847][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1163.764655][T32235] UDF-fs: Scanning with blocksize 2048 failed [ 1163.770842][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1163.780331][T32241] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06002500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1163.788676][T32241] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1163.814320][T32235] UDF-fs: Scanning with blocksize 4096 failed 09:35:46 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1163.932871][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1163.946597][T32235] UDF-fs: Scanning with blocksize 512 failed [ 1163.982301][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.016165][T32235] UDF-fs: Scanning with blocksize 1024 failed [ 1164.026420][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.033791][T32235] UDF-fs: Scanning with blocksize 2048 failed [ 1164.040678][T32269] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1164.051472][T32269] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1164.066479][T32235] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.075830][T32235] UDF-fs: Scanning with blocksize 4096 failed [ 1164.143896][T32269] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1164.156921][T32269] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06033900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2802, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:47 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa0000}}]}) 09:35:47 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0x91ffffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1164.546894][T32295] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1164.563810][T32295] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1164.575006][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.585058][T32298] UDF-fs: Scanning with blocksize 512 failed [ 1164.591854][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.600948][T32298] UDF-fs: Scanning with blocksize 1024 failed [ 1164.608952][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.616670][T32298] UDF-fs: Scanning with blocksize 2048 failed [ 1164.623340][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.631261][T32298] UDF-fs: Scanning with blocksize 4096 failed 09:35:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06003f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1164.641040][T32295] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1164.649376][T32295] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1164.739254][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1164.793256][T32298] UDF-fs: Scanning with blocksize 512 failed [ 1164.817970][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06884700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1164.837432][T32318] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1164.844164][T32298] UDF-fs: Scanning with blocksize 1024 failed [ 1164.860631][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1164.868169][T32318] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1164.892293][T32298] UDF-fs: Scanning with blocksize 2048 failed 09:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1164.957691][T32298] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1165.014163][T32298] UDF-fs: Scanning with blocksize 4096 failed 09:35:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:47 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1165.134204][T32333] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1165.151525][T32333] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1165.177046][T32341] validate_nla: 34 callbacks suppressed [ 1165.177053][T32341] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1165.198918][T32341] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1165.280644][T32333] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1165.301918][T32333] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xb8040000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:48 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc0000}}]}) 09:35:48 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06884800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1165.409070][T32362] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1165.434840][T32362] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:48 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1165.455063][T32359] UDF-fs: bad mount option "fileset=00000000000000786432" or missing value 09:35:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1165.517181][T32372] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1165.528996][T32359] UDF-fs: bad mount option "fileset=00000000000000786432" or missing value [ 1165.546320][T32372] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:48 executing program 0: r0 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6400, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06035600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1165.572875][T32380] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1165.604276][T32380] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1165.643864][T32388] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1165.661381][T32388] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:48 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe0000}}]}) [ 1165.804585][T32398] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1165.813707][T32397] UDF-fs: bad mount option "fileset=00000000000000917504" or missing value [ 1165.831471][T32398] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1165.929152][T32397] UDF-fs: bad mount option "fileset=00000000000000917504" or missing value [ 1165.996008][T32398] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1166.008749][T32398] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:48 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xe02e0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06655800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:48 executing program 0: r0 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:48 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x400000}}]}) 09:35:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:49 executing program 0: r0 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1166.261428][T32428] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1166.272103][T32427] UDF-fs: bad mount option "fileset=00000000000004194304" or missing value [ 1166.291958][T32428] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1166.339010][T32430] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1166.352288][T32427] UDF-fs: bad mount option "fileset=00000000000004194304" or missing value [ 1166.372467][T32430] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06586500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1166.539500][T32430] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1166.574754][T32430] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:49 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xe0ffffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:49 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x1000000}}]}) 09:35:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:49 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffffffffff, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1167.181241][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.189101][T32477] UDF-fs: Scanning with blocksize 512 failed [ 1167.189210][T32478] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1167.204854][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06016a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1167.227503][T32478] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1167.234500][T32477] UDF-fs: Scanning with blocksize 1024 failed [ 1167.261049][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.331985][T32477] UDF-fs: Scanning with blocksize 2048 failed [ 1167.382351][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.403581][T32477] UDF-fs: Scanning with blocksize 4096 failed 09:35:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1167.426032][T32478] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:35:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1167.464646][T32478] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1167.604348][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.625982][T32477] UDF-fs: Scanning with blocksize 512 failed [ 1167.697683][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.741502][T32477] UDF-fs: Scanning with blocksize 1024 failed [ 1167.771480][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.796916][T32510] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1167.808419][T32477] UDF-fs: Scanning with blocksize 2048 failed [ 1167.817815][T32510] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1167.827295][T32477] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1167.839088][T32477] UDF-fs: Scanning with blocksize 4096 failed 09:35:50 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xf5ffffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:50 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x10e0000}}]}) 09:35:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06016c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1168.047304][T32526] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1168.063080][T32526] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1168.079763][T32533] UDF-fs: bad mount option "fileset=00000000000017694720" or missing value 09:35:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88807ce31118, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:50 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06017000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:51 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1168.214453][T32533] UDF-fs: bad mount option "fileset=00000000000017694720" or missing value [ 1168.223274][T32526] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1168.243250][T32526] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:51 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:51 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfc000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:51 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2000000}}]}) 09:35:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06027e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:51 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1168.842558][T32577] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1168.851414][T32577] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1168.855926][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1168.871669][T32582] UDF-fs: Scanning with blocksize 512 failed [ 1168.877926][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1168.886803][T32582] UDF-fs: Scanning with blocksize 1024 failed [ 1168.893017][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1168.900519][T32582] UDF-fs: Scanning with blocksize 2048 failed [ 1168.909035][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1168.916436][T32582] UDF-fs: Scanning with blocksize 4096 failed [ 1168.989039][T32577] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1168.997267][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1169.010597][T32582] UDF-fs: Scanning with blocksize 512 failed [ 1169.023966][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1169.026974][T32577] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1169.102732][T32582] UDF-fs: Scanning with blocksize 1024 failed [ 1169.120063][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1169.139245][T32582] UDF-fs: Scanning with blocksize 2048 failed 09:35:51 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88807e1e9698, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:51 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06018400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1169.153461][T32582] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1169.163975][T32582] UDF-fs: Scanning with blocksize 4096 failed 09:35:52 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2040000}}]}) [ 1169.285404][T32607] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1169.293590][T32607] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1169.411910][T32618] UDF-fs: bad mount option "fileset=00000000000033816576" or missing value [ 1169.423665][T32607] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1169.460612][T32607] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:52 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfe800000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:52 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06478800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:52 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x3000000}}]}) 09:35:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x2e00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:52 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1169.757599][T32640] UDF-fs: bad mount option "fileset=00000000000050331648" or missing value [ 1169.782534][T32641] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1169.790949][T32641] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1169.824139][T32640] UDF-fs: bad mount option "fileset=00000000000050331648" or missing value [ 1169.935798][T32641] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1169.948981][T32641] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06488800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:52 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:52 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4000000}}]}) 09:35:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:53 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1170.192160][T32668] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1170.203723][T32672] validate_nla: 26 callbacks suppressed [ 1170.203729][T32672] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1170.229087][T32669] UDF-fs: bad mount option "fileset=00000000000067108864" or missing value [ 1170.241490][T32668] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1170.284278][T32672] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1170.341646][T32669] UDF-fs: bad mount option "fileset=00000000000067108864" or missing value [ 1170.362883][T32668] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1170.395805][T32668] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:53 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfe80ffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:53 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06028e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:53 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x5000000}}]}) 09:35:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1170.615300][T32698] UDF-fs: bad mount option "fileset=00000000000083886080" or missing value [ 1170.631461][T32703] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1170.664231][T32700] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1170.739330][T32703] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1170.753240][T32700] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:53 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1170.878135][T32700] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1170.907251][T32700] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="0a0000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:53 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6000000}}]}) 09:35:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06029200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:53 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:53 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1171.138540][T32730] UDF-fs: bad mount option "fileset=00000000000100663296" or missing value [ 1171.142412][T32733] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1171.173554][T32733] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1171.234401][T32730] UDF-fs: bad mount option "fileset=00000000000100663296" or missing value [ 1171.243476][T32735] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1171.251964][T32735] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:54 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfec0ffff}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06029400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:54 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:54 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6040000}}]}) 09:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="0b0000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1171.388391][T32735] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1171.408606][T32735] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4180a00000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:54 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600a800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1171.490447][T32765] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1171.491758][T32764] UDF-fs: bad mount option "fileset=00000000000100925440" or missing value [ 1171.509225][T32765] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:54 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7000000}}]}) 09:35:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="250000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1171.607661][ T306] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1171.618051][ T306] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1171.640389][ T316] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:54 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0603c600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1171.714073][ T316] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1171.761569][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1171.776132][ T306] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1171.787080][ T306] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1171.787873][ T324] UDF-fs: Scanning with blocksize 512 failed [ 1171.833656][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1171.841118][ T324] UDF-fs: Scanning with blocksize 1024 failed [ 1171.854083][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1171.861495][ T324] UDF-fs: Scanning with blocksize 2048 failed [ 1171.921974][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1171.932733][ T324] UDF-fs: Scanning with blocksize 4096 failed [ 1172.010187][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1172.017910][ T324] UDF-fs: Scanning with blocksize 512 failed [ 1172.032674][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1172.043720][ T324] UDF-fs: Scanning with blocksize 1024 failed [ 1172.050322][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1172.081930][ T324] UDF-fs: Scanning with blocksize 2048 failed [ 1172.091032][ T324] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1172.099185][ T324] UDF-fs: Scanning with blocksize 4096 failed 09:35:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff000000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:55 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="290000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600da00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:55 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x8000000}}]}) 09:35:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0601ea00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200200000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1172.395791][ T363] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1172.417685][ T369] UDF-fs: bad mount option "fileset=00000000000134217728" or missing value 09:35:55 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200300000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1172.446912][ T363] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0603f600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:55 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) [ 1172.693464][ T369] UDF-fs: bad mount option "fileset=00000000000134217728" or missing value 09:35:55 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff0f0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0603fa00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:55 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 09:35:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:55 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x9000000}}]}) 09:35:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200400000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0612fb00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 09:35:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fc00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1173.206777][ T414] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1173.221539][ T417] UDF-fs: bad mount option "fileset=00000000000150994944" or missing value [ 1173.232632][ T414] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fd00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) [ 1173.368454][ T417] UDF-fs: bad mount option "fileset=00000000000150994944" or missing value 09:35:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200500000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1173.426427][ T414] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1173.484365][ T414] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:56 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffff0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:56 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x9bc47af}}]}) 09:35:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600ff00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 09:35:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5202000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200600000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 09:35:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000020000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1174.125065][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.132863][ T481] UDF-fs: