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", 0x1000, 0x4}, {&(0x7f00000006c0)="99829d49ba14e340caf9770953718b0fb596ee811b7842cc78dd3a08c8a2392c51a72543f8065a8ec58273184ddc0b70e04ec4a6b95e5f3bfeb961406fb163af050c24f4099b8a737fc3aa65a6f28e998188b0175f1e24759b2404c2896b60f380b32ee2979c405c6cfdca07d858c1dd8a66b0d229be2627ebcbe876ee76f4e2ee1f968d2a7ada9e267762dca3a44647f75169909ec0929378a90a1c50e73caaf11ba58e31788222", 0xa8, 0xffffffff80000000}, {&(0x7f0000000780)="fbdbc3aa3f2c63a23aee3ee884ab5b0e9e5f1caf575334cc5fe6c2c2a26ff4676beb101edf5b390494639145656ad7c1d896be3b4ffe8d3d826413757c96fe3ca2f0eb04dc2918947077702caa48608c9556cc43911c70eb8a114e499b0faa41cc7ad8a277d0bc55d38aa9f8f3dbf1699ada24811a480182eafcc703677b964d1f03c9266a0b65248fc8eb0a8b47c69e3bdbc62909aef028ba2e26cb122798cae7fc5f7626a1a8263bc4662218255610c5ff1a13aa", 0xb5, 0x401}], 0x1000000, &(0x7f0000000f00)={[{@errors_repair}, {}, {@errors_zone_offline}, {}, {@errors_repair}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_eq}, {@fsname={'fsname', 0x3d, 'configfs\x00'}}, {@euid_lt={'euid<', r5}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="00000000000003ffa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:42 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:28:42 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="e60100", @ANYRESHEX=r2]) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000300)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x9, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000005000000181a00000000000000", @ANYRES32, @ANYBLOB="000000000000000046380000f0ffffff0da801000100000018150000", @ANYRES32, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x17, r2, 0x8, &(0x7f0000000280)={0x7, 0x4}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0xc, 0x9, 0x5}, 0x10, r3, r1}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r4, 0x4020744f, 0x0) 08:28:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4094}, 0x800) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1461.928072][ T26] audit: type=1804 audit(1637828923.112:832): pid=3724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/693/file0/file0" dev="sda1" ino=14488 res=1 errno=0 08:28:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4094}, 0x800) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:43 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3]) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x1) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1462.075846][ T26] audit: type=1804 audit(1637828923.182:833): pid=3724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/693/file0/file0" dev="sda1" ino=14488 res=1 errno=0 08:28:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4094}, 0x800) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1462.380373][ T26] audit: type=1804 audit(1637828923.572:834): pid=3811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/694/file0/file0" dev="sda1" ino=14464 res=1 errno=0 08:28:43 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f000000a000)=[{{&(0x7f00000006c0)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000740)=""/200, 0xc8}, {&(0x7f0000000a40)=""/169, 0xa9}, {&(0x7f0000000b00)=""/94, 0x5e}, {&(0x7f0000000b80)=""/226, 0xe2}], 0x4, &(0x7f0000000c80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}}, {{&(0x7f0000000dc0), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000e40)=""/220, 0xdc}, {&(0x7f0000000f40)=""/98, 0x62}, {&(0x7f00000005c0)=""/53, 0x35}], 0x3, &(0x7f0000000fc0)=[@rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}}, {{&(0x7f0000001100), 0x6e, &(0x7f00000016c0)=[{&(0x7f00000009c0)=""/46, 0x2e}, {&(0x7f0000001180)=""/169, 0xa9}, {&(0x7f0000001240)=""/141, 0x8d}, {&(0x7f0000001400)=""/200, 0xc8}, {&(0x7f0000001300)=""/72, 0x48}, {&(0x7f0000001540)=""/226, 0xe2}, {&(0x7f0000001080)=""/37, 0x25}], 0x7}}, {{&(0x7f0000001740), 0x6e, &(0x7f0000001a00)=[{&(0x7f00000017c0)=""/197, 0xc5}, {&(0x7f00000018c0)=""/61, 0x3d}, {&(0x7f0000001900)=""/201, 0xc9}], 0x3, &(0x7f0000001a40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000002bc0)=[{&(0x7f0000001b40)=""/102, 0x66}, {&(0x7f0000001bc0)=""/4096, 0x1000}], 0x2, &(0x7f0000002c00)}}, {{&(0x7f0000002c40)=@abs, 0x6e, &(0x7f0000004100)=[{&(0x7f0000002cc0)=""/241, 0xf1}, {&(0x7f0000002dc0)=""/86, 0x56}, {&(0x7f0000002e40)=""/180, 0xb4}, {&(0x7f0000002f00)=""/22, 0x16}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/199, 0xc7}, {&(0x7f0000004040)=""/133, 0x85}], 0x7, &(0x7f0000004180)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0}}, {{&(0x7f0000004280)=@abs, 0x6e, &(0x7f0000004500)=[{&(0x7f00000067c0)=""/4096, 0x1000}, {&(0x7f0000004300)=""/61, 0x3d}, {&(0x7f0000004340)=""/239, 0xef}, {&(0x7f0000004440)=""/190, 0xbe}], 0x4, &(0x7f0000004600)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000dd3d00000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x108}}, {{&(0x7f0000004540)=@abs, 0x6e, &(0x7f0000009a80)=[{&(0x7f00000077c0)=""/120, 0x78}, {&(0x7f0000004740)=""/44, 0x2c}, {&(0x7f0000007840)=""/4096, 0x1000}, {&(0x7f0000008840)=""/130, 0x82}, {&(0x7f0000008900)=""/4096, 0x1000}, {&(0x7f0000009900)=""/128, 0x80}, {&(0x7f0000009980)=""/239, 0xef}], 0x7, &(0x7f0000009b00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000009b40), 0x6e, &(0x7f0000009f40)=[{&(0x7f0000009bc0)=""/20, 