Scanning with blocksize 512 failed [ 1174.143958][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.155480][ T481] UDF-fs: Scanning with blocksize 1024 failed 09:35:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200700000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff0f0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1174.179745][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.187930][ T481] UDF-fs: Scanning with blocksize 2048 failed [ 1174.188027][ T483] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1174.217028][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200800000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1174.247230][ T483] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1174.256689][ T481] UDF-fs: Scanning with blocksize 4096 failed 09:35:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000030000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1174.371339][ T483] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1174.384783][ T483] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1174.401205][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.411509][ T481] UDF-fs: Scanning with blocksize 512 failed [ 1174.443531][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.450888][ T481] UDF-fs: Scanning with blocksize 1024 failed [ 1174.465100][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.472890][ T481] UDF-fs: Scanning with blocksize 2048 failed [ 1174.481690][ T481] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1174.489379][ T481] UDF-fs: Scanning with blocksize 4096 failed 09:35:57 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffff80fe}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000040000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:57 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa000000}}]}) 09:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200900000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000050000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xff0f0000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200a00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1174.993212][ T538] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1175.001400][ T538] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1175.015926][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.023309][ T537] UDF-fs: Scanning with blocksize 512 failed [ 1175.029481][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.071582][ T537] UDF-fs: Scanning with blocksize 1024 failed 09:35:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000060000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1175.113414][ T538] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1175.114816][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.129585][ T537] UDF-fs: Scanning with blocksize 2048 failed [ 1175.138015][ T538] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000070000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1175.156712][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.166927][ T537] UDF-fs: Scanning with blocksize 4096 failed 09:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1175.254382][ T574] validate_nla: 28 callbacks suppressed [ 1175.254417][ T574] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.278576][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.278847][ T574] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000080000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1175.321156][ T537] UDF-fs: Scanning with blocksize 512 failed [ 1175.338199][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.347912][ T537] UDF-fs: Scanning with blocksize 1024 failed [ 1175.358447][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.369518][ T537] UDF-fs: Scanning with blocksize 2048 failed [ 1175.375814][ T537] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1175.381105][ T581] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.383306][ T537] UDF-fs: Scanning with blocksize 4096 failed [ 1175.401067][ T581] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.542036][ T588] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1175.558657][ T588] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:58 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffffc0fe}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200b00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000a0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:58 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xb000000}}]}) 09:35:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000b0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1175.806812][ T607] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.822879][ T610] UDF-fs: bad mount option "fileset=00000000000184549376" or missing value [ 1175.840641][ T607] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:35:58 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200c00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1175.882855][ T625] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.883639][ T615] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1175.891662][ T625] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1175.911059][ T615] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000c0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xb8040000}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1175.970522][ T610] UDF-fs: bad mount option "fileset=00000000000184549376" or missing value 09:35:58 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc000000}}]}) 09:35:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200d00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1176.093943][ T615] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1176.102648][ T615] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1176.143535][ T644] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1176.176741][ T644] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1176.306460][ T649] UDF-fs: bad mount option "fileset=00000000000201326592" or missing value [ 1176.454108][ T649] UDF-fs: bad mount option "fileset=00000000000201326592" or missing value 09:35:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000d0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200e00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:59 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffffff8d}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:35:59 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd000000}}]}) 09:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200f00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1176.690831][ T679] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1176.715739][ T682] UDF-fs: bad mount option "fileset=00000000000218103808" or missing value [ 1176.729476][ T679] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000f0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000100000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06003f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="201000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1176.865487][ T682] UDF-fs: bad mount option "fileset=00000000000218103808" or missing value [ 1176.874205][ T679] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1176.882343][ T679] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:35:59 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:35:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:35:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000120000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:35:59 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd030000}}]}) 09:35:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000130000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1177.111191][ T723] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1177.121226][ T723] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1177.123046][ T720] UDF-fs: bad mount option "fileset=00000000000218300416" or missing value [ 1177.142471][ T731] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1177.164203][ T731] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1177.278669][ T720] UDF-fs: bad mount option "fileset=00000000000218300416" or missing value [ 1177.282731][ T723] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1177.297850][ T723] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:00 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffffff91}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:00 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000140000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="201100000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:00 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe000000}}]}) 09:36:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:00 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1177.643581][ T758] UDF-fs: bad mount option "fileset=00000000000234881024" or missing value [ 1177.648960][ T760] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1177.678559][ T760] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000150000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="201200000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:00 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1177.835016][ T758] UDF-fs: bad mount option "fileset=00000000000234881024" or missing value 09:36:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000160000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:00 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1177.905980][ T760] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1177.914869][ T760] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xffffffe0}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:01 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf000000}}]}) 09:36:01 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="202500000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000170000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:01 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000001a0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1178.442199][ T811] UDF-fs: bad mount option "fileset=00000000000251658240" or missing value 09:36:01 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1178.498033][ T811] UDF-fs: bad mount option "fileset=00000000000251658240" or missing value [ 1178.506794][ T818] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1178.537737][ T818] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:01 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x10000000}}]}) 09:36:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000001c0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="202e00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1178.729055][ T818] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1178.738942][ T818] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1178.815552][ T850] UDF-fs: bad mount option "fileset=00000000000268435456" or missing value [ 1178.938761][ T850] UDF-fs: bad mount option "fileset=00000000000268435456" or missing value 09:36:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802, @rand_addr, 0xfffffff5}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:02 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000001d0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="204800000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:02 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x11000000}}]}) 09:36:02 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:36:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000001e0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:02 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) [ 1179.353458][ T887] UDF-fs: bad mount option "fileset=00000000000285212672" or missing value [ 1179.366859][ T881] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1179.386157][ T881] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000200000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="204c00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1179.465291][ T887] UDF-fs: bad mount option "fileset=00000000000285212672" or missing value 09:36:02 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x12000000}}]}) [ 1179.514891][ T881] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1179.524212][ T881] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1179.644535][ T922] UDF-fs: bad mount option "fileset=00000000000301989888" or missing value [ 1179.715011][ T922] UDF-fs: bad mount option "fileset=00000000000301989888" or missing value 09:36:02 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x2) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:02 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:36:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000210000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:02 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x20000000}}]}) 09:36:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="205c00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000250000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="206000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1180.187503][ T952] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1180.200835][ T952] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1180.222989][ T955] UDF-fs: bad mount option "fileset=00000000000536870912" or missing value 09:36:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067ffffff20000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1180.380923][ T952] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1180.390206][ T955] UDF-fs: bad mount option "fileset=00000000000536870912" or missing value 09:36:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1180.422637][ T952] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1180.448091][ T981] validate_nla: 33 callbacks suppressed [ 1180.448096][ T981] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x18) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="206800000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xad01000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067ffffff80000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:03 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x20100000}}]}) 09:36:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1181.016984][ T1007] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1181.023018][ T1014] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1181.028157][ T1007] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1181.036130][ T1014] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:03 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067ffffff90000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1181.064506][ T1012] UDF-fs: bad mount option "fileset=00000000000537919488" or missing value [ 1181.106344][ T1012] UDF-fs: bad mount option "fileset=00000000000537919488" or missing value 09:36:04 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x25000000}}]}) [ 1181.217894][ T1032] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1181.248761][ T1032] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="206c00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1181.266046][ T1007] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1181.289932][ T1007] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff067fffffff0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1181.343532][ T1038] UDF-fs: bad mount option "fileset=00000000000620756992" or missing value [ 1181.430525][ T1050] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1181.442527][ T1038] UDF-fs: bad mount option "fileset=00000000000620756992" or missing value [ 1181.482836][ T1050] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x20b64000) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf601000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:04 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x3f000000}}]}) 09:36:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="207400000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000300010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1181.855518][ T1084] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1181.867241][ T1084] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1181.885451][ T1078] UDF-fs: bad mount option "fileset=00000000001056964608" or missing value [ 1181.939025][ T1082] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1181.952753][ T1082] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1182.021733][ T1101] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="207a00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:04 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1182.069883][ T1082] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1182.091830][ T1082] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1182.124263][ T1078] UDF-fs: bad mount option "fileset=00000000001056964608" or missing value 09:36:05 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/479], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0xffffffb9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r1}) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000600)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000180)=""/46, 0x84) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) 09:36:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:05 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x40000000}}]}) 09:36:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20fc00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1182.735782][ T1147] UDF-fs: bad mount option "fileset=00000000001073741824" or missing value [ 1182.743058][ T1145] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1182.758991][ T1145] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20ad01000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:05 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1182.853413][ T1147] UDF-fs: bad mount option "fileset=00000000001073741824" or missing value 09:36:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:06 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x40000800}}]}) 09:36:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20f601000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:06 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/425], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000900010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1183.561040][ T1194] UDF-fs: bad mount option "fileset=00000000001073743872" or missing value 09:36:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20fd01000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1183.682422][ T1200] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1183.690588][ T1200] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1183.710700][ T1194] UDF-fs: bad mount option "fileset=00000000001073743872" or missing value 09:36:06 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x48000000}}]}) 09:36:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1183.845793][ T1200] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1183.860597][ T1200] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000b00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:06 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) [ 1183.977070][ T1234] UDF-fs: bad mount option "fileset=00000000001207959552" or missing value [ 1184.111422][ T1250] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1184.119631][ T1250] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1184.182821][ T1250] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1184.191278][ T1250] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:07 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000180)=""/72, 0x48}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) clone3(&(0x7f0000001680)={0x203007200, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) 09:36:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200202000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:07 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4c000000}}]}) 09:36:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:36:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfd01000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000d00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1184.414585][ T1275] UDF-fs: bad mount option "fileset=00000000001275068416" or missing value 09:36:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:36:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1184.462540][ T1278] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1184.477650][ T1278] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:07 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 09:36:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000f00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:07 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x5c000000}}]}) [ 1184.620065][ T1278] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1184.635098][ T1278] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1184.655476][ T1308] UDF-fs: bad mount option "fileset=00000000001543503872" or missing value [ 1184.783932][ T1308] UDF-fs: bad mount option "fileset=00000000001543503872" or missing value 09:36:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf4, 0x0, 0x10000}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000000)=""/34, 0xfffffffffffffff5) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200402000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 09:36:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:08 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x60000000}}]}) 09:36:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, 0x0) 09:36:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001100010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1185.272852][ T1329] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1185.276409][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.290325][ T1329] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1185.312866][ T1328] UDF-fs: Scanning with blocksize 512 failed [ 