0x14}, {&(0x7f0000009c00)=""/180, 0xb4}, {&(0x7f0000009cc0)=""/255, 0xff}, {&(0x7f0000009dc0)=""/143, 0x8f}, {&(0x7f0000009e80)=""/151, 0x97}], 0x5, &(0x7f0000009fc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}], 0x9, 0x100, &(0x7f000000a240)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, r0, 0x8000000003, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:43 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4094}, 0x800) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1462.624066][ T26] audit: type=1804 audit(1637828923.812:835): pid=3831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/695/file0/file0" dev="sda1" ino=14480 res=1 errno=0 [ 1462.748286][ T26] audit: type=1804 audit(1637828923.862:836): pid=3831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/695/file0/file0" dev="sda1" ino=14480 res=1 errno=0 08:28:44 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x5460, 0x0) 08:28:45 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1, 0x7b}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ftruncate(r1, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f00000000c0)={0x0, 'vlan1\x00', {0x3}}) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r3, &(0x7f0000000040)={{0x3, @null, 0x3}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @bcast, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x200005, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x121000, 0x0) 08:28:45 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1c00c1, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:45 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4094}, 0x800) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:45 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x608300, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000140)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="66a21e643d", @ANYRESHEX=r2, @ANYRESDEC]) ioctl$PPPIOCSFLAGS1(r3, 0x40047454, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$llc(0x1a, 0x0, 0x0) poll(&(0x7f00000003c0)=[{}, {0xffffffffffffffff, 0x1200}, {r3, 0x8000}, {0xffffffffffffffff, 0x88}], 0x4, 0x5b) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) write$FUSE_NOTIFY_STORE(r4, &(0x7f00000000c0)={0x2b, 0x4, 0x0, {0x3, 0xe00000000000, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) [ 1464.127870][ T26] audit: type=1804 audit(1637828925.312:837): pid=3910 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/696/file0/file0" dev="sda1" ino=14442 res=1 errno=0 [ 1464.281188][ T26] audit: type=1804 audit(1637828925.352:838): pid=3921 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/696/file0/file0" dev="sda1" ino=14442 res=1 errno=0 [ 1464.680372][ T3919] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de [ 1465.332789][ T3919] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de 08:28:47 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x80000e) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x10) 08:28:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000400000006000b00020000000800020005"], 0x24}}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:47 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x195) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:47 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x4000000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRES32=r2]) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000010100000000000020000000850000002a00000000000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x7fff, 0x41, &(0x7f00000007c0)=""/65, 0x40f00, 0x3, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000840)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0x8, 0x9, 0x6}, 0x10, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r4, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) sendmmsg(r4, &(0x7f0000000700)=[{{&(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x2}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000300)="958cb24447a00b3360d0cba8eba62566cbe47abb3411b913c89c0acae660613aab7044196aec5d1a2d8c8d7cf5461c51163cc5ef36be9116a9db0ecce060be21cfa0b99018542bf798e749af211c18888fb47101325af36b8d177696a897c3eb8273b6fca8a285c7046ce01cdd2309f22e7f12f3d07fa3771b473fe7af4022207ac04405f3f2a80bb533b3d900219b8c9949b6a421eb606b37468c8e15036674ed562e59d898e5f34c0b16929d170c6ac9fa31ad5e21b0b66bc4fde34045e54dbd0cf551a91cbe00166bff6395d28dbb288e0f7d5620adb8b28550d87a0bbb4590ffb5fb822d05fdd65dfd1d5bf332bf1c", 0xf1}, {&(0x7f0000000400)="7012dc4fe0b58f1c90bcd2a4c849d812a095e5382686b2167f752fa3c665111e1a54ffde5059dfd06a2d5d6925b8d4884f50b533293db47fe3962ef4ff689fe2a8af549908258a932e3015846c1ea90d81c8fdaf118b53b6904dc7a38379d092e03297237698483214140332611fd67301f7d1da623c", 0x76}, {&(0x7f0000000480)="f413a2936c99fba354dae3ea193cb5b5327c042cfca3ce345756fb01bc30062d29b167e1b97cf8d633b66243eeb10cf7405e05b133cf3015a45526d8f1e51f18d2b55ed5f03735", 0x47}], 0x3, &(0x7f0000000500)=[{0x58, 0x101, 0x2, "c5338fa1221e170ef40d51a4485c8f6680b8b912e1e1f62d5df47da4b3b9732683ad9fa5a24bcb764f13f327e8a6df6094eb538809348e4313cafd5d54eff7ab5206"}, {0x80, 0x6, 0x81, "e032486a84b171276e5d27dfe47ca10aa96776abdf7c3ed0787dd8b38999d19345c757f55bbeb740ef5620d7b070576a4cd1aee21745017698ed63830088ff6db3bdf8bea1de0cf9d44b39aeb185023e5d2f36be1733ec66f8f4424034d83a7acf16dbdb0a85bb0b99766d"}, {0x80, 