1185.335492][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.342902][ T1328] UDF-fs: Scanning with blocksize 1024 failed [ 1185.349084][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200902000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1185.387908][ T1329] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1185.395057][ T1328] UDF-fs: Scanning with blocksize 2048 failed [ 1185.411086][ T1329] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1185.430740][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found 09:36:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001200010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) [ 1185.453316][ T1328] UDF-fs: Scanning with blocksize 4096 failed 09:36:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1185.508081][ T1360] validate_nla: 29 callbacks suppressed [ 1185.508088][ T1360] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1185.535540][ T1360] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1185.547907][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.560240][ T1328] UDF-fs: Scanning with blocksize 512 failed [ 1185.582520][ T1368] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1185.603786][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.621180][ T1368] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1185.624262][ T1328] UDF-fs: Scanning with blocksize 1024 failed [ 1185.663558][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.671007][ T1328] UDF-fs: Scanning with blocksize 2048 failed [ 1185.679884][ T1328] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1185.687600][ T1328] UDF-fs: Scanning with blocksize 4096 failed [ 1185.703138][ T1368] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1185.711766][ T1368] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:08 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="205202000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 09:36:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001600010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:08 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x68000000}}]}) 09:36:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:08 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) [ 1186.133137][ T1397] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.143518][ T1397] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.161068][ T1398] UDF-fs: bad mount option "fileset=00000000001744830464" or missing value 09:36:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001700010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1186.178696][ T1401] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1186.199655][ T1401] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x2) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200003000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1186.286625][ T1418] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.319482][ T1418] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1186.382240][ T1398] UDF-fs: bad mount option "fileset=00000000001744830464" or missing value [ 1186.430235][ T1432] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.440787][ T1432] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.522454][ T1438] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1186.530777][ T1438] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1186.632956][ T1438] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1186.642229][ T1438] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:09 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f0000000180)={0x0, 0x7fffffff, 0x8}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:09 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6c000000}}]}) 09:36:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200204000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xfffbffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1186.980896][ T1462] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1186.995942][ T1462] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200604000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06001e00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06002500010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1187.027532][ T1466] UDF-fs: bad mount option "fileset=00000000001811939328" or missing value [ 1187.036525][ T1470] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1187.067130][ T1470] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="202e00000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:09 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1187.229484][ T1470] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1187.231965][ T1466] UDF-fs: bad mount option "fileset=00000000001811939328" or missing value [ 1187.237831][ T1470] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1187.487558][ T1512] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1187.500829][ T1512] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1187.559330][ T1512] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1187.574484][ T1512] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000df6b7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04109586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125ff0300000effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c50000000000000000000000000000db1f0ebc66358855fe98de3c8227f9b41858b2e27ffa04dd62255f8d8adc2558f5d2e3df765adce862d9600242a12a1a58ce64da7f7e4b48c2945cd40e9b371046824f"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xff, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {0x4}, 0x0, 0x0, 0x0, 0x0}, 0x58) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000150000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:10 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x74000000}}]}) 09:36:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="201004000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000130000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1187.890782][ T1530] UDF-fs: bad mount option "fileset=00000000001946157056" or missing value [ 1187.908493][ T1536] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1187.929011][ T1536] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006c00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:10 executing program 0: ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000002200)=ANY=[@ANYBLOB="06000000b70000005970aec2ab3ee8bffad62095ed056e689ce49c8c8e53df49944951c8eda424134c00664d7414d5e83e7ec01c60a504102cfe7a7ca0cfa2c72a37242fe166810edf421762684b22c5aa428374ada3b129d29913a04a03b0529866dcdcbd090ba6ebd0eb5bb961f314ea6e2b3a7446b8f7bcf3f3d9901160d5a7e749382ba8cada545e1b3b6f02d7f74a3f6d9f91481102c58e5656d375123a41a2ee5ae5f4452b9cad012a9623e9a1136824145e12c7a500000000000000"]) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1}], 0x1, &(0x7f0000003680), 0x0, 0x0) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x3e07, 0x2b}}}}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x82) [ 1187.945600][ T1548] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:36:10 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/422], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200005000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:10 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) syz_usb_connect$cdc_ncm(0x3, 0x9a, &(0x7f00000022c0)={{0x12, 0x1, 0x110, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x88, 0x2, 0x1, 0xc3, 0xd0, 0x3f, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "577ddf4f"}, {0x5, 0x24, 0x0, 0x8}, {0xd, 0x24, 0xf, 0x1, 0x7, 0x1, 0x40, 0x5c}, {0x6, 0x24, 0x1a, 0x1ff, 0xe85d675503cdeed}, [@mdlm={0x15}, @obex={0x5, 0x24, 0x15, 0xf919}, @network_terminal={0x7, 0x24, 0xa, 0xd8, 0x7, 0x7f, 0xcb}, @dmm={0x7, 0x24, 0x14, 0x9, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x7f, 0x2}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x5, 0x6}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x1, 0x3f, 0x5}}}}}}}]}}, &(0x7f0000002480)={0xa, &(0x7f0000002380)={0xa, 0x6, 0x250, 0x2, 0x3f, 0xf9, 0x20, 0x4}, 0x5, &(0x7f00000023c0)={0x5, 0xf, 0x5}, 0x2, [{0x4, &(0x7f0000002400)=@lang_id={0x4, 0x3, 0x40b}}, {0x4, &(0x7f0000002440)=@lang_id={0x4, 0x3, 0x83e}}]}) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, &(0x7f0000002280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000002200)={0x50, r1, 0x800, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7ff, 0x73}}}}, [@NL80211_ATTR_PMK={0x14, 0xfe, "b06aa8d321eca692fbaf21fd4e2fc2d0"}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x8}, @NL80211_ATTR_MAC={0xa, 0x6, @random="39beb115747b"}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x24}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000040}, 0x8000) r4 = epoll_create1(0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x101040, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r5, 0x4018f50b, &(0x7f0000000140)={0xffffffff, 0x40000000fffffffd, 0x80000003}) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r4}], 0x1, &(0x7f0000003680), 0x0, 0x0) 09:36:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007400010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1188.054189][ T1530] UDF-fs: bad mount option "fileset=00000000001946157056" or missing value [ 1188.063684][ T1536] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1188.080369][ T1536] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:11 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7a000000}}]}) 09:36:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007a00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600a800010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1188.385074][ T1582] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1188.415685][ T1582] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200006000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600da00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1188.433123][ T1592] UDF-fs: bad mount option "fileset=00000000002046820352" or missing value [ 1188.471836][T27015] usb 1-1: new high-speed USB device number 13 using dummy_hcd 09:36:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fc00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:11 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x8cffffff}}]}) [ 1188.577827][ T1582] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1188.577832][ T1592] UDF-fs: bad mount option "fileset=00000000002046820352" or missing value [ 1188.644863][ T1582] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1188.731883][T27015] usb 1-1: Using ep0 maxpacket: 32 [ 1188.761913][ T1616] UDF-fs: bad mount option "fileset=00000000002365587455" or missing value 09:36:11 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fd00010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1188.883281][T27015] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1188.894864][T27015] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 8 [ 1188.900276][ T1616] UDF-fs: bad mount option "fileset=00000000002365587455" or missing value [ 1188.906848][T27015] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 64 [ 1189.133305][T27015] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1189.142568][T27015] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1189.150742][T27015] usb 1-1: Product: syz [ 1189.164900][T27015] usb 1-1: Manufacturer: à ¾ [ 1189.173535][T27015] usb 1-1: SerialNumber: syz [ 1189.553186][T27015] cdc_ncm 1-1:1.0: bind() failure [ 1189.560936][T27015] cdc_ncm 1-1:1.1: bind() failure [ 1189.570693][T27015] usb 1-1: USB disconnect, device number 13 09:36:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x1200, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200406000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006a01010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:12 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x97ffffff}}]}) 09:36:12 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ptrace(0x4208, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) 09:36:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006c01010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1190.071841][ T1683] UDF-fs: bad mount option "fileset=00000000002550136831" or missing value [ 1190.073789][ T1680] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1190.099342][ T1689] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 09:36:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200007000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007001010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1190.115896][ T1689] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 1190.128705][ T1683] UDF-fs: bad mount option "fileset=00000000002550136831" or missing value [ 1190.150228][ T1680] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390025001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:13 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xaf47bc09}}]}) 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008001010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1190.369702][ T1680] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1190.397386][ T1680] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008401010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1190.524441][ T1722] UDF-fs: bad mount option "fileset=00000000002940713993" or missing value 09:36:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200009000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1190.602367][ T1730] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1190.615878][ T1730] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1190.627525][ T1735] validate_nla: 36 callbacks suppressed [ 1190.627532][ T1735] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1190.652400][ T1735] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600ea01010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:13 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) read$FUSE(r0, &(0x7f00000001c0)={0x2020}, 0x2020) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffffa, 0x400100) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x10}) syz_usbip_server_init(0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r1, 0xb3c5}], 0x2000001f, &(0x7f0000003680), 0x0, 0x0) syz_io_uring_setup(0x87, &(0x7f0000000180), &(0x7f0000ee8000/0x3000)=nil, &(0x7f00006d4000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000580)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x4}, 0x0) r4 = syz_io_uring_setup(0x58e5, &(0x7f00000000c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ee9000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r5, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x0, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000002200)={0x0, 0x7, 0x9, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f0000002600)={r6, 0x5, 0x1, [0x1620000000000000, 0xfa8, 0x1ff, 0x133, 0xf0b6], [0x9, 0xffffffff, 0x3, 0x8000, 0xfffffffffffffff7, 0x0, 0x7fffffff, 0x800, 0x1f, 0x0, 0x6, 0x7, 0xfffffffffffffffd, 0x40, 0x4, 0xffff, 0x100000, 0x2e43cf30, 0x1c, 0x7, 0xfffffffffffffffa, 0x0, 0x96, 0x380b, 0x8, 0x1ff, 0x5, 0x2, 0x4, 0x0, 0x2583, 0x3, 0x400, 0x3, 0x3ff, 0xffffffff, 0x3ff, 0x1, 0x9, 0x9, 0x2, 0x0, 0x4, 0x1, 0x228b, 0x0, 0x6, 0x8, 0xfca, 0xff, 0xfffffffffffffffe, 0x8, 0x8, 0x9, 0x3ff, 0x8, 0xffffffffffffff01, 0xd67, 0x7ff, 0x37, 0x5, 0x2, 0x0, 0x8, 0x972, 0x80000001, 0x7, 0x3, 0x9, 0x7, 0x0, 0x1ff, 0x80000001, 0x6474, 0xb12a, 0x100000000, 0x401, 0xfffffffffffffffa, 0x9, 0xfffffffffffffe00, 0x4, 0xfffffffffffffbff, 0x8000, 0x2, 0x7f, 0xfffffffffffeffff, 0x5, 0x8001, 0x0, 0x2, 0xa6c4, 0x10000, 0x2cd, 0x80000001, 0x8, 0x1f, 0x3, 0x4f20, 0x0, 0x15, 0x3, 0x10ce722, 0x10001, 0x7, 0x1, 0x6e, 0x7f, 0x6, 0x40, 0x7ff, 0x4, 0x8, 0xffffffff7fffffff, 0x9aa9, 0x1, 0x1, 0xfcea, 0x7, 0x8, 0xa4f, 0x8]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$snapshot(r8, &(0x7f0000002a40)="c2c62140e1378086a3886d72b141c4f6d938685a1b2fc1af64f0c09ff56e1b54e0bfa7d5ae2ea8bb650b3d8918ceb6a6197324893aba579907a23076b92f94940f850fc85c105a594342c827ee8aa69746f86a29a2676e574dbed04f01d5a1aee65615fd", 0x64) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x2004, @fd=r0, 0x93b, 0xffffffff, 0x5, 0x1, 0x1, {0x1}}, 0xfffff1d0) [ 1190.694386][ T1730] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1190.703782][ T1722] UDF-fs: bad mount option "fileset=00000000002940713993" or missing value [ 1190.720321][ T1730] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1190.739786][ T1748] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1190.749915][ T1748] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1190.776602][ T1752] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(5) [ 1190.783112][ T1752] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 1190.858998][ T1753] vhci_hcd: connection closed [ 1190.859067][ T8] vhci_hcd: stop threads [ 1190.872618][ T8] vhci_hcd: release socket 09:36:13 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @initdev={0xfe, 0x88, [], 0x5, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06007e02010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:13 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc0ed0000}}]}) 09:36:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1190.900647][ T8] vhci_hcd: disconnect device 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008e02010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200209000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1190.926816][ T1771] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1190.935987][ T1771] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06009202010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1191.063276][ T1788] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1191.074832][ T1788] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1191.111189][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.111356][ T1787] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1191.125978][ T1778] UDF-fs: Scanning with blocksize 512 failed [ 1191.127786][ T1787] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1191.148137][ T1799] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1191.150373][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.156812][ T1799] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06009402010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1191.206967][ T1778] UDF-fs: Scanning with blocksize 1024 failed [ 1191.222491][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.236864][ T1778] UDF-fs: Scanning with blocksize 2048 failed 09:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000003010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000a000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1191.254801][ T1787] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1191.263391][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.274473][ T1787] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1191.288617][ T1778] UDF-fs: Scanning with blocksize 4096 failed 09:36:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390010001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1191.420054][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.436142][ T1778] UDF-fs: Scanning with blocksize 512 failed [ 1191.454312][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.465649][ T1778] UDF-fs: Scanning with blocksize 1024 failed [ 1191.479246][ T1821] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1191.496240][ T1821] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1191.523277][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.530642][ T1778] UDF-fs: Scanning with blocksize 2048 failed [ 1191.553941][ T1778] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1191.566620][ T1778] UDF-fs: Scanning with blocksize 4096 failed [ 1191.686337][ T1821] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1191.696223][ T1821] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:14 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a5645ff070000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9aa05730293e019c562211bd5502c074a316a8f30b060dd94fa5edd2f8a3baf68f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875ce79d7f0048f56f60abf88bd9bf30ff386868fb73989c50000000000"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06002403010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1805}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000b000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:14 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf2000000}}]}) 09:36:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06003903010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1191.853638][ T1850] UDF-fs: bad mount option "fileset=00000000004060086272" or missing value [ 1191.902277][ T1849] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1191.910652][ T1849] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06005603010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1192.011580][ T1850] UDF-fs: bad mount option "fileset=00000000004060086272" or missing value [ 1192.036502][ T1849] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000c000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1192.056862][ T1849] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000d000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:14 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf6ffffff}}]}) 09:36:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600c603010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1192.268953][ T1885] UDF-fs: bad mount option "fileset=00000000004143972351" or missing value [ 1192.391768][ T1885] UDF-fs: bad mount option "fileset=00000000004143972351" or missing value 09:36:15 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 09:36:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600f603010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000e000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:15 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xf9fdffff}}]}) 09:36:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390009001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fa03010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1192.697962][ T1920] UDF-fs: bad mount option "fileset=00000000004194172927" or missing value 09:36:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000005010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20000f000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1192.811769][ T1920] UDF-fs: bad mount option "fileset=00000000004194172927" or missing value 09:36:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390002001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1192.865870][ T1926] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:36:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0xfffff7fffffffffd, 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000000)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000008ff0)={0x2, 0x4e20, @broadcast}, 0x10) listen(r1, 0x0) ioctl$SNDCTL_MIDI_INFO(0xffffffffffffffff, 0xc074510c, &(0x7f0000002200)={"59083c08183e5c2f884dbb2bd034d68f038aefd6d92b3431a9ccb6c74831", 0x6, 0x9, 0x8, [0x0, 0x3, 0x6, 0x7482, 0x2, 0xffffffc1, 0x8, 0xf99, 0x5b, 0x2800, 0x2, 0x8, 0x10c, 0x1, 0xf, 0x9, 0x660, 0x2]}) listen(r0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r3 = epoll_create1(0x0) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) socketpair(0x0, 0x0, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000140), 0x4) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f00000000c0)={0x40002005}) ppoll(&(0x7f0000003600)=[{r3}], 0x1, &(0x7f0000003680), 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, &(0x7f0000002280)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) [ 1192.911453][ T1926] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1193.125500][ T1926] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1193.139796][ T1926] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:16 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000006010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:16 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfbffffff}}]}) 09:36:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200410000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x240, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000007010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1193.589297][ T1975] UDF-fs: bad mount option "fileset=00000000004227858431" or missing value 09:36:16 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfdfdffff}}]}) [ 1193.655638][ T1974] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1193.665691][ T1975] UDF-fs: bad mount option "fileset=00000000004227858431" or missing value 09:36:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="202010000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000009010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1193.722748][ T1974] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1193.851372][ T2002] UDF-fs: bad mount option "fileset=00000000004261281791" or missing value [ 1193.878243][ T1974] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:36:16 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfdffffff}}]}) [ 1193.932661][ T1974] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1194.073982][ T2019] UDF-fs: bad mount option "fileset=00000000004261412863" or missing value [ 1194.123254][ T2019] UDF-fs: bad mount option "fileset=00000000004261412863" or missing value 09:36:17 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000b010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200011000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:17 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfeff0000}}]}) 09:36:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1194.437793][ T2043] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1194.447947][ T2043] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000b010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1194.542584][ T2052] UDF-fs: bad mount option "fileset=00000000004278124544" or missing value 09:36:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000d010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200012000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1194.632306][ T2052] UDF-fs: bad mount option "fileset=00000000004278124544" or missing value 09:36:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1194.688068][ T2043] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1194.701164][ T2043] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1194.970592][ T2097] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1194.982991][ T2097] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1195.074938][ T2097] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1195.087551][ T2097] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/507], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000f010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xff0f0000}}]}) 09:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200020000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3900fc001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000011010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1195.344292][ T2128] UDF-fs: bad mount option "fileset=00000000004279173120" or missing value [ 1195.344498][ T2129] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1195.368730][ T2129] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="3903c6001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000012010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="201020000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1195.473928][ T2128] UDF-fs: bad mount option "fileset=00000000004279173120" or missing value 09:36:18 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xffefffff}}]}) [ 1195.546295][ T2129] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1195.586003][ T2129] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1195.716322][ T2161] UDF-fs: bad mount option "fileset=00000000004293918719" or missing value [ 1195.888211][ T2161] UDF-fs: bad mount option "fileset=00000000004293918719" or missing value 09:36:18 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:18 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600fb12010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:18 executing program 0 (fault-call:3 fault-nth:0): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200025000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:18 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfff7ffff}}]}) [ 1196.213228][ T2216] validate_nla: 41 callbacks suppressed [ 1196.213236][ T2216] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.234428][ T2217] FAULT_INJECTION: forcing a failure. [ 1196.234428][ T2217] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1196.241486][ T2218] UDF-fs: bad mount option "fileset=00000000004294443007" or missing value [ 1196.257603][ T2216] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.262629][ T2217] CPU: 0 PID: 2217 Comm: syz-executor.0 Not tainted 5.10.0-rc3-syzkaller #0 [ 1196.275634][ T2217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.285841][ T2217] Call Trace: [ 1196.289723][ T2217] dump_stack+0x116/0x15d [ 1196.294839][ T2217] should_fail+0x231/0x240 [ 1196.299163][ T2219] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1196.299301][ T2217] should_fail_usercopy+0x16/0x20 [ 1196.307688][ T2219] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1196.312486][ T2217] _copy_from_user+0x1c/0xd0 [ 1196.312507][ T2217] __x64_sys_epoll_ctl+0x7b/0xe0 [ 1196.331808][ T2217] do_syscall_64+0x39/0x80 [ 1196.336971][ T2217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1196.342847][ T2217] RIP: 0033:0x45deb9 [ 1196.346739][ T2217] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.366436][ T2217] RSP: 002b:00007fec848a3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 1196.374840][ T2217] RAX: ffffffffffffffda RBX: 0000000000002c40 RCX: 000000000045deb9 [ 1196.382791][ T2217] RDX: 0000000000000003 RSI: 0000000000000003 RDI: 0000000000000004 [ 1196.390761][ T2217] RBP: 00007fec848a3ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1196.398729][ T2217] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000000 09:36:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000016010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:19 executing program 0 (fault-call:3 fault-nth:1): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1196.406697][ T2217] R13: 00007fffa1a2ea3f R14: 00007fec848a49c0 R15: 000000000118bf2c [ 1196.499055][ T2236] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.508293][ T2238] FAULT_INJECTION: forcing a failure. [ 1196.508293][ T2238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1196.509490][ T2236] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.531335][ T2238] CPU: 1 PID: 2238 Comm: syz-executor.0 Not tainted 5.10.0-rc3-syzkaller #0 [ 1196.540014][ T2238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.550045][ T2238] Call Trace: [ 1196.553329][ T2238] dump_stack+0x116/0x15d [ 1196.557712][ T2238] should_fail+0x231/0x240 [ 1196.562116][ T2238] should_fail_usercopy+0x16/0x20 [ 1196.567127][ T2238] _copy_to_user+0x1c/0x90 [ 1196.571540][ T2238] simple_read_from_buffer+0xab/0x120 [ 1196.576931][ T2238] proc_fail_nth_read+0xf6/0x140 [ 1196.581853][ T2238] ? rw_verify_area+0x136/0x250 [ 1196.586689][ T2238] ? proc_fault_inject_write+0x200/0x200 [ 1196.592302][ T2238] vfs_read+0x154/0x5c0 [ 1196.596443][ T2238] ? __fget_light+0x219/0x260 [ 1196.601109][ T2238] ksys_read+0xce/0x180 [ 1196.605291][ T2238] __x64_sys_read+0x3e/0x50 [ 1196.609865][ T2238] do_syscall_64+0x39/0x80 [ 1196.614275][ T2238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1196.620158][ T2238] RIP: 0033:0x4177b1 [ 1196.624075][ T2238] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:36:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000017010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1196.643658][ T2238] RSP: 002b:00007fec848a3c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 1196.652046][ T2238] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004177b1 [ 1196.659990][ T2238] RDX: 000000000000000f RSI: 00007fec848a3cb0 RDI: 0000000000000005 [ 1196.667939][ T2238] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1196.675891][ T2238] R10: 00000000200000c0 R11: 0000000000000293 R12: 0000000000000001 [ 1196.683833][ T2238] R13: 00007fffa1a2ea3f R14: 00007fec848a49c0 R15: 000000000118bf2c 09:36:19 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffbffff}}]}) 09:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20002e000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1196.776152][ T2219] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1196.781952][ T2244] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.784779][ T2219] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1196.827784][ T2244] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000018010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1196.908809][ T2246] UDF-fs: bad mount option "fileset=00000000004294705151" or missing value [ 1196.942204][ T2255] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1196.959176][ T2255] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:19 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa60000000017a2cc9a9c050acc6f0000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/440], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000000180)="d3ba38ce14d31d260bfd148abf9d92fda1f7c463e90b88b1c1579865e8e110e9bfd17c1fa0fce03c5bce66bbd8b6d4846521308c1ab3f13565204e924b3527575357625002b88b00626065c5117fbd2b3e537f183ab500ff7e4821a9b979eaf50ea53e3c3d82e27afb67178f688aceac6f7187a6ca6a9a9d4373599fdb98d2731a6c02b054c2424cba13fd6669d5ea9107891d9137abc447f5ce81898e1dfa", 0x9f, 0x20000004, &(0x7f0000000000)={0xa, 0x2, 0x1802, @rand_addr, 0x2}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600001c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:19 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1197.033863][ T2246] UDF-fs: bad mount option "fileset=00000000004294705151" or missing value [ 1197.073345][ T2274] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:19 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffdffff}}]}) 09:36:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600001e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:19 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x2, r0, &(0x7f00000000c0)={0x40002005}) [ 1197.083194][ T2274] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20003f000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1197.156771][ T2275] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1197.179222][ T2275] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1197.201108][ T2289] UDF-fs: bad mount option "fileset=00000000004294836223" or missing value 09:36:20 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = getpgid(0xffffffffffffffff) sendmsg$AUDIT_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x38, 0x3e9, 0x800, 0x70bd28, 0x25dfdbff, {0x32, 0x1, 0x0, r1, 0x0, 0x400, 0x2ea1e151, 0x8001, 0x0, 0x80000001}, [""]}, 0x38}, 0x1, 0x0, 0x0, 0x4008040}, 0x4) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x6}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'syztnl0\x00', &(0x7f0000000200)={'erspan0\x00', 0x0, 0x80, 0x80, 0x9, 0x7e6, {{0x3e, 0x4, 0x0, 0x18, 0xf8, 0x66, 0x0, 0x20, 0x29, 0x0, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0xf}, {[@timestamp_prespec={0x44, 0x3c, 0x79, 0x3, 0x4, [{@remote, 0x3}, {@broadcast}, {@broadcast, 0x1}, {@private=0xa010101, 0x3}, {@rand_addr=0x64010102, 0x3}, {@multicast1, 0x957b}, {@loopback, 0x6}]}, @rr={0x7, 0x17, 0x70, [@private=0xa010102, @rand_addr=0x64010101, @broadcast, @private=0xa010101, @local]}, @timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x7, [{@remote, 0x9}, {@empty, 0x80000001}, {@local, 0x1000}, {@multicast1, 0x9}]}, @ssrr={0x89, 0x17, 0x9b, [@empty, @dev={0xac, 0x14, 0x14, 0x1a}, @remote, @loopback, @dev={0xac, 0x14, 0x14, 0x16}]}, @timestamp_addr={0x44, 0x54, 0x13, 0x1, 0x0, [{@multicast2, 0x20}, {@multicast2, 0xbb}, {@broadcast, 0x2}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@rand_addr=0x64010101, 0x8001}, {@rand_addr=0x64010102, 0x7f}, {@dev={0xac, 0x14, 0x14, 0x26}, 0x401}, {@remote, 0x3d}, {@rand_addr=0x1, 0x3f}, {@broadcast, 0x3}]}]}}}}}) r5 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000400)={'sit0\x00', &(0x7f0000000380)={'ip6gre0\x00', 0x0, 0x2f, 0x7, 0xfd, 0x4, 0x1e, @remote, @mcast1, 0x7800, 0x700, 0x2790c180, 0x8}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r3, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)={0x110, 0x0, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x20048841}, 0x4000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600001f010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1197.349007][ T2289] UDF-fs: bad mount option "fileset=00000000004294836223" or missing value [ 1197.367605][ T2275] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 09:36:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000020010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:20 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) socket(0x20, 0x4, 0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1197.393392][ T2275] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:20 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xffffefff}}]}) 09:36:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200040000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000324010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:20 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x252840, 0x0) fsmount(r2, 0x0, 0x74) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x4200c3, 0x0) r7 = syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="c681e9de70", 0x5, 0xb495}, {&(0x7f0000000200)="4708c2ed74a2e08aeb29100743cc062128e28a8f3c72764b4315ee6613c52c52bed3519d0b38b7d9c1874d50db751e97a8009ac4d023d29689dd5a82109dda254810211fc62b32861a59281f32f5c6d1b2129cbf9b122ad47abc98030059c55f2fd884aeb932d6d94ae8d1c4bd215f2abcb330d788b92a567f334d7cf6171a35fdce46b97869c93e90c69abc69845d45a4c59137f0dd120b889b9c1a5c37", 0x9e, 0x5}, {&(0x7f00000002c0)="eafc399dd5a7269af712bd834d6ae31f417b9cbfaca9608baa58606e5148e974140625c15f15c997719433246ac0f6a3bc3ebe7e6b0dcb2f7f9bba3ab54dc198b5c9299418e083f2a3f87b0deb2192c3c00fc7a6f64977a166cc2c14f612e962f62e4c7c66165fb9b94b157c533d2ff0092e927c14aebdf84e1422ab5d9f1cd2d59eeae3c08d86dc655e2de20c65dfb4eced91d24d7cf739b038a1e945ef807be9f0d1de7c182790cf2bf48a65fd88e80850a7042c4e01440d29400bebbe42d84353f92c11c75a6660297e7221890455e0f62b1565b250c7b01b620226", 0xdd, 0x5}, {&(0x7f00000003c0)="a06bc0c23403a7803b10e0a6457232396b66df9e926a385139913f1ef75c7361d8bc2871e0ea7d1ae0bc6463be745ffe2a0a7e35100db37ff1d119853ae843d0ed0eb1fcd6bad3fad6e425abdebaf4946624c99195be94c86ea5274868c2120625949f5ca24e217352732342e3fc0824dfb5d7a5d4be4040fb26ae8322dacaad10f593103f3932bec5f2aa83fa8b99ed23debad9fbf0db1b913ef7afe1ea1e", 0x9f, 0x9c}], 0xa, &(0x7f0000000500)={[{@disable_ext_identify='disable_ext_identify'}, {@noquota='noquota'}], [{@subj_user={'subj_user', 0x3d, ':/\\'}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, ').'}}]}) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r7, &(0x7f0000000080)) 09:36:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRES32=r1], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {0x10}, 0x0, 0x0, 0x0, 0x0}, 0x58) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) [ 1197.993275][ T2345] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1198.028933][ T2343] UDF-fs: bad mount option "fileset=00000000004294963199" or missing value 09:36:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000025010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200048000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1198.037652][ T2342] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1198.047219][ T2345] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1198.072948][ T2342] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 1198.088458][ T2342] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 09:36:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000339010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:20 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1198.121363][ T2342] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600003f010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1198.339394][ T2356] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1198.342281][ T2345] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1198.347202][ T2343] UDF-fs: bad mount option "fileset=00000000004294963199" or missing value 09:36:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20004c000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1198.389323][ T2356] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 09:36:21 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffff7ff}}]}) [ 1198.430922][ T2345] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1198.444701][ T2356] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008847010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1198.471359][ T2356] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 09:36:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000280)='cpuset\x00') r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r4, &(0x7f00000000c0)={0x8000201f}) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0xa8, 0x0, 0x200, 0x70bd2c, 0x25dfd3fb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x2}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x8e, 0x3}}]}, 0xa8}, 0x1, 0x0, 0x0, 0x24020891}, 0x200000d0) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000048010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06008848010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000080)={0x0, 0x2f2, 0x7fffffff}) getsockname$unix(r2, &(0x7f0000000140)=@abs, &(0x7f0000000000)=0x6e) [ 1198.664154][ T2397] UDF-fs: bad mount option "fileset=00000000004294965247" or missing value 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000009, 0x11, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x9, &(0x7f0000000000)={0x77359400}, 0x1, 0x1}, 0x1) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600004c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1198.767302][ T2410] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1198.779750][ T2410] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1198.794976][ T2397] UDF-fs: bad mount option "fileset=00000000004294965247" or missing value [ 1198.865955][ T2410] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1198.874452][ T2410] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:21 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200252000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000140)=""/68) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000356010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:21 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffbff}}]}) 09:36:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x64, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06006558010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(0xffffffffffffffff, 0xc01064bd, &(0x7f0000000300)={&(0x7f0000000200)="b01b3da2ac481a67cbcff5c745e2c173e905a9c3d8a8e269af2fbe7009fb39dd4fff59fe69abc189176b3f21c8001ff3411c49750b1e446d22d4ad06f48c21cdef36d95345a48b56719e23b5455cf3aa4215c5b146f5b5362308009878f42c787c3aec936cab0949eae32a8471dced5d7f1dd51916766ad343f8c68633c1d52a1315c0f63cd031bfe92773b058464b6c184b67d20bc5121b0517b7f9cde7a935629814b952a355f8e6d102f882ecb4f236b68710832ba683b7e29de02da8315465ac17ae51bb86468d8ca6d2b9d8314fbf41ed22e09c9304ba4f7e5466e3da1660be6cfbcd6e0d3d", 0xe8, 0x0}) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r3, 0xc01064ac, &(0x7f0000000440)={r4, 0xdc, &(0x7f0000000340)=""/220}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000140)="1039db070c8ab3a11785f4fe5b3ebf51c7d74d02018af74be63e3dceecd40df0fd2376f563a6c1f5db950c7db1f7083a11cb10775a0dfe728065aa40f51b5686530afe378d2be8bce70349061ead865e474ef80b03311b2b3f688f7713114f143d38c830bd0f8231c34c3bec40f7e1489ae8c47eb3ac7f941fb3bc2a1d6a8eda6495f07e52f78dcee374ff7124fba31f887dc989fb938b8c050e570e99b74368e85c74f684fc268c", &(0x7f0000000500)=""/20, 0x4}, 0x20) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000480)='/proc/sysvipc/shm\x00', 0x0, 0x0) write$UHID_GET_REPORT_REPLY(r5, &(0x7f00000004c0)={0xa, {0x7, 0x8, 0x24}}, 0xa) [ 1199.067309][ T2448] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1199.068303][ T2452] UDF-fs: bad mount option "fileset=00000000004294966271" or missing value [ 1199.086211][ T2448] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000060010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20005c000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:21 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000300)='/dev/nvme-fabrics\x00', 0x400080, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x8c, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x20000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4008085) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x17, r3, 0x1, 0x1, 0x6, @remote}, 0x14) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r5, 0x8983, &(0x7f0000000000)={0x7, 'netdevsim0\x00', {0x5}, 0x6}) [ 1199.203437][ T2448] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1199.214654][ T2448] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1199.238488][ T2452] UDF-fs: bad mount option "fileset=00000000004294966271" or missing value 09:36:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06005865010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:22 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a06f37e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fce32a3f68bba1852df6db5e4c3159b2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4138b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989890000000000000000000000000000704fea969926e487050000001f3697461759b763bce3f782f0ffc4fd90a4ca2fa5d6cf9012c31b898ad2621e72f1046dcc62ca88417e88c719236aa979352b4e714236c974f2fb45dcecdea8cb3bebeb5fc9ae93909e641b2c814cfec864f166b10a6b0bc3474b100b438c32207b5db254aa0154049239eddeb8a4a74937ced8537d4cdfd752822756b2f9794fea80c1f0fdd936ded46e45747586938a2b7a161f8cede2186fddc2753a33"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(r3, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:22 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffdf9}}]}) 09:36:22 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000080)={0x80000006}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000068010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200060000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600016a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x38b, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:22 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x115001, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000080)={0x4, 0x18, 0x10, 0xf, 0x6, 0x3f, 0x0, 0xcd, 0x1}) [ 1199.948018][ T2518] UDF-fs: bad mount option "fileset=00000000004294966777" or missing value 09:36:22 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600006c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200068000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:22 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffdfd}}]}) [ 1200.228623][ T2552] UDF-fs: bad mount option "fileset=00000000004294966781" or missing value [ 1200.383163][ T2552] UDF-fs: bad mount option "fileset=00000000004294966781" or missing value 09:36:23 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x1, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600016c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:23 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x8, 0x200002) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000080)=0x4, &(0x7f0000000140)=0x4) 09:36:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20006c000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x38c, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:23 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffdff}}]}) 09:36:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000170010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:23 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x60002015}) [ 1200.830011][ T2581] UDF-fs: bad mount option "fileset=00000000004294966783" or missing value 09:36:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200074000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:23 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xffffff7f}}]}) 09:36:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000074010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:23 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000000)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1201.078028][ T2613] UDF-fs: bad mount option "fileset=00000000004294967167" or missing value [ 1201.210688][ T2613] UDF-fs: bad mount option "fileset=00000000004294967167" or missing value 09:36:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="a4fa389ecc5ce6affbdc5ad60235e8e5c0a467374c4d266755aeff0a41ce16eafc126d04f13cebad6492bb138fdccd0e1340d8fc9aaf99fb4f2c34e816c13fdb6c2a38bb87c2b6dd89b7eb5dacfb730d508a04c61d1011506d0fa9b7678a6d413d221bb057b27ee77b031b16697f1e394a0f3d67c11de21f1a418e7ea6518e96", @ANYRES32=r0, @ANYBLOB="24c0dcb0349c668b694708c3d45939a4ca879cd2fa5530db1cb972874e2e8c60e48b671e782735de052945ba1159f9b7df4c15f043df4734d689c0ef769ca9272248a4b14b7bc481d76d16e2ee0a0f70250deb696bb1be15005280c7cbcffe8fe27397a178803748e5b693b831792b757cd65d361cf585040e84e10ccdada8d2fcef8c820a984bfcf7615785be64ce96fdb946f7cebea49df7c6abb9c088a90bef236c26e7b54ee4e0a5ba344f2487f8f3d42af371225b7dc0f5f31e581fde278eef844ee166efea204b833aa7dc091a3a1684c68bcf", @ANYRESDEC=0x0], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600007a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f8, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:24 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x6f) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) keyctl$restrict_keyring(0x1d, 0xffffffffffffffff, &(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000b80)='/[\'+,\x00') r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000d00)={0x7f, 0x790}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000000)={0x9, 0xff}) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/ttyprintk\x00', 0x509000, 0x0) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r3, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r3, 0xca289435, &(0x7f0000000140)={0x1, 0x3, @status={[0x4, 0x1, 0x122, 0x0, 0x80, 0x8]}, [0x8001, 0x9, 0xe2, 0x8000, 0x4, 0x73, 0xc6ef, 0xcffa, 0x200, 0xfc7, 0xfffffffffffffe8e, 0x100, 0x80, 0x5, 0x80000001, 0xffff, 0x2, 0x10000, 0x4, 0x401, 0x3, 0x5, 0x5, 0x126663da, 0x658c, 0xfffffffffffff000, 0x7, 0x1, 0xfffffffffffffff8, 0x364, 0x80000000, 0x5a7363b9, 0x7fff, 0x401, 0x9, 0x9, 0x5, 0x7f, 0x20, 0x6, 0x2, 0x7fff, 0xffffffffffffe67e, 0xe6, 0x3, 0x2000000, 0x1, 0x7f, 0x1, 0x200, 0x1, 0x0, 0x9, 0x37, 0x5, 0x3, 0x8, 0x5, 0x7fff, 0x10001, 0x8a, 0x4, 0x7, 0x4b94]}) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$packet_buf(r4, 0x107, 0x2, &(0x7f0000000c40)="725008705721b0d12ffef47de308c58fe7f9aa43925b1433550a7ef2f7148b59a0c53bb2ac85f7af4033c3dc61447c68a28d90c5917f8efcfe64c384433482828c137bc7a0b66b184d5572da31970139868d492a09f4fde6c5ade3d8c29257ddd338644ad5bfa5e453da1b7e59195072658a4a93d5a60edd0930edb52c26c48d56ce4d1a5454d583a0eb6c88", 0x8c) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000bc0)) 09:36:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20007a000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:24 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xffffff8c}}]}) [ 1201.662309][ T2640] validate_nla: 42 callbacks suppressed [ 1201.662316][ T2640] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1201.697893][ T2646] UDF-fs: bad mount option "fileset=00000000004294967180" or missing value 09:36:24 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='westwood\x00', 0x9) [ 1201.709281][ T2640] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600027e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:24 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000180)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @loopback}, 0x101, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='macvlan0\x00', 0x4, 0xb9df, 0xffff}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r1}) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r2 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r2, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r3, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r3, 0x541b, &(0x7f00000000c0)) 09:36:24 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000200)) ioctl$SIOCRSSCAUSE(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)=0x83) 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000081010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1201.798394][ T2669] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1201.807216][ T2669] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="2001ad000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:24 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r0 = epoll_create1(0x0) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x7}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x301483, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r2, 0xc0045520, &(0x7f0000000080)=0x9) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000184010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1201.881604][ T2680] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1201.893518][ T2646] UDF-fs: bad mount option "fileset=00000000004294967180" or missing value [ 1201.911115][ T2680] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40a, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:24 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xffffff97}}]}) 09:36:24 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = socket(0x10, 0xa, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000440)=0x4) r3 = add_key(&(0x7f0000000580)='id_legacy\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000004c0)='trusted\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000540)='\x1d\\\r+-\x02)!^-u\x15', r3) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000e40)={0x0, @in={{0x2, 0x4e21, @loopback}}}, 0x84) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000480)={0x1000, 0x100000}) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000840)={0x4, &(0x7f0000000500)=[{0x800, 0x4, 0x9d, 0x9}, {0x8, 0x8c, 0x81, 0x3ff}, {0x2, 0x4, 0x7, 0x5}, {0xfffb, 0x7, 0x9, 0x2}]}) r4 = epoll_create1(0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/urandom\x00', 0x220100, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), 0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000f40)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x3, 0x1, 0x4, 0x10000, 0x9}, &(0x7f0000001000)=0x98) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000dc0)=[{&(0x7f0000000880)="64392314a4bfa06deb7f947cea890ae5e1cddbd520ddd47d1e3365e40e005f52d07f9401bf1cb9dcd29c2a48891cbad31abce17a9092b0461446c6356ec81c2538df01c9dfed42722812a64f0679831c1ddde528104ef1b7f398ee517056ae8fe2f28405df3a87b7c0ee25727d513b6f2fa8451184262fee15e6a5e78ff196025907120ba09351118f7aea689a88113c127fae05ea32d43de6d9d8458e85ff6a", 0xa0}, {&(0x7f0000000940)="f7e63765358e9226e992814349855f59f92801319ba1b50b3a3293c1a87e137505907ec54d7ff50be3eec8ce2f406b4d79cbf9a40ebf7a0612b7eeaf6011a2f4685c8ea97840db0634d3b716bdc6489545250120f315d39db7fa3884c5607285b0cd123c9e3d22edadd0e87aa1a0689d169c204ed404500616d97f", 0x7b}, {&(0x7f00000009c0)="7ddbf43cc4ffe4dca48c6ef0b51dde337fa9edb844a6ac8ea4dc1ef3306308078e59a98e3c7b401984ee6ced58dfb5cc36ff6e176fca578d6a4288babcb0479f2358fc25a266083317cac0ad31b2ac2613104af684eb22d6a7ab1288aed38221c1f892091a2736a5107555301be77fc26dbae93fa31c657d135fda853d8cdf721037a6af410805cf22a5d5a46eac2fa35f5f935a267f1fff1f7939ee7e94696b9a57b51b26e36718f879fe05bda54d5ab493842f65ab9c2d7e8a0d6b581c68eaf2c62a", 0xc3}, {&(0x7f0000000bc0)="0b68a0e7e770c9e7bccafb1353bd65e7330d9882b765ac46e4901f527086b600b46a26de04bb6473d3e0d6ae8497eb32e26683912edff61223dad2a6df5dcc4dbe78fd88acb90200000074680fa678aa1416f772ec41586179df91799b6f9bbb16806113df25b9579f544e1916cb0bbc5ec5f02d88cf537301ca3eb9b171a1fa96a9893e4c34349bbe66fe48286057a18f0cb6c14cea7add9ed140c9a9dbd4bd25191f168b4182", 0xa7}, {&(0x7f0000000b00)="0e8ef4e556b50d85bf59daef9ff36a968534c8751505b2c4d5e6ae5088934bb85de24e48cb8fb3d3e72864bf074aa048101cabe7f3fae15f4fac7b76ec72c4dbbc3c65bcf74152f3b63e9ed6d85b881e2d8369e1ace59cf944eeef4ba32eb7ddb6d622e72d11c4a191157af879d9f920853c98fcd8c10c84822bbb15d066b061bebf00ef352f4382ed3f033c88243c7c6b45e31e4c411f5ec43799d682163b457824636654085aa9bc573848", 0xac}, {&(0x7f0000001040)="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", 0x198}, {&(0x7f0000000cc0)="4f09a1d9a3b0bbac1d230450f9cd15545deb5baa2c13697e2247ddff25a232725bc3ba04b4e7b9371aa55dab0f840a43b5f7", 0x32}, {&(0x7f0000001200)="09c3141024d61c836c0f56ffd624e6f54e77f36c62215c073f1f3fa7f2800c000000000000189ed78021da4d200a4299953f6d7093cd1261659b9f00a155ef84473d9826d58ec410b765540fe5c855e594059c4d16bcfa3cccf7075d6f469f43c218bfd0d1c9a2fadfe09d708a817e2726216edb4568f0f53045ebb2176c9ba047e57530d2c4b585722e18634a0e821d5b24c5851c6459352448fc1498337c7f00304ea8c87480f263c9cef8b8d586e9faa711bc02cfed2e983378", 0xbb}], 0x8, r3) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000100)={0xb}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004788010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1202.026689][ T2690] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1202.043917][ T2690] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1202.134245][ T2704] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1202.144186][ T2704] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:24 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) set_robust_list(&(0x7f00000001c0)={&(0x7f0000000080)={&(0x7f0000000000)}, 0x7, &(0x7f0000000180)={&(0x7f0000000140)}}, 0x18) times(&(0x7f0000000200)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06004888010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1202.221025][ T2706] UDF-fs: bad mount option "fileset=00000000004294967191" or missing value [ 1202.316947][ T2706] UDF-fs: bad mount option "fileset=00000000004294967191" or missing value 09:36:25 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x2, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="2001f6000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600028e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:25 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000002300)="b9800000c066b831018ee8665c8f097001ea0fdb09fbca98f99835c4e17de7362e460f78204000c4636569420f320fc77351b98c040000b800000000ba010000000f304f4f0f5c19db3a9af342d8868680000066b82001640f072e66520fc73366ba2000ed", 0x65}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f0000000280)={{0x0, 0x0, 0x80, {0x10000}}, "be77f645fa0faab4173328e03e0e9f020bbc798c84be65bf762199e269b6d15af3d542e5a531a895866fbf13910d95e922d6aa84d68924efe5e444b34d9df08a868ae23c677546798d6ec2c17d6e3f87f0d757c2078c9325c641fea9938ba4f20ebb2577f51ba467d973398c7fa94be4e2abd427b7ad4385c63e630090759c2a6c768a973d0b1e7244e494d5925d9d9f40afd544b84d1fdb8de7af279d8700739c11327a76f8bc32743c959d8858b276c211222f40206257be84ddd07b20d8b1de9b5390ba5eaa289c0bfdf6b5636b7acfac5159e2e7759338e06ae00e4b7cf162e45442e3c8395858847e3e28da4ed237027cd849991ab91e6e5dc61b9936de574c3b26a2b0e303386c02ed1bb6a5acaf8a9271e196bc59fb3d7d6a88383d53302680fd8ebd0e75fa67333a6fb9da0333d6f87b3f628136a4b9ec1c2f4cf3d5ec900ec17d48e3f741860d963ec6e629243d06b547374ec3f5a0a8e71cdd67e8f591d68711ba4df1f2fc62d9f54c6f7b8844c8ce569fb7f983a631250e77374780413ab37235afdefb70572e79f35d36406aded61bcf76711aacf325b2ac1f78b4ede1239e36d5d644c7a81cdf6b95a1e3aa6c2f70d889654572d1f88f05e5b2c5f5c37d6570102c2525a9b3fa28a88c83ded573a896239900bd365dc0323d4921c3c96a3dae810479a1ac83b64f0f9b2008eb51832bce90105dab379b3d99f6761d4cf438d92356c563c982938fe83026258aad0a7d9f5eacfa359c68ec271d3ecf9a57d3eec56cb0bcf1bb0adc6c297d6e5b101640d3c5b50bcb54faebed4f850e737b5a2837054bccbecfd1c28e70a967a350d21867ea95b2cdfe55fd3edc6e1f4db06a5e6b77a333af48e92899e074794f3b4687dce6d45cb33433e922b1602e767164dc0e760d14b4c70f304de2cb56ca5ea35719f492480e48b9007e4073a8e02450a93d3932971b32aca283773bbb7974486478d380d8524c0eee27ba19d9c51196494bc3f2c41c1ddc72b0b9d97ca307022baf742cb69b45de669e3224c1eaf4e6ec7bb76f921ad3fd01e1138eda10e945ca95302c1729adf6526041169700a783f767632e99b55eac5e4ebc25b63e11649a31e1dba33445a36b40c7cc7ab6450cb4853c69a9f1eb00d466f6c98f297d3e4882fd4d1a9dff0786cece0dd1b03fd84f982b493349f32e49be255102e7bd1475e25574a992da6907a0e6bce48d4601b51ca05798a0e8b5faa9ed6700902e4626b866b4219e3880277bca07f577def954fdd64e089622ed0eec558759a9b6d3e512b330fa30e31403053a73da1747a7874f5b7a9fde4c0f9f29a27e795e275c9f6c33d9db7f370f148a790811428b2f96566bd0e2b148997e69b0ffe1a81cb04d43ce6a24ea2a9414b930fa1330153cb20aaae484e515393b9ddf9d029806c35d5e956462b7cc7f1c7995006ffeae1f1ba1daf8d43309198bf444ec82c670800d5dacd600924564931014b1e834a38274c6560784572e6d4bf8c4a5a1ee5edb2f4ea5fa9f07b11d3d1d88b993fa662bc04dfb9ffa9e534f1622efd7f823346aa7e0a988f56be531c73f34439df61f9737cca8b93d2c25695138c70c469298c3a114c89a8c3409d4dc18e7bd0158631d0b936823a6dda814ed50f83862058d1ecc19b2e1195c910edb5e7164fbd403de0beb5d7feec901a5a373afa1162be95f0e71e50d479e33494d7c98c1cb2ac886c81610678923685fa9f5fff2584c89130b7d2ac78317e531bb2fcade76520cf8bec450e31eebfa5ae2f78587c572d36d56a69cf3f2cc9e15b77c11877d27e8af0196902d7f94646f0294b4507ae4461397ef21b24a2142f740460e1eb1935cbaccd14f71f21d6fb7144de99154f037cf31e9f30da3c935950c7d1c859096d44b57e7bd37147304b2fe51ab63ca7c4031c1f07913c8a894a6b0573886d7a0a62cd20a0f433e541a43808465eb82af5bb9c819a74bed83cf91aa180442c28b9f4d69dd7e728c7734dd3bd3e277e67e96ab9f09e083c0a6e42fe2bc5dcae9a2deddb7f763e62b0d8adacc00af734bb9e978c160600611c83309468a2f942f5d2c9f7cafc97dae2f542ef33be39952fa70ee3e2ecb3105c1a490db73fcf46a3645de10e1cb335ea604f41d10b723872c26f20a71f44b1301fffd601c6a609e0d195bbcb1203cd23fdb3e3f59fa8ae5a484881c34706bacb6a479fa7c9cc6920613dd6903bf046493bac060f046efc6ce43aafe9a3b735c1cb283714548fdc16a2ce9d9dccd77f3b8037132ec1b1f1d965932a9ec4b20efe1f2212c94511b61799b5bd29be84e47d1c1209af544bb4c4820b4897fe00fd583b8ae5394354d1f2532d0801f202ba31bf01a896ebea5302167cf9b0ed71e793d9572fac48d75724caa57f99ba9db2113f5fa52d19356ed1d0c85bd60805952113e521a01444d6a6a502144691a9d32363284410e967626c720cdb3444a56b1b7043047dbf8e5f1b5177c82a651710eaed591e1d4ac5ffaf85411f7c3c3e58fefb5e0528f74b3f78a0b31de68f1e31415a7a37010be818b886c28cca1bf68db068929bad71bc6b4ae2a4c9f2c9bf98f15164e6ef96ef4121c191e5a94ca431b49c475f02acebc42d2c6026e4f7d595e5677947bf6cc0d6f95d7838f76cfc04492cebaed4374984706465ac83a1acbb55450f5b5e1e4cc00a88c334af44d337089c80167a813f54fa903ec85d8f1d22c443bcdfb3d268a3e57f563b9732cc3f5d8b1fd98a6f44e3b056cbeb65946ec917ef093c3a62757f2b27e6b4873ae7183b5b9a6528a576af69449df90cda4bfad6c54bed67fecc6fdc624183aecb5072002c8dc9d45505901c61489ab31b7d6cde6943f042953df648861b68663291117f3deb74d3f9e9501d9d50b095baaeef21aca82e00203c06ce103cc923e6f02ab481eed2da0a4eedeb827e9d7961f6d972f347c649e706dc0259d697a6a5ea1ba33a6f2c16beed92b58fa290026c728e91f3de285a74e56e968c5d174639a915b5e53d7b1e5566b1a89f09434afb2a2ff1fd00d13e7ce5a3dcb8e628f39a6c6825acd4b7152a777d21485f6360af8b1c62a4a29f2ad98d9c393530187c14b4defdfc8ac12433be7f56a40ce4087eb1f7cf949e4e9b3c612e4953716ab027a36ce839f1d2815c289d08e0e500630c2f54344d6549b9645a4b31648d25f71dc7a43651aa8530ccd0cec2f96a4385b185823111c514b5beb817a98824f301462598f03919ec52c0fdf5a522f3e4b250ded3089e0958bb20e5f936c8ab4fc00316ce483254f6e2abc024835acdba239decc60fcc316cbb5fe85db2e22ecd1259c607b575d836222d7a21f0fccdc6d4f90c487c66dcbe9d17f6af2edc30b57189f009072fa5b46e1f49aa33a6546aea60202c4e77066e2f487b2bd36f3178ea888488ae52fad830868172d8f2b3335db98a83c45e047ba93eb32e08a014d13fb8b9f3b54c16adaac8a95c250051baaa3667343a3df51ab7dccedcf4410482fb24ab337285d4c0d182bf00050c5cd2f8a1f7954fe0ce1c2325dc159445464327f0c463dfdae8c944db603ceab504409be7e3316e679960b63e1935018641f0d30d40fb4f83faa2786e7284b0adf6fe0ae04f61c362be89177aa7a27cd00a1c101deb33fbae04b8b20fceeef601049626954f0436470eb4d344fd53c34eab4fca401bb6aa64c1d1891ca88300ce5f8b9b7badb64a5aa3ce8ea848e288239def4602e4812c66503ccc2a68b734d97b2fe71e321e09275bbc727e4c02ce1a967f2f7c5f02f658c5e449a1c718a535561afbddd05ad28559c6ea8a5d19298eeccee69818b69a833b972128e153306522a3733396e25e3a2175443715b0926ea967609f73e2529fa4b6c346e32543431d11f57f557c71ff6b789d9a78e8039f78c5089586aeba7a584b3d6b753f8633d062b5cca3639eb95885027a1b78a90f79d33e8872b455a21618b76a4afd3d704849b067ab8f968bf528fbdbdfdd34e84163d644e211e32f9b5b91f86fb815890f6e405d7324fd6ff84fea268cf4d613d8b8cc784fd434f317dd77ccaf40d974c43d70ec15306c691ce9782267b20b35c150c1c104adff5437068f7c9dee058c08403024e5ed1f35bf1b6db213af8fd0293b230ddc7a405e1e3e584292cf6d9bd4ca1d0c325ecf37c57134320f79fac3f26874b1d595d0aacb7bf454bc4e15f755c1c7e2d0951d7731d8bf27c8002f611a942d633c9e0203ee9f848de15966e6c993d790bbc26958fdc3ff4e62b971697855ad0980d3cf6cd79c0f2f0d41eab6d2c67e83295afcbee60179e0997ddf9b15002b7fc058afa567034dabc640790aba2419a5ccbce25abccde586373f4e31f3436e5bab2e156b4cd6abaadbd4e991cb4a15cdea2202b13bce716e1df40d6bcc275f14c152ffe6294d2b5a5377a9da546490a0ff9ec3f27a0a6070f1b0d72b75a74ac1e764c4670b9547faa728500233dc410132d800bddd4e81272f1ace1fa8186e1b68e19b23ee611b2c9119b094764fd0720212c14f12f1835596660e08dbaf1a28c2ecb391094e8decb500484a4f9de412781fe084695a243d474471a3d6abd4ac640cfb7da40e0327defce9aa8101a25f7145b55db0510dd090af63fd65f9003693b21b2f3d4775c65707fed78474238d6453592933b2265c3836d0c775b95e9739b3de3856072a5b43c9e3024e8843b2522e92d12aab4a636c68af12722ab38d881f4c97118014db986f3ec966783b93d81d1d70e3ea611482df745256c3ef9c6c949c6afc6929f69d9427ddde81f3f278500c586b3bb736c2fc7713ad92ed13640f4051e72b38568e3f211f75261ee6517de0b980076127d7dc00a1660a11232325f7ac097f46e0ef4493cd7de875d14056419373d887a821672d894d32c810464705e92c9abe32967fead2464c8b2f693f45d07a8160f59ec046019b016ee8b07764278af8c6b22b4cc079f406c0ba898332aa8911b026c75edd02d5a40f8ed9c1a3d39c1893a0affe4b38c77305429562e9d0907179753051cbf13ff936091334fe24a53816d2aa5e2e26993dac3f2c573b0001152ee26b633afd966bfb704054227160bf292bbcc35f78a649bb7f4fe1783a6b10de778519c8a71f1381cc67a779e51ce3097e666d964728d55708e76953826c7659c3647d3f3cedf9f1b45b27f5735bb8d78d874bf73147b738b9c0566a0d2fdcb17f85dc712462e381ba1466d92d903ba24d0cc17ddbeb7bd80b5525d7236a8add54d4eca06fe4cd0d3724403c7ad09f22eb2fcb4181eddde271be821579b7382bbfe36dab5079811e62842da65165c27c181dfed279d5ec12a1c0c13541760c2fe5cce95c6892622229ac24a7211ba43e513077f34342b61611a1ab10b6c51f6e3a06be0716d7d1abc82f5903e32f1e6e3e85789c1b8f140bbe1903b9677ec9655e171bf1f4d27dda003c27d4ef0e043d0def451dbc0f48cb6cb605b1e2d27e9fc9db10c0b571b6805f316b00b581d0d7358f83e14d1b4290e61fc0d0bd97334f31a547350c00877c90bcb591b98986c19d9d477f7dc521ac43d2edf9201ea61c43e6365e795bfb44b0d90ced7b9d34a849dec495d79cae7769c721d7cd17f1503df3d113c49fcb18449ff180d39c94717ae8fcba7ee1d8cf75873098a7a697d5f5d7a6eeef14daf146710ee40c94ff8ea9ff048d108688776fd074e72658d6ea43f42ea03883f70f45c7b86d3eb0bced0f3a60b6da510833728ffdb82af9a34c5fc86e0130861ac66c68b784300", "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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = epoll_create1(0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0xffff, 