0x88, 0x7, "0870789532fbd1849340f2ebd98cc56e00d710891166ec4a81089b4a954d012b4f498d9ed3280fc9edba2335028a0910e23d4f878eb6dbbe37d18bece0d840f7c9d8550a0a55018edf9554b9030e4599395e4edcbd91c669d74faa85acabbaed962ae037f49e404053bddd27cf8a06"}, {0xa8, 0x84, 0x9, "368feec4eb6dfc809a5aa567146abfb9f1dc0064e04a44e54cea12af778ffa28ed279914a16f723dda5c8b74b6095d323877f301002af683fdcdb12e94551623457c537888c4b5164d543d33a4a2168788c025532a2151564d7c8013bd5aa435fc950a5e36c344205afe4f2d27b5a605c34154d86c32cbb652d412aa6136a3a087ea642b5b3aee35d72beceaa6069d2e27b2ba2f"}], 0x200}}], 0x1, 0x11) 08:28:47 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='memory.current\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=@bridge_getlink={0x3c, 0x12, 0x100, 0x70bd28, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2010, 0x2000}, [@IFLA_PHYS_SWITCH_ID={0xb, 0x24, "5552c7b41c2c54"}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_TXQLEN={0x8, 0xd, 0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:28:47 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1466.663868][ T26] audit: type=1804 audit(1637828927.852:839): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/697/file0/file0" dev="sda1" ino=13985 res=1 errno=0 08:28:48 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r6 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140), 0x200040, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r4) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x81, 0x6, 0x3f, 0x4, 0x0, 0x8, 0x40004, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffff300, 0x4, @perf_config_ext={0x1000, 0x9}, 0xc800, 0x74, 0x5, 0x5, 0x1ff, 0x5, 0x7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x5, r0, 0x4) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1466.879000][ T26] audit: type=1804 audit(1637828927.892:840): pid=4119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/697/file0/file0" dev="sda1" ino=13985 res=1 errno=0 [ 1467.182563][ T26] audit: type=1804 audit(1637828928.372:841): pid=4168 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/698/file0/file0" dev="sda1" ino=14445 res=1 errno=0 [ 1467.304835][ T26] audit: type=1804 audit(1637828928.412:842): pid=4181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/698/file0/file0" dev="sda1" ino=14445 res=1 errno=0 08:28:49 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x5501, 0x0) 08:28:49 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:49 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8082, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) 08:28:49 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0, 0x0, 0xa5}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x248400, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) r5 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r3) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:49 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = signalfd4(r1, &(0x7f0000000140)={[0x7fffffff]}, 0x8, 0x80c00) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3]) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x14, 0xb, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x289}, [@jmp={0x5, 0x1, 0x8, 0x7f640537817c7a3, 0xb, 0xfffffffffffffff4, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @map={0x18, 0x5, 0x1, 0x0, r2}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0x68}, @ldst={0x0, 0x1, 0x1, 0xb, 0x1, 0x6}]}, &(0x7f0000000300)='GPL\x00', 0x681f, 0x97, &(0x7f0000000340)=""/151, 0x40f00, 0x10, '\x00', 0x0, 0x1b, r3, 0x8, &(0x7f0000000400)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x3, 0x2, 0x20}, 0x10, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) r5 = socket$kcm(0x29, 0x5, 0x0) read(r5, &(0x7f0000000080)=""/95, 0x5f) ioctl$PPPIOCSFLAGS1(r4, 0x40047454, 0x0) 08:28:49 executing program 0: unshare(0x48040200) unshare(0x30000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x406980, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280), 0x404040, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r1, 0x0, 0x52, 0x62, &(0x7f00000002c0)="3b5b23f1bef06c1c14b0c291c71cd72c1beaca0bcd008001fd2f6b8b686f04d0279720129bd40f5cf0df867636a211b06bf37707f58d823c38415e9ff7e9153e4ebc734ad9b8da561b33a7834c38aa89c96c", &(0x7f0000000340)=""/98, 0x1, 0x0, 0xaa, 0x8d, &(0x7f00000003c0)="7e749044bf6bb37d39fe1e6506f13e757c809904a1d0f39060a5b32b6716b52ae1a7640a49e8e4545c3f7481948137334dfdae791d79ae1d7136f7fc414a35bc6b07502ec057b333db6d05fc15b43d4b0acb714f72c74e12793630b2990c0290c9c4e2be79193db193e31ed3af081812aa98f61a7b618bf2a129149ca6e30f9482b069576af23b35139626d3bc403d2716aeb75202d33e1cd003e7e7b48ad5a07fcf20323ad1391eb808", &(0x7f0000000480)="e420de82cc75c69f2e8e725ae246621e3beb4c4c6745f13ce94a278c25884c20c4d0177e58c103562ce9c6cfddd91d32b102168b9f79d924d74abc1d1bdb2e3d77a39a5f4e0c196fd89ea122544931e067b10e4fc25bff93817dbe8cc6413e1f7bc063f0d45bce1e4f34c5bf5c23f5c5149b2b16bfc9261501e53731a9a3f8552d50379bf62938d49d6d516acd", 0x643bde113356ab25, 0x100}, 0x48) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x678f653d650e2ad0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/242) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:28:50 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1469.007704][ T26] audit: type=1804 audit(1637828930.192:843): pid=4298 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/699/file0/file0" dev="sda1" ino=14307 res=1 errno=0 08:28:50 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0xfd, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @usage=0x400, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @usage=0x40, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x3}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r0]) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r2) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) chdir(&(0x7f00000005c0)='./file0\x00') 08:28:50 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:50 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f00000000c0)) 08:28:50 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1469.659381][ T26] audit: type=1804 audit(1637828930.852:844): pid=4373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/700/file0/file0" dev="sda1" ino=14018 res=1 errno=0 08:28:51 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="78001016008f0f36a650a088c4ebefacc03313b8bd74e6f9c8f0243f301c0500c12e9515c6198869b6e81d3eee18d8132a9bd1586cc340510d665ffc1c87c1d118fa0992770af892c708cd68220bc7b9592ee03fa44e11c1aea2ebf05500"/103, @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000140)={r2, 0x7, 0xa9db, 0x2}) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000900)={@x25, {&(0x7f00000016c0)=""/4096, 0x1000}, &(0x7f00000005c0), 0x1a}, 0xa0) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1469.829855][ T26] audit: type=1804 audit(1637828930.892:845): pid=4373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/700/file0/file0" dev="sda1" ino=14018 res=1 errno=0 [ 1470.272995][ T26] audit: type=1804 audit(1637828931.462:846): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/701/file0/file0" dev="sda1" ino=14002 res=1 errno=0 08:28:55 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x5509, 0x0) 08:28:55 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:55 executing program 5: umount2(&(0x7f0000000640)='./file1\x00', 0x2) mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$sysv(&(0x7f0000000140), &(0x7f00000005c0)='./file1\x00', 0x2, 0x0, &(0x7f0000000640), 0x1, &(0x7f00000006c0)={[{'-'}, {'msdos\x00'}], [{@seclabel}, {@fsname={'fsname', 0x3d, '}\xa1-&!^['}}, {@euid_gt={'euid>', r4}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffeffffffff}}, {@seclabel}]}) 08:28:55 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) r3 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) pwritev(r3, &(0x7f0000000040)=[{&(0x7f0000000280)="8d6182a251c1abb4ee77e6fe7d85652edc1157025830eb31f87de5191e4483921136da09a011cfa3cd29d0dfd18e9568e1b98e003a98c54f4aaf46f44d0cd988557808f56245fbc6a98936589325b91b0d3417532cfc0ef8a05c5118ddf1d1e6f9f2ba8e25226bcc9cc01c3bcfa2be2a8ce845ac5720890ec95f05cafa91fa308e77c6733e61ffaeb6b87f93a8018a116d5a6e6525fd1c874144048dbc7d3329c53b6bbfca38c3938c934150ce", 0xad}, {&(0x7f0000000340)="7f590289ca0e90d394cf4ac26c75ebe87d47152757466e75149e445c691f61bfcb1aae83faf1f8c48428fb96b19b151d3dd50b66b3b1ddfc6ec910f339551f8dd70fa8e63751aea8196db9e422e1522d810c15bf86d9690aa21bfe0370b64f9601ee70d826227bc3cdb635c8e8ed2c6dcdb8891460c8efef4a4423de4f5b693bc840d2fa8ba5db2bcfb633e9569f1cfa6556b6a978deb6722421831f1c72ab2b54b724f30b394bcf74011f0b559274", 0xaf}], 0x2, 0x80000000, 0x7) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f00000000c0)=0x2) 08:28:55 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1b) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:28:55 executing program 0: unshare(0x48040200) unshare(0x20000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="006ed4", @ANYRESHEX=r1]) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000140)={0x9, 0xca, 0x5, 0x3, 0x8, "d5647e98f5ab946fa2c0f27b3778bd899c39b4"}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:28:55 executing program 3: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1474.571540][ T26] audit: type=1804 audit(1637828935.752:847): pid=4636 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/702/file0/file0" dev="sda1" ino=14242 res=1 errno=0 08:28:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:56 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) rename(&(0x7f0000000140)='./file0/file1\x00', &(0x7f00000005c0)='./file0\x00') syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) creat(&(0x7f0000000640)='./file0/file0\x00', 0x2) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:28:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1475.376626][ T26] audit: type=1804 audit(1637828936.562:848): pid=4712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/703/file0/file0" dev="sda1" ino=14242 res=1 errno=0 08:28:56 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b3d0031483435345031302c687567653d616c776179732c6d61736b144d41595f455845432c657569643e", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d60a1a006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x600000, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1475.538523][ T26] audit: type=1804 audit(1637828936.562:849): pid=4712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/703/file0/file0" dev="sda1" ino=14242 res=1 errno=0 08:28:56 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(0x0, r0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:28:57 