0x5, 0x7, 0x80}, {0xff00, 0x20, 0x47, 0xc9}, {0x6, 0x63}, {0x62, 0x7, 0x4}]}) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000080)={0xc0001017}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@private1, 0x20, 0x0, 0x3, 0x8, 0x2, 0x400}, 0x20) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002380)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r6, 0xc0245720, &(0x7f00000023c0)={0x1}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r7 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r7, 0x0, 0x0, 0x0, 0x0) r8 = open$dir(&(0x7f0000001240)='./file0\x00', 0x400080, 0xc) pwritev(r8, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r7, 0x50009418, &(0x7f0000000240)={{r8}, 0x0, 0x18, @inherit={0x88, &(0x7f0000002400)=ANY=[@ANYBLOB="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"]}, @devid}) 09:36:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40b, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:25 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffff6}}]}) 09:36:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000292010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1202.665367][ T2747] UDF-fs: bad mount option "fileset=00000000004294967286" or missing value 09:36:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000294010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:25 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x20000002}) 09:36:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="2000fc000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000a8010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40c, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1202.882448][ T2747] UDF-fs: bad mount option "fileset=00000000004294967286" or missing value 09:36:26 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) write$sequencer(0xffffffffffffffff, &(0x7f0000000000)=[@n={0x0, 0x1, @generic=0x6, 0x8}, @echo=0x5, @e={0xff, 0xd, 0x3, 0x8, @SEQ_NOTEON=@note=0x7c, 0x5, 0x5, 0x2}, @t={0x85, 0x3, 0x6, 0xff}], 0x18) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:26 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000000)={0x40002005}) 09:36:26 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffffb}}]}) 09:36:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060003c6010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40d, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="2001fd000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000da010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200fff000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:26 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x10000) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@multicast2}, &(0x7f0000000140)=0x8) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1203.531897][ T2821] UDF-fs: bad mount option "fileset=00000000004294967291" or missing value 09:36:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060001ea010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:26 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) pwritev(r2, 0x0, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x4) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r2, 0x40089413, &(0x7f0000000000)=0xffffffff) 09:36:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40e, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1203.723658][ T2821] UDF-fs: bad mount option "fileset=00000000004294967291" or missing value 09:36:27 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:27 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xfffffffd}}]}) 09:36:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060003f6010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000020002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:27 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0xf0000001}) 09:36:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40f, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060003fa010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:27 executing program 0: ioctl$SOUND_PCM_READ_CHANNELS(0xffffffffffffffff, 0x80045006, &(0x7f0000000180)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r3, 0x0, 0x0, 0x0, 0x0) copy_file_range(r2, &(0x7f0000000080)=0x100000000, r3, &(0x7f0000000140)=0x1, 0xed, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') [ 1204.371054][ T2890] UDF-fs: bad mount option "fileset=00000000004294967293" or missing value 09:36:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060012fb010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:27 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000000)={'veth0_macvtap\x00', {0x2, 0x0, @initdev}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_MESH(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040090}, 0x40014) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000fc010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:27 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_create1(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f00000000c0)={0xb000001a}) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r0, &(0x7f0000000080)={0xc0002026}) [ 1204.568748][ T2890] UDF-fs: bad mount option "fileset=00000000004294967293" or missing value 09:36:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af5fb93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79000400008d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e3587990000000000000000000000ef9f1596688d642c0814c4df8483320875a7d7d7f0048fbf880000f20000000000000000001eb3231ff2ba299aa7d92afe2e421f48677f5f6115b0d169c8c569631d8f748bbc67432f053dbd6c8642f6c8175cb35e6187f1bec5affcf883586f1d3a75acbbc413338400000000000000000000000000a601197572a710eb3e33f64bc86b340169864e29e8a021cf34b75239c8ae025c0f644ffeede1baec942eef7f3272aa28369a5543fd7a4ffa36d80936b7e8d77424dcb76dd442e6bb58e6674839460cef95efaeb7d5b011343084893d1bafa935a60c2156b51a8ac245ee2b2f9914abca3d8e8a9b295645bda03d32d47cdc48a339ba8295c77f4e152a6fed231b46add7f18110d59a077e"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000fd010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x8000000000}}]}) 09:36:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000040002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x410, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$dsp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5000000, 0x10, r1, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)={0x6}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r6, 0x0, 0x0, 0x0, 0x0) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r7, &(0x7f0000000080)={0x1000201f}) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000ff010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000000)={0x2, 0x0, 0x8}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x54fcf081c4dce565}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000040000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000080002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1205.320670][ T2953] UDF-fs: bad mount option "fileset=00000000549755813888" or missing value [ 1205.356128][ T2953] UDF-fs: bad mount option "fileset=00000000549755813888" or missing value 09:36:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, '+)]\''}, {0x20, '/dev/cuse\x00'}], 0xa, "41f5f29ce1dfca48aa9222f2629f782056b97337d0069947c7f263d9073e82b9b70c5e1a0b51e2903ef4ea1505c39ca4708a4e06a98b0f35fc0b94a7b3f08400182725f19cd3671b6843c16029bd63a0a93746002bff28e1a7095bb1048329236a3c84c44972dc0d99d36ae91d72cc5473b02877e561a1adc3dbbee3784db5f53bc61e6f7a09abc7975c3e48eb95adae1c77d22a2bf07d2d790e99e027bddfe2eee8d9"}, 0xbe) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000000300004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x12, 0x0, 0x11}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:28 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x80000000000}}]}) 09:36:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) bind$rose(0xffffffffffffffff, &(0x7f0000000200)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x3, [@default, @null, @default, @default, @default, @default]}, 0x40) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet6_dccp_buf(r2, 0x21, 0x0, &(0x7f0000000080)=""/44, &(0x7f0000000140)=0x2c) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r3, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r3, 0x80189439, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f00000001c0)={0x0, 0x80000, 0xffffffffffffffff}) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x41, 0x4, 0x20, "945ba88e421a6e9b78865ee042dd19f8", "82071fbcd7308b95fca26bdf5680eaa75a4b18cc9323668dd932716f11704ad6ceb5a3722d3d6701ad328644"}, 0x41, 0x0) 09:36:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x411, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000002600004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="204000080002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000000ac00004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:28 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x13, r0, 0xe2133000) r1 = epoll_create1(0x0) socket(0x10, 0x2, 0x0) setreuid(0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@getsa={0x560, 0x12, 0x300, 0x70bd28, 0x25dfdbfc, {@in6=@dev={0xfe, 0x80, [], 0x28}, 0x4d4, 0x2, 0x6c}, [@srcaddr={0x14, 0xd, @in6=@rand_addr=' \x01\x00'}, @algo_crypt={0x116, 0x2, {{'xts-cast6-avx\x00'}, 0x670, "f65de021eeaa14aa7cc851352c7ebcdcd69159df1c46e079a0e2eec6d7f6b009a729501779e2bfb5844b903e3fd356d0ce28fb925c5266c1e60a3cbe0d320eef320374c55aebc2394bd3d69f8bfa3c9911ebe0fc2b8fb1126dd0a7e87b2f5f9b91060d495115ebee9c4bfb0e3dec113912fcd51e0d5ff74952fde185e470c9652bcf8e79e91cdcd3ac7008c3cd3a3ecf19ec09a12b0cf3bdd07aad2ecfb4f9c1575143e19bee7eaa689d94b80fe24c8e0d360d48defbe870512a7ff9168d0e49a8075dd35d309174b212c4543af6"}}, @algo_auth_trunc={0xf4, 0x14, {{'sha3-512-ce\x00'}, 0x540, 0x180, "5598080d5f73ea5b76780f7b0c1b5d77ad2ba1dfa72b50c5fea229527d0ff6203caa261d6ee1a05c9dac235be88f3385908869b0b6dd523decb455de5e52a9c88f0a94493f537fe1b270a3aa7908ef1f786a88007bb4baf22f60cc9181f268dd5044f562cd46dc0c5558ea61c4087ede1efbf0523e7f06c514e6384f5afd852e2dc506d02bf2e1c04686bd0904b919ee12aacd6e86aa82d4d9dec84a4353c8f211de32196ea71f78"}}, @migrate={0x134, 0x11, [{@in=@loopback, @in=@local, @in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3c, 0x4, 0x0, 0x3502, 0x8, 0x2}, {@in=@private=0xa010102, @in=@multicast2, @in=@multicast1, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0xcc, 0x3, 0x0, 0x34ff, 0x2, 0xa}, {@in6=@empty, @in6=@loopback, @in=@broadcast, @in6=@private2={0xfc, 0x2, [], 0x1}, 0x33, 0x1, 0x0, 0x0, 0x2, 0x2}, {@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@multicast2, @in=@multicast2, @in=@broadcast, 0xff, 0x4, 0x0, 0x3504, 0x2, 0xa}]}, @sa={0xe4, 0x6, {{@in=@dev={0xac, 0x14, 0x14, 0x33}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x1, 0x4e21, 0x62, 0x2, 0xe0, 0x20}, {@in6=@mcast2, 0x4d2, 0x2b}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, {0x2, 0x1000, 0x27c, 0xa47, 0x2, 0xfffffffffffffffb, 0x1000, 0x9}, {0x4, 0x4c7, 0xff, 0x100000000}, {0x1, 0x10000, 0xfffffffb}, 0x70bd26, 0x0, 0x2, 0x1, 0x3, 0x62}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd28, 0x70bd2c, 0x70bd2c, 0x70bd27, 0x5, [0x5c5]}}, @algo_comp={0xd0, 0x3, {{'lzs\x00'}, 0x440, "afb7f5071857a55e80ccbd17694cef3606d361848e0d94c644423d39c20f2dde457a7d0765a9aa694e66af5fe1903373ca09311efd9f83de09e105ac3f7ab9c9dcb395667d05068f59fb688e5f69db20a06ac0a36f03c647f03a793f75b52b87e3e5b7d0a170b1f6dd0cefb9e65046cd693cf0ae8cff32c9bbd76ff635313392c4d355c555e1e5f5"}}, @replay_val={0x10, 0xa, {0x70bd2c, 0x70bd29, 0x80000001}}]}, 0x560}, 0x1, 0x0, 0x0, 0x400}, 0x4041) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) write$eventfd(0xffffffffffffffff, &(0x7f0000000700)=0x11, 0x8) 09:36:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000000ad00004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:29 executing program 0: recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/155, 0x9b, 0x2000, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1206.199405][ T3034] UDF-fs: bad mount option "fileset=00000008796093022208" or missing value 09:36:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="204180a00002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:29 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = socket$xdp(0x2c, 0x3, 0x0) sendmsg$xdp(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000005c0)="cf324dcdd97e67d5e079000aea89b78048c33897d61c83b87511ad5dc56036f3bd13", 0x22}, {&(0x7f0000000600)="ab60dc20974a57ff35b9ff7e39c7945cd7ccbed1ef29e46a7da66279dfca51ca22a53e72882c890ee7547ef77eff7e6469454e7fb7108368de66433147b4af844306c074084e7dbe539587cdea3b948cbb28b5bb9b831828b75d52", 0x5b}, {&(0x7f0000000680)="7df6e32fdcb0bbc710857da4e5da980a507903c41c816209d4dba525ccc0a3dbcde1ec6a1fec65cfae70e1d8678d6011b25ce4598bbf6f5b883e673c3ef465edd34d7c8367d0155bb79645a445fb12c605055790b6b08266e15e2c7ae826ad2d306d21f38548bc50e10e6cf53194c806fa354987c8f0cd8b89456d24dad05a1e2f1f62aec9bf783fd43f44ebe018d74ba57237fe3493f7e2", 0x98}, {&(0x7f0000000740)="908be2cc52462c9d61c5f5aed3bc8ba3a5b071c5798167c4fac78c7f78db8b73ff", 0x21}, {&(0x7f0000000780)="3666183be0adc47d2ea39e345a5af7df5dcf575a7ba0a600e795652e88be3f9bed0345ab5a80c7be2cc6afefc24cfa02e924617b2112b02eee9fc48cbdd1787b773ac65677ff25b1d1b54bba7c31a7cc547962eb91d1c492324f23c707a7d17bd63d4f11d1b377b1225eb58d928cba31dff30d39d00735e295b05cb99a4426f8e7b1c14ba60db5eb8599855082e41131593655420011c2276c2edfa63b", 0x9d}, {&(0x7f0000000840)="fc4b8fba40c6d91e69ab88f348d9b1cea30b9bc918d47c4854822724789ec2c6acb33f65eebd001f6c0ce2c3f69eab62c323fdbbaf15c05cf67214d0cefef2d79a289a2e9be6f237092133bb1e4ba0c065ba10833f8e93b5ca7acb0f11651cb9a549b16d0ea77f40f5a60ef92d5f9f17afe972d8a5b6650210eadfc757298d45ac364dbe2f5c19a70ad11f1dafd0827833c3", 0x92}, {&(0x7f0000000900)="cf92751cf227e5e37f5fd2be44d0c25741aafa85eed47e8b3c0b3f0fd412921448ee4e963b32f21cf510711d1e9b072a0359f11b40367846ff26d1fa3ba69560506a88358b3d1bd0c4d46ee1643714fa450f84605304f141672f618c746ce90162a83903", 0x64}], 0x7, 0x0, 0x0, 0x400d0}, 0x4000) [ 1206.371623][ T3034] UDF-fs: bad mount option "fileset=00000008796093022208" or missing value 09:36:29 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d0000000000000000000000dfeb7bba00281293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddbe07b23f8dd8f83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c500"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x7, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000000ae00004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x412, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:29 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000040)={0x1000, &(0x7f00000001c0)=""/4096}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000140)={0x8000}) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e22, 0x3, @empty, 0x6}, 0x1c) r3 = epoll_create1(0x0) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000100)={0x40000004}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f00000000c0)={0x40002005}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETTRIGGER(r6, 0x40045010, &(0x7f0000000080)=0x9e84) 09:36:29 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xedc000000000}}]}) 09:36:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000fc0002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:29 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x5) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1206.949402][ T3110] validate_nla: 38 callbacks suppressed [ 1206.949409][ T3110] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1206.970363][ T3110] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000000af00004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1207.003488][ T3113] UDF-fs: bad mount option "fileset=00000261408889503744" or missing value 09:36:29 executing program 0: ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, &(0x7f0000000140)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1207.069765][ T3113] UDF-fs: bad mount option "fileset=00000261408889503744" or missing value 09:36:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000102000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:29 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x1000000000000}}]}) 09:36:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000000b000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1207.129227][ T3139] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1207.147951][ T3139] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1207.275787][ T3150] UDF-fs: bad mount option "fileset=00000281474976710656" or missing value [ 1207.283124][ T3151] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1207.310883][ T3151] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1207.342246][ T3150] UDF-fs: bad mount option "fileset=00000281474976710656" or missing value 09:36:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x413, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, r0, 0x0, 0x5) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x6}) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r3, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)={0x40000004}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000000c0)={0x40002005}) 09:36:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000003000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:30 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x2000000000000}}]}) 09:36:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000202000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:30 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x1013, &(0x7f0000000100)={0x0, 0x0, 0x6}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x40, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0xc02, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff79}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:30 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1207.849588][ T3189] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1207.863404][ T3186] UDF-fs: bad mount option "fileset=00000562949953421312" or missing value 09:36:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000020202000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000004000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1207.896163][ T3189] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:30 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x602000, 0x10, 0x1}, 0x18) pipe2(&(0x7f0000000000), 0x0) r2 = dup2(r1, r1) ioctl$SIOCGETNODEID(r2, 0x89e1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:30 executing program 0: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2, 0x1, 0x0, 0x9, 0xe, 0x0, 0x0, 0x0, [@sadb_spirange={0x2, 0x10, 0x17000000, 0x17000000}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x800, 0x0, @empty}}]}, 0x70}}, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r4 = syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000380)='./file0/file0\x00', 0x3, 0x2, &(0x7f0000000540)=[{&(0x7f00000003c0)="6bf8f169e9394cb7573df31b89cbf26975215b675edbc04b2c250a01ddb6663c071647ba6d53311e24dfcc53bfb9d7e92304248fb941c4a29fb9e30dcf724acc8038dab5b6fdd71d1c054b454e02aff0ccca1ec7fa74ee82e20981fb5668ba1ff5b5fac6b5b52a49fb2c09fbb4ca1b35c8", 0x71, 0x1}, {&(0x7f0000000440)="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", 0xff, 0x100000001}], 0x1000018, &(0x7f0000000580)={[{@utf8='utf8'}, {@case_sensitive_no='case_sensitive=no'}, {@show_sys_files_yes='show_sys_files=yes'}, {@disable_sparse_no='disable_sparse=no'}, {@uid={'uid'}}, {@show_sys_files_yes='show_sys_files=yes'}, {@nls={'nls', 0x3d, 'cp1250'}}, {@show_sys_files_no='show_sys_files=no'}, {@gid={'gid', 0x3d, 0xffffffffffffffff}}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@pcr={'pcr', 0x3d, 0xa}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, ')*'}}, {@smackfsroot={'smackfsroot', 0x3d, 'access'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'func'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, '9p\x00'}}]}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000340)={0x2}) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xa0002, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@access_uid={'access', 0x3d, r6}}, {@timeout={'timeout', 0x3d, 0x3}}, {@rq={'rq', 0x3d, 0x4}}, {@timeout={'timeout', 0x3d, 0x101}}, {@common=@noextend='noextend'}, {@timeout={'timeout', 0x3d, 0x8}}], [{@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fsname={'fsname', 0x3d, '/dev/cuse\x00'}}]}}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x2005}) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x8) [ 1208.059057][ T3186] UDF-fs: bad mount option "fileset=00000562949953421312" or missing value 09:36:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000026000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x414, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1208.101753][ T3217] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1208.121676][ T3217] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x4000000000000}}]}) 09:36:31 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000000), 0x0, 0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)) 09:36:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000ac000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000ad000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1208.418169][ T3240] UDF-fs: bad mount option "fileset=00001125899906842624" or