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x6364, 0x0) 08:28:57 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1475.965013][ T26] audit: type=1804 audit(1637828937.152:850): pid=4786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/704/file0/file0" dev="sda1" ino=14517 res=1 errno=0 08:28:57 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0, 0x0, 0x1ff}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYRES64=r4, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1476.423431][ T26] audit: type=1804 audit(1637828937.612:851): pid=4795 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/705/file0/file0" dev="sda1" ino=14067 res=1 errno=0 [ 1476.506961][ T26] audit: type=1804 audit(1637828937.652:852): pid=4806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/705/file0/file0" dev="sda1" ino=14067 res=1 errno=0 08:28:59 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x168}}, 0x20000000) 08:29:00 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:00 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000140), &(0x7f00000002c0)={'U-', 0x401}, 0x16, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:00 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x7f, 0x20, @struct={0x759, 0xe49e}, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x83}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:00 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x7434, 0x0) 08:29:00 executing program 2: unshare(0x48040200) mmap(&(0x7f000037a000/0x4000)=nil, 0x4000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0x4, {{0xa, 0xfefe, 0x200, @private1={0xfc, 0x1, '\x00', 0x1}}}, {{0xa, 0x4e20, 0x4000, @private2}}}, 0x108) mount$fuse(0x0, 0x0, 0x0, 0x40, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESOCT=r2, @ANYRESDEC=r0, @ANYRES64=r3, @ANYRES64=r1, @ANYRES16=r0]) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r5, 0x40047438, &(0x7f0000000180)=""/246) r6 = syz_mount_image$hfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xd12, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='file_umask=00000000000000000006612,dir_umask=00000000000000000000002,uid=', @ANYRESHEX=0xee01, @ANYBLOB=',euid=', @ANYRESDEC, @ANYBLOB="2c6f626a5f747970653d2f6465762f707070002c736d61636b66737472616e736d7574653d2f6465762f70746d78002c736d61636b66737472616e736d7574653d2c667390616769633d3078303030303030303030303030303030392c6f626a5f757367723d2f6465762f70746d78002c00"]) r7 = socket$inet(0x2, 0x5, 0x1) ppoll(&(0x7f0000000380)=[{r4, 0x14}, {r6, 0x6082}, {r7, 0x52b}], 0x3, &(0x7f00000003c0)={0x77359400}, &(0x7f0000000440)={[0x4]}, 0x8) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 08:29:00 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000000c0)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1a, 0x7, 0xffffff9c, 0x9, 0x20, 0xffffffffffffffff, 0x20, '\x00', r2, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x40) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:00 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1479.157642][ T26] audit: type=1804 audit(1637828940.342:853): pid=4962 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/706/file0/file0" dev="sda1" ino=14533 res=1 errno=0 [ 1479.287633][ T4928] loop2: detected capacity change from 0 to 6 08:29:00 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd190b6d008c832c7065", @ANYRESOCT=r1]) mkdir(&(0x7f0000000140)='./file0\x00', 0x25) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:00 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1479.357315][ T4928] hfs: unable to parse mount options 08:29:00 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:00 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:00 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1479.880140][ T26] audit: type=1804 audit(1637828941.072:854): pid=5038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/707/file0/file0" dev="sda1" ino=14211 res=1 errno=0 [ 1479.960970][ T4928] loop2: detected capacity change from 0 to 6 [ 1479.985014][ T4928] hfs: unable to parse mount options 08:29:01 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocis=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1480.431023][ T26] audit: type=1804 audit(1637828941.622:855): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/708/file0/file0" dev="sda1" ino=14549 res=1 errno=0 08:29:01 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:01 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) r2 = dup(r1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xef}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x44081) 08:29:01 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x7439, 0x0) 08:29:01 executing program 0: unshare(0x60060200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:01 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x2) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f00000016c0)={0x2, 0x1, @status={[0x4, 0xfffffffffffffffc, 0xff, 0x1ff, 0x3d, 0x1]}, [0x4, 0x5, 0x5, 0xfff, 0x7ff, 0x6, 0x2, 0x9, 0x9, 0xff, 0x1, 0x10001, 0xfffffffffffffff9, 0xffffffff, 0x947, 0x9, 0xe00000000000, 0x7, 0x1f, 0x8, 0x77, 0xffffffffffffff80, 0x3, 0x0, 0x8, 0x1, 0x8, 0x0, 0x6, 0x40, 0x80000001, 0xf829, 0x4, 0x80000001, 0x200, 0xffffffffffffff00, 0x3, 0x80000001, 0x2fb, 0x9, 0x0, 0x0, 0xeb11, 0xde5b, 0x0, 0x2, 0x4, 0x29fb, 0x10000, 