missing value [ 1208.505401][ T3240] UDF-fs: bad mount option "fileset=00001125899906842624" or missing value 09:36:31 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @mcast2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:31 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000040202000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x415, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000ae000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x6000000000000}}]}) 09:36:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000302000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:31 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) prctl$PR_GET_KEEPCAPS(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1208.777276][ T3280] UDF-fs: bad mount option "fileset=00001688849860263936" or missing value 09:36:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000af000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:31 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x7ffffffffffff}}]}) [ 1208.818495][ T3280] UDF-fs: bad mount option "fileset=00001688849860263936" or missing value 09:36:31 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000000)={0x0, 0x1, [0x132, 0x7fd2d683, 0x80, 0xe8, 0x7, 0x2601709b]}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000b0000000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1209.016183][ T3311] UDF-fs: bad mount option "fileset=00002251799813685247" or missing value [ 1209.156172][ T3311] UDF-fs: bad mount option "fileset=00002251799813685247" or missing value 09:36:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000002010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:32 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002008}) r2 = socket(0x10, 0x2, 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10800, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r6, 0x400, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$VIDIOC_ENUM_FMT(r4, 0xc0405602, &(0x7f0000000080)={0x8, 0x3, 0x0, "8d7490b3eb573b232b4e77552cbcfd623cc1db3ac51b3be3cfcaee44570e08c2", 0x32344d59}) 09:36:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x416, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000402000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:32 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:32 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x8000000000000}}]}) 09:36:32 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x78, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x30, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x60cba182}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3f}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 09:36:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000003010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1209.650044][ T3353] UDF-fs: bad mount option "fileset=00002251799813685248" or missing value 09:36:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000502000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:32 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000804}, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:32 executing program 0: llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/223, 0xdf) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000004010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x421, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1209.881749][ T3353] UDF-fs: bad mount option "fileset=00002251799813685248" or missing value 09:36:32 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)={0x28, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x900, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x8}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0xfff}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x40}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000010}, 0x8000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000005010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:32 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa000000000000}}]}) [ 1210.189496][ T3405] UDF-fs: bad mount option "fileset=00002814749767106560" or missing value [ 1210.242219][ T3405] UDF-fs: bad mount option "fileset=00002814749767106560" or missing value 09:36:33 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:33 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) 09:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000602000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2600, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000006010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:33 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc000000000000}}]}) 09:36:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000007010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:33 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000140)={0x9, 0x1, 0x1, {0x2, @raw_data="d4ed6bce504ebfe8d860497452a87c8469c5cd8d3ce3e34d0fb2bf3e434e7562fd7fa40a30d2adc481161ea489e30f4b9c98d0693ef8dc6a8eab7ab1f10d54d309f1e8c2fe6e1fb7da1de3f4135bcfab3d61fc3ca83c8d6336f8ebc7f8c24908db88c39577bb881f4bd800b687aa9ba5a701c03b46d271ed82c0111d507fc71ded5074c217da33d78ffdd0f41a89b84aa92c3dc8b95a401a6b1dbb0ee35079997fb9936a82913f2da525c7d760801fb850c4c2b0db82bc7069a038cf465b86518fc7ac43850eb3f8"}, 0x3f}) r3 = epoll_create1(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000100)={0x80000000}) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000240)="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") [ 1210.548119][ T3430] UDF-fs: bad mount option "fileset=00003377699720527872" or missing value 09:36:33 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe000000000000}}]}) [ 1210.606769][ T3442] ptrace attach of "/root/syz-executor.2"[3433] was attempted by "/root/syz-executor.2"[3442] 09:36:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000040602000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:33 executing program 0: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) socket$rds(0x15, 0x5, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x410840, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)={0x16}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[@timestamp], 0x1) 09:36:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000008010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1210.786483][ T3455] UDF-fs: bad mount option "fileset=00003940649673949184" or missing value [ 1210.824900][ T3455] UDF-fs: bad mount option "fileset=00003940649673949184" or missing value 09:36:34 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0x3d}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000009010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:34 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x1f, 0x7, 0x80, 0x2d, 0x0, 0x100000000, 0x1, 0xc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x8002, 0x5, 0x66d, 0x2, 0x6ce19fbe, 0xffffffe0, 0x3}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r4, 0xae80, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x27d1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:34 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x40000000000000}}]}) 09:36:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000702000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1211.437063][ T3491] UDF-fs: bad mount option "fileset=00018014398509481984" or missing value 09:36:34 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r6, @ANYBLOB="1000060000001fcd20"], 0x34, 0x0) setresgid(0x0, r6, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_STATX={0x15, 0x2, 0x0, 0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000240)='./file0\x00', 0x40, 0x800, 0x1}, 0x3dd7) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x10000, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize'}}, {@max_read={'max_read', 0x3d, 0x8000}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@fowner_lt={'fowner<', r7}}, {@fsname={'fsname', 0x3d, '&(*]&'}}, {@fsmagic={'fsmagic', 0x3d, 0x100000001}}, {@context={'context', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute'}}]}}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)={0x40002005}) ioctl$SNDCTL_TMR_START(0xffffffffffffffff, 0x5402) 09:36:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1211.488104][ T3501] ptrace attach of "/root/syz-executor.2"[3493] was attempted by "/root/syz-executor.2"[3501] 09:36:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000802000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:34 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x100000000000000}}]}) 09:36:34 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}}, [0x7, 0x7, 0x2, 0x2f, 0x1, 0x2b, 0x1, 0x4, 0x100, 0xfffffffffffffff9, 0x6, 0x9, 0x101, 0x1, 0x2]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x0, 0x39c0}, &(0x7f0000000240)=0x8) 09:36:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000b010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1211.703326][ T3516] UDF-fs: bad mount option "fileset=00072057594037927936" or missing value [ 1211.797078][ T3516] UDF-fs: bad mount option "fileset=00072057594037927936" or missing value 09:36:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000000)={&(0x7f0000000040)=""/61, 0x3d}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x59, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x800}, 0x80, 0x0, 0x0, 0x3, 0x0, 0x101}, 0x0, 0x2, 0xffffffffffffffff, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0xf, 0x0, 0x10001}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x10001802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:35 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x12, 0x12, 0x4, 0x1, 0x80, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x4, &(0x7f00000001c0)={r2, &(0x7f0000000040)}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(r4, 0x7ac, &(0x7f0000000080)={&(0x7f0000000200)={{@my=0x0, 0x10000}, {@hyper, 0xffffffff}, 0x400, "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"}, 0x418, 0x1dd}) rt_sigsuspend(&(0x7f0000000000)={[0xffffffff00000001]}, 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000140)=0x5) 09:36:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000902000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4f00, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:35 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x10e000000000000}}]}) 09:36:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000020902000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1212.330514][ T3559] validate_nla: 32 callbacks suppressed [ 1212.330520][ T3559] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1212.365278][ T3559] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000d010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1212.404803][ T3558] UDF-fs: bad mount option "fileset=00075998243711877120" or missing value 09:36:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="20af47bc0902000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1212.536623][ T3577] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1212.546244][ T3577] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:35 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x200000000000000}}]}) 09:36:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6400, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1212.662724][ T3592] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1212.673927][ T3592] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1212.692196][ T3593] UDF-fs: bad mount option "fileset=00144115188075855872" or missing value [ 1212.794539][ T3593] UDF-fs: bad mount option "fileset=00144115188075855872" or missing value 09:36:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000f010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:35 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:35 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001500)='/proc/capi/capi20ncci\x00', 0x40200, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000001540)=0x2, 0x4) r2 = epoll_create1(0x0) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x8, 0x200000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000000)={0x60002009}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000a02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:35 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x204000000000000}}]}) 09:36:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff2, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1213.209693][ T3613] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1213.236316][ T3613] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:36 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x121042, 0x0) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, 0x17, 0xa, 0x801, 0x0, 0x0, {0x3, 0x0, 0x6}, [@NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'erspan0\x00'}]}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x840) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1213.270038][ T3619] UDF-fs: bad mount option "fileset=00145241087982698496" or missing value 09:36:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000010010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000b02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:36 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000100)={0xa0000014}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000011010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1213.354909][ T3640] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1213.364226][ T3640] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1213.371680][ T3619] UDF-fs: bad mount option "fileset=00145241087982698496" or missing value 09:36:36 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x300000000000000}}]}) [ 1213.632735][ T3661] UDF-fs: bad mount option "fileset=00216172782113783808" or missing value [ 1213.719562][ T3661] UDF-fs: bad mount option "fileset=00216172782113783808" or missing value 09:36:36 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x800600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:36 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x44a120, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0xe0000006}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000012010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000c02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:36 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x400000000000000}}]}) 09:36:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff8, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:36 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r2, 0x300, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "8e62df182f"}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x28}, 0x1, 0x0, 0x0, 0x8841}, 0x48001) [ 1214.099180][ T3684] UDF-fs: bad mount option "fileset=00288230376151711744" or missing value 09:36:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000016010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000d02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000e02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1214.259540][ T3684] UDF-fs: bad mount option "fileset=00288230376151711744" or missing value 09:36:37 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x500000000000000}}]}) 09:36:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000017010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1214.411605][ T3719] UDF-fs: bad mount option "fileset=00360287970189639680" or missing value [ 1214.543294][ T3719] UDF-fs: bad mount option "fileset=00360287970189639680" or missing value 09:36:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000018010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:37 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r4, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000005c0)={0xb0, 0x0, &(0x7f00000004c0)=[@request_death={0x400c630e, 0x3}, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000300)={@fd={0x66642a85, 0x0, r4}, @fd={0x66642a85, 0x0, r1}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/158, 0x9e, 0x2, 0x1d}}, &(0x7f0000000380)={0x0, 0x18, 0x30}}, 0x1000}, @free_buffer, @exit_looper, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000400)={@fd={0x66642a85, 0x0, r1}, @flat=@weak_binder={0x77622a85, 0x10b, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f00000003c0)=""/13, 0xd, 0x2, 0xc}}, &(0x7f0000000480)={0x0, 0x18, 0x30}}}], 0x1e, 0x0, &(0x7f0000000580)="be0327e4d5e7db43b234db174cd2bbe4cad1954b5b7dc2e1491393b9ad37"}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x9e0, 0x4) r5 = socket$pptp(0x18, 0x1, 0x2) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f00000001c0)={0x1, 0x1, 0x1000, 0x6c, &(0x7f0000000140)="a2766dc3665f171076eed8499a4eaa4c3286383abdc8547e59be281299286528f158e8e566c890b6775cbfb03ffdeb96e657f28c40932402c52fd66dcb7fe407b9ac39f8d70d48928838d29c9251fa800a97bad409e1e6026eb8e083b0b97c966e67bd38b1d9f83c05318114", 0x9, 0x0, &(0x7f0000000000)="d0e4af78f4b8beb522"}) 09:36:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000f02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:37 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x600000000000000}}]}) 09:36:37 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 1214.979432][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.039610][ T3746] UDF-fs: Scanning with blocksize 512 failed [ 1215.047788][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.079852][ T3746] UDF-fs: Scanning with blocksize 1024 failed [ 1215.089358][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.096803][ T3746] UDF-fs: Scanning with blocksize 2048 failed [ 1215.139405][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.146769][ T3746] UDF-fs: Scanning with blocksize 4096 failed 09:36:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000001002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600001c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:37 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0xe2, 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x30002, 0x0) r3 = dup2(r1, r1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x45c281, 0x0) r7 = memfd_create(&(0x7f0000000180)='/dev/cuse\x00', 0x2) r8 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x200000, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000200)={0x0, 0x9, [{r3, 0x0, 0xfffff000}, {r2, 0x0, 0x8000, 0x1000000000000}, {r5, 0x0, 0x0, 0xfffffffff0000000}, {r2, 0x0, 0x10000, 0xfffffffffffff000}, {r2, 0x0, 0xfffff000, 0x1000000000000}, {r1, 0x0, 0xfffffffff0011000, 0x1000}, {r6, 0x0, 0x4000, 0x10000}, {r7, 0x0, 0xfffffffff0000000, 0xfffffffffffff000}, {r8, 0x0, 0xfffff000, 0x10000}]}) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x4081, 0x0) r10 = syz_genetlink_get_family_id$smc(&(0x7f0000000380)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, r10, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x20044051}, 0x20000010) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x40000016}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600001e010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000041002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:38 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000025010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1215.339375][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.346763][ T3746] UDF-fs: Scanning with blocksize 512 failed 09:36:38 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000140)={0xb2, 0x10000, 0x1}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) [ 1215.394804][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.433402][ T3746] UDF-fs: Scanning with blocksize 1024 failed 09:36:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000048010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1215.474882][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.565728][ T3746] UDF-fs: Scanning with blocksize 2048 failed [ 1215.586267][ T3746] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.605623][ T3746] UDF-fs: Scanning with blocksize 4096 failed 09:36:38 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x604000000000000}}]}) [ 1215.772440][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.786171][ T3802] UDF-fs: Scanning with blocksize 512 failed 09:36:38 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1215.825715][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.857913][ T3802] UDF-fs: Scanning with blocksize 1024 failed [ 1215.871537][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.879174][ T3802] UDF-fs: Scanning with blocksize 2048 failed [ 1215.886858][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.897513][ T3802] UDF-fs: Scanning with blocksize 4096 failed [ 1215.960495][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.968172][ T3802] UDF-fs: Scanning with blocksize 512 failed [ 1215.980138][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1215.987982][ T3802] UDF-fs: Scanning with blocksize 1024 failed [ 1215.997598][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1216.006868][ T3802] UDF-fs: Scanning with blocksize 2048 failed [ 1216.017681][ T3802] UDF-fs: warning (device loop4): udf_load_vrs: No VRS found [ 1216.027258][ T3802] UDF-fs: Scanning with blocksize 4096 failed 09:36:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffffffffff, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000001102000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:38 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) epoll_create1(0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) bind$bt_l2cap(r4, &(0x7f0000000300)={0x1f, 0x738, @fixed={[], 0x10}}, 0xe) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.nlink\x00') pwritev(r3, 0x0, 0x0, 0x0, 0x20000000) r5 = syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="1e7a14e30ec46ba7bdce17c1fccbc2462331c2062868a742296c3831cc02d5744fe93f58187310701256e9f13ff41785484c934ab6497163", 0x38, 0x9}], 0x8010a0, &(0x7f0000000240)={[{@user_subvol_rm='user_subvol_rm_allowed'}, {@subvol={'subvol', 0x3d, '/dev/cuse\x00'}}, {@degraded='degraded'}, {@nodatasum='nodatasum'}], [{@pcr={'pcr', 0x3d, 