0x361, 0xffffffffffff0000, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x8, 0x1000, 0x4, 0x1f, 0x9]}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:01 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x22060780) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:01 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:02 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="73c90000", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1480.964258][ T26] audit: type=1804 audit(1637828942.152:856): pid=5181 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/709/file0/file0" dev="sda1" ino=14572 res=1 errno=0 08:29:02 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1481.364106][ T26] audit: type=1804 audit(1637828942.552:857): pid=5282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/710/file0/file0" dev="sda1" ino=14573 res=1 errno=0 08:29:02 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2, 0x0, 0x7, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x103400, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 08:29:02 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1481.745460][ T26] audit: type=1804 audit(1637828942.932:858): pid=5313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/711/file0/file0" dev="sda1" ino=14574 res=1 errno=0 08:29:03 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:03 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) unshare(0x20600) unshare(0x2000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1481.903297][ T26] audit: type=1804 audit(1637828942.972:859): pid=5313 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/711/file0/file0" dev="sda1" ino=14574 res=1 errno=0 [ 1482.246170][ T26] audit: type=1804 audit(1637828943.432:860): pid=5366 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/712/file0/file0" dev="sda1" ino=14550 res=1 errno=0 [ 1482.303853][ T26] audit: type=1804 audit(1637828943.472:861): pid=5369 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/712/file0/file0" dev="sda1" ino=14550 res=1 errno=0 [ 1483.829207][ T1223] ieee802154 phy0 wpan0: encryption failed: -22 [ 1483.835626][ T1223] ieee802154 phy1 wpan1: encryption failed: -22 08:29:07 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:07 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:07 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000280)={0x4, "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"}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:29:07 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x8913, 0x0) 08:29:07 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x20000000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:07 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) r2 = syz_mount_image$f2fs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x7ff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000280)="300fb29812cd4a5972d230bdb941cf9e2cdeb1e07a897255a4ac9b8918448b8739e5454e8675227c9fc09c2fcc82dd2d7624cb52f6f6b42b811326629ff54362340c0c14671e349112f0fa91121957e28fb18626ff148eb7c8684d9a89754e2ace400edad3204d8dd74721b7e9351206824f5ec9384f03b1c2c9f397c9861bd47973bec8a70ad0cb0b94b7f88ec4d1b93a8120278577a032b827017139a8563c11de453aabf35661d4f05110f857b3", 0xaf, 0xfffffffffffffff8}, {&(0x7f0000000340)="1bcfbd24a2715bf50904e7bcd49eb2498cc723fbb10cd23605091a957ab0901777e60df4cf5a8bfc55eb4d0c7f0553c18a675b9c7160a85c3a4f6736ac1019b44378d5efe928a5c7c52e7f57b89d69ac39ca8847057b0179b1bba5b1db4d2c105a471b9da2a6b4dcc2f7175d3d0bd0f861c21bfa97162450045fb34bfe9089ddd5252a85", 0x84, 0xffff}], 0x2062000, &(0x7f0000000580)=ANY=[@ANYBLOB="75737271756f74613d2f6465762f70746d78002c7768696e745f6d6f64653d66732d62617365642c757365725f78617474722c6261636b67726f756e645f67633d73796e632c66736e616d653d002c686173682c666f776e65723ec56a28c22f6de280382b9f8bb567dbf72b0892257009a6f833fdbdbe4a0a07bbbd00b3255e437a6020593b30e0b31ef9bac664ba9b3ae3e3497f96731ca4e828a3a2cd9d79f102359380eeed2eebf8f3bdfef69f49b53157cc6822ce120625d432329ea9047cf5adaab914c69e4d24598facdfbdef9cf16bf7d9b2e7", @ANYRESDEC, @ANYBLOB=',\x00']) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000480)) 08:29:08 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(0x0, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1487.185276][ T26] audit: type=1804 audit(1637828948.372:862): pid=5530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/713/file0/file0" dev="sda1" ino=14582 res=1 errno=0 08:29:08 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x25, 0x9}}, './file0\x00'}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="449265a0", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1487.289998][ T26] audit: type=1804 audit(1637828948.372:863): pid=5530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/713/file0/file0" dev="sda1" ino=14582 res=1 errno=0 08:29:08 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) 08:29:08 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x8601, 0x0) unshare(0x8000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:08 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1487.753831][ T26] audit: type=1804 audit(1637828948.942:864): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/714/file0/file0" dev="sda1" ino=14195 res=1 errno=0 08:29:09 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e5d5f626c6f63733d0031483435345031302c687567653d616c776179732c6d6158073d4d41595f455845432c657569643e0b7130ca2882600a5f1caecb9349cc82b203aad030d62f3081dabfb7732edad9e62156af02556f9b900ce7f16e16a5f1a11b83d5ec43b34dbb4e8ae2027c547ddc4f592ec6f31b3453d3706a8b4c7b7db43fa766e0b4908b9be2c76a34abc876921900", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="657d726f7273ef2cf233871408b1000043523d63", @ANYRESHEX, @ANYBLOB="2c7cd341fa54dfe2421d10fa2f330f3102c8622e52c68685d1ec7b8904e4cc859bd9bc0cf00769945660dcb26398122c0f0aa4ad1f98377a55e5efe70e25e007b502b1c6e446268f663317096822a2a6c526e44759f8614e4ef10aa2666061f1b97c2eead8729ad000be050000000c462ff2f33109376d3ee0733f500c7515bdb29192975ede242a69d72c19efc57918832fc2c4ef726c9b29ed657136c79dc852965ca389", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1487.859193][ T26] audit: type=1804 audit(1637828948.972:865): pid=5593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/714/file0/file0" dev="sda1" ino=14195 res=1 errno=0 08:29:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x4) [ 1488.038420][ T5472] loop2: detected capacity change from 0 to 16383 [ 1488.304279][ T26] audit: type=1804 audit(1637828949.492:866): pid=5687 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/715/file0/file0" dev="sda1" ino=14615 res=1 errno=0 08:29:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(0x0, 0x4) 08:29:09 executing program 5: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x4000010, 0xffffffffffffffff, 0x319ef000) mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) open(&(0x7f0000000140)='./file0/file1\x00', 0x248a00, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x7f, 0x0, @struct={0x1, 0x7f}, 0x0, 0x0, [0x0, 0xffffffffffffffff, 0x1]}, {0x0, @struct={0x8}, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x1, 0x0, 0x53, @struct, 0x2000000, 0x45d, [0x101, 0x8000, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x7, 0x0, 0x5, 0x2, 0x0, 0x0, @struct={0x40}, 0x200, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000a40)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065422b7dac35280f53555c779237d2cc82ffab72f698fae10806bbd95d884f46e49427a4e21af80c7b0e569fa9f00777dbc431", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="3f5e4469ad8dffaa203ac48f74c21547b6d2bdd9dd94dd6153080bdb0ea2b7882adda5d3ac4c3bc1700b2a5b9525f2d1a1cccfa87b85f777489c9664f247653a41eba3da5312539c01c09294cf015c9db813fde654ff06ccf7e614a7057fdfde756af905eca7bdf7f26b78918e004935d06496d0b7d9c5608327bfcec13df658425570bb553a3d85726609cac7e653f9f2117fc68047f5fcce7748080dd9fc0f68f33dd53b4b3c9b99da70fe0418204a9bfd3e3ad91114505c1691e7ecf30243dcb9d574c5", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1489.085004][ T5620] loop2: detected capacity change from 0 to 16383 [ 1489.259876][ T26] audit: type=1804 audit(1637828950.452:867): pid=5725 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/716/file0/file0" dev="sda1" ino=14576 res=1 errno=0 08:29:10 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x8914, 0x0) 08:29:10 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(0x0, 0x4) 08:29:10 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='emild>\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:10 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000480)={0x5, 0x2}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = dup3(r0, r2, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0), 0x40040, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1b, 0xd, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4f}, [@map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x7, 0x4, 0x6, 0xfffffffffffffff8, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x62}, @jmp={0x5, 0x1, 0x7, 0x7, 0xa, 0xffffffffffffffc0, 0x4}, @alu={0x4, 0x1, 0x4, 0x4, 0xb, 0xfffffffffffffff0, 0x8}, @map_val={0x18, 0x3, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x6b74}]}, &(0x7f0000000140)='GPL\x00', 0x3, 0x65, &(0x7f0000000280)=""/101, 0x40f00, 0x18, '\x00', 0x0, 0x5, r4, 0x8, &(0x7f0000000340)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x10, 0xa850, 0x2}, 0x10, 0x0, r5}, 0x78) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:29:10 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xf) r2 = signalfd4(r0, &(0x7f0000000140)={[0x2]}, 0x8, 0x100000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) syz_mount_image$romfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000600)=[{&(0x7f0000000300)="f969bd40a01cb54ebdc402666b1ff9c7c55591ddf126059209dddb883c54e32955c7eee2d7c65eec35298830bd5319c787fd106b67a759cff4636c772358fa33d75e79ed72d23d69cb", 0x49, 0x8}, {&(0x7f0000000440)="a905e7a517004f908d2c2a1c5f565eca41ce4ce19f51834792e6fb2ee5c983e176f1b4e0712eb54b54136299624972e91acafd05f08fbf57f4f84b6848345a859aa08779d184cc8ae524385dd2697a206e3bd036f3e87fd1f9353f49ab223b9b0b2009fcd1ddd98bceb47ff84efcf276ba6d45fb85a091d4d540f671427b9d9d67fc326face368bdc370dd3bb1a9d471634db920d8887f91ba740fe082cfe00804aa0393efc4107f040baa99ec32169ae3870e1cdb130cde6a62ca342f389bce96902a725d432043275a542060a1243193095c97b4", 0xd5, 0x1f}, {&(0x7f0000000540)="d1b003d69b1b08a11a287e073249cec5260ce6708187e2ae5012ef37ced03e4476ce874276a53645ee8aeb7b149a8140231674346438322ac4060b275bcb20eeaf421a94d1fca3b088777a2ff13bd1889630901c48adc6593f9e08c53a3a7c3b2036cfbeb0aae4bd95e1e93881257f8fcc41e946263cc6239ae5209d7560f41df6ca529faa6d0da7464af02b5e67667ae05eb091067e860a9fea7f82f8bf85de6e32f07a4832c1f360e23b0e47b01e54", 0xb0, 0x401}, {&(0x7f0000000380)="70fdf0ecbb5c36978844afb6e811c690451091b168ca5528639fadeb729fe7d462f72b1ee8ee2ae5f0019f45d780bf0e03d3f85f346e42518b2d852644e90ecbeade44345624ccb8f46db340e8310c5f7c63c5ad4e817017f385", 0x5a, 0x7}], 0x8040a0, &(0x7f0000000680)={[{'!'