0x1}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fowner_eq={'fowner'}}]}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000000)={'macsec0\x00', {0x2, 0x0, @loopback}}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000100)={0x6}) 09:36:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600004c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:38 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x700000000000000}}]}) 09:36:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000060010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1216.219955][ T3827] UDF-fs: bad mount option "fileset=00504403158265495552" or missing value 09:36:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000068010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1216.355525][ T3827] UDF-fs: bad mount option "fileset=00504403158265495552" or missing value 09:36:39 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x800000000000000}}]}) 09:36:39 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x80000) fchmod(r0, 0x28) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080)='NLBL_CALIPSO\x00') ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, &(0x7f0000000140)={0x9, 0x8}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000100)=r4) socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x1bd000, 0x0) accept4(r5, 0x0, &(0x7f00000002c0), 0x80800) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x3, 0x6, 0x10000}, &(0x7f0000000240)=0x10) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="04002dbd7000fcdbdf250300000008000100030000000800010000000000"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) 09:36:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600006c010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000001202000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1216.497583][ T3856] UDF-fs: bad mount option "fileset=00576460752303423488" or missing value [ 1216.615131][ T3856] UDF-fs: bad mount option "fileset=00576460752303423488" or missing value 09:36:39 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46e1ac23153d455ab101886a0ee10b020000000000000000c4b40003033e000039010000800000000000000000000000000000dfeb7bba00280693bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b9a8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d3e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db877125e7fedaa50effc3254cf3b626103947f53df08167cbec744ba58444396a4bf37d312166f3a3770971e1f7b52ada18f53fb9c725c62693c7b76bdd79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c5f496624bab91722069f2e0d843369180d4f81a1e3509000000000000000000000000ef9f1596680814c4df8483320892a7d7d7f0048f56f60abf88bd9bf30f3989c500"/429], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000000)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88807ce31018, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000074010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:39 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x3}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002001}) 09:36:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000002002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:39 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x900000000000000}}]}) 09:36:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600007a010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:40 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$HIDIOCSFLAG(0xffffffffffffffff, 0x4004480f, &(0x7f0000000000)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000140)=0xc) setsockopt$CAN_RAW_RECV_OWN_MSGS(r2, 0x65, 0x4, &(0x7f0000000080)=0x1, 0x4) [ 1217.212389][ T3896] UDF-fs: bad mount option "fileset=00648518346341351424" or missing value 09:36:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000a8010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:40 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0x9bc47af00000000}}]}) 09:36:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000102002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000da010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1217.406222][ T3919] validate_nla: 32 callbacks suppressed [ 1217.406236][ T3919] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1217.422963][ T3921] UDF-fs: bad mount option "fileset=00701514458907803648" or missing value [ 1217.461889][ T3919] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:40 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/431], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1217.569731][ T3921] UDF-fs: bad mount option "fileset=00701514458907803648" or missing value 09:36:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88807ce31918, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:40 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f00000017c0)={0x6, 0x8}) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000100000000000400000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000240012800c0001006d6163766c616e001400028008000300000000000800010010"], 0x44}}, 0x0) r6 = syz_init_net_socket$ax25(0x3, 0x5, 0xce) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000001740), &(0x7f0000001780)=0x8) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r2, &(0x7f0000001700)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000016c0)={&(0x7f0000000180)={0x1530, r3, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x11b8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_MASK={0xfa, 0x5, "1653f5f51c17f740129b6862758ac04a820bb94499239c38655d603dac815bc5abc9cc6bfccc6585d3f8974a3c34f4d3298ca624ce0e0d483322b84eb5b0ad1472e14c19b9f35b2e482f9d779fb2673076e8ef290ffa8abaf733f44d2a98ecc2966914239a7a236f1817e7e1f3f67fde79b35ee56f8df27c56911caf229932e9584559b8fc63a231de79513ece8d9e9fa85e16bc1aaa81aa20171a6dff3c2333515ae30f8728f8a2a5b3747b6b05133372c7f37d25fbc3e012e1912f5f8ac134ae4b8a4c915d352d36e9bdb1a0f7b0514c536a5615e99aa849788e9b582099be2b27d64398259d7885edd4c187a0882eaa9701fa7944"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_MASK={0xac, 0x5, "9150c79be81a695f10f299dc8b656f4907b39c21626b86e39131e6d183823006ab595f781202645ade93f794b94108ccae8bf985736fd241eeb2955b3ead514539b0eb2cb02f46895de03cd926bce95001319e2239d2c68e97f7b22f173b1d0b84f08596060ddf835d933595ed5c2f1036e810b5132b41d1c5f96cb875c0e58821808fec83ab3a459e5c91676544db5908cefaca5d1e1a273e485ca108bcedd4673af4aa437b0c83"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x18c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xb4, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ffc}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '{:]'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4277}]}]}, @ETHTOOL_A_BITSET_VALUE={0xd4, 0x4, "7fb72f2129ebf3674a8b04b959e15fb9c72cdc9b6de3aeab757d05bacc95441ce5b4962fc8c30f3bf9f0f64b710448b15d944c64fc42f9fb96b9d9a578d389f7e5fccff1f4ebdd37c9361cb51489074a61bc3986b16784cce3dbc87b6c61d5f46edc8ef8dcd559b5ac314488f648cedf6b0f76781a843ebdde453269c48ee0b847cc81cd783904680fb68b143eaddba1eac0bb4831fea9bb68b1ba28ac9fb8cd2fe58e5d4c179793a9ce1d265c7b5b8bc19cc8e2f7703a829ba41266438a7c3a09f167153ea49f793834a936d46d2dc2"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1bc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x158, 0x3, 0x0, 0x1, [{0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xba\'{\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '}*!\\--\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '&*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5308}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '}#j\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd142}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x82}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x60, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '%\f{&\x05%&)\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/cuse\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-\\\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3c}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}]}]}]}]}, 0x1530}, 0x1, 0x0, 0x0, 0x854}, 0x20000000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000fc010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000002502000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:40 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xa00000000000000}}]}) [ 1218.126805][ T3955] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1218.137904][ T3953] UDF-fs: bad mount option "fileset=00720575940379279360" or missing value [ 1218.150980][ T3955] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:41 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000140)={0x4, 0x80008, "1113ef55d65f99d7ac2229ae4479a39d4c0f0fbe31c18247", {0x4ca, 0x5000000}, 0xfffffff9}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) 09:36:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000fd010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000002e02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1218.274026][ T3953] UDF-fs: bad mount option "fileset=00720575940379279360" or missing value [ 1218.314651][ T3971] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:41 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r1, 0x2287, &(0x7f0000000180)=0x3) r2 = epoll_create1(0x0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) fstat(r0, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000080)={0x0, 0x80000001, 0x101}) [ 1218.359662][ T3971] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:41 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xb00000000000000}}]}) 09:36:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000030000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1218.451037][ T3984] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1218.463525][ T3984] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:41 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) [ 1218.547034][ T3986] UDF-fs: bad mount option "fileset=00792633534417207296" or missing value [ 1218.601211][ T3986] UDF-fs: bad mount option "fileset=00792633534417207296" or missing value 09:36:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000001580)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000003f02000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:41 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f00000000c0)={0x40002005}) fallocate(0xffffffffffffffff, 0x2, 0xffff, 0x4000800000000000) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="440000001000010000000000040000000000000089b5723abbe1152fb446c1da3956421c9fe6054c00e1add047d4656ace68073fa8868ddc339659e3894e30b26bdb436f3c01ad", @ANYRES32=r4, @ANYBLOB="000000000000000024001276d012000c0001006d6163766c616e001400028014000300000000a90800010010"], 0x44}}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000000)={@loopback, r4}, 0x14) 09:36:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000050000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:41 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xc00000000000000}}]}) [ 1219.112576][ T4022] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 1219.122189][ T4021] UDF-fs: bad mount option "fileset=00864691128455135232" or missing value [ 1219.149711][ T4022] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 09:36:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000080)={0x13, 0x65, 0xffff, 0x8000, 0x6, '9P2000'}, 0x13) ioctl$SNDCTL_DSP_RESET(r1, 0x5000, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r4 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r3, &(0x7f00000000c0)={0x40002005}) [ 1219.213917][ T4021] UDF-fs: bad mount option "fileset=00864691128455135232" or missing value 09:36:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200000004002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000060000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:42 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd00000000000000}}]}) 09:36:42 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) r2 = accept$ax25(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @default}, [@rose, @default, @remote, @netrom, @rose, @bcast, @null, @netrom]}, &(0x7f0000000000)=0x48) ioctl$SIOCAX25ADDFWD(r2, 0x89ea, &(0x7f0000000340)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd4, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x9}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4213}, {0x6, 0x11, 0x9}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8000}, {0x6, 0x11, 0x1ff}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000800}, 0xbb96c5ff521194f2) 09:36:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x4, &(0x7f0000000100)={0x102e, 0xd829, 0x8000}) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000040)=""/61, 0xffffff78}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[@ANYBLOB="7f454c46e1ac03153d455ab101886a0ee10b020000000000000000c4b40003003e000039a594249c1fd83d00001293bd5d74dafc20380003a925c0fe6ce4eb209bf02849d96b7d8f03a0e429a88f28af65b93a913f2bd6b6d133b92449382fb7482660b371862dd3639923cf42ec82d63a8f3e480a57974958014609a2660f3646a0493db6208fa6010000000000000011df5b51fde769e9ace1963439e3cc6d14e294183e80e8fcb2835659292c52d2dc7c12fc88f4c679447d02194f9c7d2f94d52f04909586de9f072f5ab941b1261ef79e39a587fe4038b4e8db878b8ee7fedaa50effdc254cf3b626103947f53df08167cbec744ba38444396a4bf37d312166f3a377335abc71e1f7b52ada18f53fb9c725c62693c7b76bddf83ff39d334f1a8d79932179718d64d0f7dab77b1f5913bbae64d5340c323b352147006fe7dc3d24b9d5502c074a316a8f30b060dd94fa5edd2f8a3b8f68f052f6c59e96624bab91722069f2e0d843369180d4f80e1e352f990000000000000000000000ef9f1596680814c4df8483320875a7d7d7f0048f56f60abf88bd9bf30f3989c50000000000000000000000000000ecd9a77b4d"], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x46, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000070000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 1219.518994][ T4054] UDF-fs: bad mount option "fileset=00936748722493063168" or missing value 09:36:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="080000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:42 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x13, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x202, &(0x7f0000000080)={&(0x7f0000000000)=""/63, 0x3f}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/415], 0x3c) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000140)={0xcdf5, 0x0, 0x2}) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, &(0x7f0000000280)={0x9, r2}) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x0, @remote, 0x7fff}}, 0x0, 0x2, 0x3c, 0x0, "0000000000000400"}, 0xd8) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x1802}, 0x1c) r3 = clone3(&(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigqueueinfo(r3, 0x40, &(0x7f00000016c0)={0x0, 0x0, 0x80000000}) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r4, &(0x7f0000000040)=""/46, 0x2e) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) 09:36:42 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x4000201d}) 09:36:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="200008004002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:42 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xd03000000000000}}]}) 09:36:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000a0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000b0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:42 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') ioctl$BTRFS_IOC_RESIZE(r2, 0x50009403, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="000000002b3030303030e0593030303030303030303030303030"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000000), 0x0, 0x80000, 0x0, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x4}}, 0x18) 09:36:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="2000a0804102000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0xa08041, &(0x7f0000001480)) [ 1220.093743][ T4093] UDF-fs: bad mount option "fileset=00937593147423195136" or missing value [ 1220.104902][ T4098] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1220.115209][ T4098] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) 09:36:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff060000000c0000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) 09:36:43 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x6}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000000c0)={0x40002005}) r2 = accept4$rose(0xffffffffffffffff, &(0x7f0000000140)=@full={0xb, @remote, @null, 0x0, [@remote, @netrom, @bcast, @default, @null, @netrom]}, &(0x7f0000000180)=0x40, 0x800) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000013c0)={0x0, 0xf9f}, &(0x7f0000001400)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000001440)={r4, @in6={{0xa, 0x4e24, 0x7, @ipv4={[], [], @local}, 0x9}}, 0x8000, 0x3}, &(0x7f0000001500)=0x90) r5 = fcntl$dupfd(r0, 0x0, r2) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, r6, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x800}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x40}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xc9}]}, 0x3c}}, 0x40000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000001c0)={0x4}) r7 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r7, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r7, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1015, 0x3) r8 = syz_open_dev$ptys(0xc, 0x3, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0x2}, 0x1) ioctl$TIOCMBIC(r8, 0x5417, &(0x7f0000000000)=0x3) [ 1220.193571][ T4093] UDF-fs: bad mount option "fileset=00937593147423195136" or missing value 09:36:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000001580)="0a0000000002000019000000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b000000800000002f", 0x5d, 0x400}], 0xa08041, &(0x7f0000001480)) 09:36:43 executing program 4: syz_mount_image$udf(&(0x7f0000000040)='udf\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f00000022c0)={[{@fileset={'fileset', 0x3d, 0xe00000000000000}}]}) [ 1220.425348][ T4147] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1220.433738][ T4146] UDF-fs: bad mount option "fileset=01008806316530991104" or missing value [ 1220.448878][ T4147] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1220.552106][ T4147] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 1220.560530][ T4147] EXT4-fs (loop5): fragment/cluster size (16384) != block size (1024) [ 1220.561561][ T4146] UDF-fs: bad mount option "fileset=01008806316530991104" or missing value [ 1220.874975][ T4894] ================================================================== [ 1220.883183][ T4894] BUG: KCSAN: data-race in __fsnotify_parent / vfs_rename [ 1220.890259][ T4894] [ 1220.892577][ T4894] read-write to 0xffff88805fb249c0 of 4 bytes by task 4129 on cpu 1: [ 1220.900744][ T4894] vfs_rename+0xcd9/0xe20 [ 1220.905062][ T4894] do_renameat2+0x56c/0x930 [ 1220.909546][ T4894] __x64_sys_rename+0x3a/0x40 [ 1220.914202][ T4894] do_syscall_64+0x39/0x80 [ 1220.918590][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.924446][ T4894] [ 1220.926745][ T4894] read to 0xffff88805fb249c0 of 4 bytes by task 4894 on cpu 0: [ 1220.934254][ T4894] __fsnotify_parent+0x83/0x460 [ 1220.939074][ T4894] __fput+0x184/0x4d0 [ 1220.943026][ T4894] ____fput+0x11/0x20 [ 1220.946980][ T4894] task_work_run+0x8e/0x110 [ 1220.951462][ T4894] exit_to_user_mode_prepare+0x13c/0x170 [ 1220.957063][ T4894] syscall_exit_to_user_mode+0x16/0x30 [ 1220.962491][ T4894] do_syscall_64+0x45/0x80 [ 1220.966876][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.972730][ T4894] [ 1220.975041][ T4894] Reported by Kernel Concurrency Sanitizer on: [ 1220.981161][ T4894] CPU: 0 PID: 4894 Comm: systemd-udevd Not tainted 5.10.0-rc3-syzkaller #0 [ 1220.989712][ T4894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.999737][ T4894] ================================================================== [ 1221.007766][ T4894] Kernel panic - not syncing: panic_on_warn set ... [ 1221.014322][ T4894] CPU: 0 PID: 4894 Comm: systemd-udevd Not tainted 5.10.0-rc3-syzkaller #0 [ 1221.022873][ T4894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.032895][ T4894] Call Trace: [ 1221.036154][ T4894] dump_stack+0x116/0x15d [ 1221.040456][ T4894] panic+0x1e7/0x5fa [ 1221.044321][ T4894] ? vprintk_emit+0x2f2/0x370 [ 1221.049015][ T4894] kcsan_report+0x67b/0x680 [ 1221.053494][ T4894] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 1221.059008][ T4894] ? __fsnotify_parent+0x83/0x460 [ 1221.064002][ T4894] ? __fput+0x184/0x4d0 [ 1221.068126][ T4894] ? ____fput+0x11/0x20 [ 1221.072266][ T4894] ? task_work_run+0x8e/0x110 [ 1221.076912][ T4894] ? exit_to_user_mode_prepare+0x13c/0x170 [ 1221.082683][ T4894] ? syscall_exit_to_user_mode+0x16/0x30 [ 1221.088285][ T4894] ? do_syscall_64+0x45/0x80 [ 1221.092843][ T4894] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1221.098885][ T4894] ? current_time+0xdb/0x190 [ 1221.103444][ T4894] ? atime_needs_update+0x20f/0x370 [ 1221.108609][ T4894] kcsan_setup_watchpoint+0x46a/0x4d0 [ 1221.113951][ T4894] __fsnotify_parent+0x83/0x460 [ 1221.118768][ T4894] ? vfs_read+0x3ce/0x5c0 [ 1221.123074][ T4894] __fput+0x184/0x4d0 [ 1221.127027][ T4894] ____fput+0x11/0x20 [ 1221.130981][ T4894] task_work_run+0x8e/0x110 [ 1221.135453][ T4894] exit_to_user_mode_prepare+0x13c/0x170 [ 1221.141094][ T4894] syscall_exit_to_user_mode+0x16/0x30 [ 1221.146520][ T4894] do_syscall_64+0x45/0x80 [ 1221.150906][ T4894] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1221.156767][ T4894] RIP: 0033:0x7f8c9b053a4b [ 1221.161184][ T4894] Code: 48 8b 34 24 eb c5 66 0f 1f 84 00 00 00 00 00 48 c7 c0 ff ff ff ff eb c8 0f 1f 80 00 00 00 00 48 63 7f 70 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 f3 c3 0f 1f 00 48 8b 15 19 74 32 00 f7 d8 [ 1221.180759][ T4894] RSP: 002b:00007ffc884b8788 EFLAGS: 00000206 ORIG_RAX: 0000000000000003 [ 1221.189148][ T4894] RAX: 0000000000000000 RBX: 00005624462b4570 RCX: 00007f8c9b053a4b [ 1221.197205][ T4894] RDX: 00007f8c9b377900 RSI: 0000000000000001 RDI: 000000000000000e [ 1221.205148][ T4894] RBP: 00007f8c9b378440 R08: 00007f8c9c24a8c0 R09: 00005624462b4570 [ 1221.213090][ T4894] R10: 00007f8c9c24a8c0 R11: 0000000000000206 R12: 0000000000000000 [ 1221.221043][ T4894] R13: 0000000000000000 R14: 000000000000006e R15: 00007ffc884b8940 [ 1221.229696][ T4894] Kernel Offset: disabled [ 1221.234003][ T4894] Rebooting in 86400 seconds..