}, {'/--/\x06\\'}, {'/dev/ptmx\x00'}], [{@context={'context', 0x3d, 'staff_u'}}, {@seclabel}, {@obj_type}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:11 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(0x0, 0x4) [ 1489.905209][ T26] audit: type=1804 audit(1637828951.092:868): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/717/file0/file0" dev="sda1" ino=13870 res=1 errno=0 [ 1490.116081][ T26] audit: type=1804 audit(1637828951.122:869): pid=5781 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/717/file0/file0" dev="sda1" ino=13870 res=1 errno=0 [ 1490.404577][ T5774] loop0: detected capacity change from 0 to 4 [ 1490.643852][ T5863] loop0: detected capacity change from 0 to 4 08:29:13 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x4c0000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x10050400) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000440)=""/257) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0x3, 0x8, 0x1ff, 0x7, 0x2, "93499edb667474419ea21fc85c381a1e5aa536"}) 08:29:13 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) truncate(&(0x7f0000000140)='./file0\x00', 0x0) 08:29:13 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 08:29:13 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000e, 0x4010, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x203, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:13 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) 08:29:14 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) [ 1492.939366][ T26] audit: type=1804 audit(1637828954.132:870): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/718/file0/file0" dev="sda1" ino=14589 res=1 errno=0 [ 1493.085767][ T26] audit: type=1804 audit(1637828954.132:871): pid=5937 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/718/file0/file0" dev="sda1" ino=14589 res=1 errno=0 08:29:15 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x8933, 0x0) 08:29:15 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb44918f7d22b2ad32e6163e338c0716343660913f77ac65d8fac46195ad0f3cbc79c9bd90f41ba7162004e727d6ed8253e12d4166cfea89322e6e04c96306d64717cc9e3643ea1cefbd04f11671be7ce3cfe91a8f42948029c1ed70a9cef3021b4dc31309df8dbe1f27"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:15 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 08:29:15 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='emild>\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:15 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setuid(0x0) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getpgid(0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000004e40)={0x1, 0xa788, {}, {0xffffffffffffffff}, 0x8, 0x1}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r7, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005580)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfd, 0x2}, 0xc, &(0x7f00000054c0)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="f4f36d29ad01d6059400917639bba69fb9268be820a40fc0a7f5b14881dacddb322014003c0000000000000000000000ffffac14142cff27815817e90f81dad5a1dd121960892d930c87993acfe1cc0925087ef638b6c03c27fea15dc4a61e93ecd5a80a67458d43c674558e06cb05c57401acb0c8fd1f678fc977151810b5fd78f1d20baf4dc7a57e0140f904b4021ec905e50bc0eb05784ec1d206a1cd2f9014fd3444158aa9066a49611a5f2cf5f919e77932a35c45eb98c256f5de1b1a53392fa7c2037732add2f3e08269e3482a4f5da2cfedb328bfd1fb933d88de0000"], 0x2d0}, {&(0x7f00000005c0)={0x127c, 0x32, 0x8, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x11f4, 0x46, 0x0, 0x1, [@generic="129228752d5f72eb2110c983c26e240ca2495059d3435bc44af562942b3d06ad070f91ba8ca596d4a02ce52a504c63b6e1f1ffc153d92dd745c82a150a3fd103375a35abd19b6202de40cae8cb641951f794ae00b3ac97ebcf560282bf", @typed={0x8, 0x8, 0x0, 0x0, @pid}, @typed={0xe, 0x6b, 0x0, 0x0, @str='(*d.*,\xc5U!\x00'}, @generic="88d53d659cb66795d311c69b8d624077c82ac5be9d0712ad0e45ad5116d22c5e1e3751acb908d60b803d918e1a2b8d543bf1c58548610ded29ef3be4c8b906d8a65f07902c7049d665f8813a9ff8237a7eebb57844dfdb99e7e53583f317459189347e6467f06f7c9e5f898bf99d30", @generic="9fa0d07e81d8dd150423f187d4659cc7a4674cc93cfaea98721d33a9931dde3a3f42d32be87551a74475cf65b6a6b9d88973f4a6c140cab800366664ecad50be5cb6e19968332cc2167656835034140fb7c5d42ae09d53c65079ac9221e1638db81a507585585533420c522c26b12fd33dee5c", @typed={0x8, 0x3d, 0x0, 0x0, @uid=0xee00}, @typed={0x8, 0x6, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x3b}}, @typed={0x1004, 0x8a, 0x0, 0x0, @binary="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"}, @generic="effc24209e4680f40002b6ad8b97e1063d74c4dff91c7c4ef838af23e6e8b3d8b9176d57da046317ae1e4aaf25d37b43150566683afc92531d50b105ecf9ccb8844da73c2cad86e8949aa110a657796c22b6a03476872a7055309c9f0a4fa924daac8f8e65d8b668a7e2bf3db8fb30f7434179313e1596009f57f6fbaf1eb0a5cf", @typed={0x4, 0x8}]}, @typed={0x8, 0x6, 0x0, 0x0, @uid}, @generic="aff7b665cff202d576df78317dc02101509cac1875f6cada58f2b0038c58da25659fd798bb891995d542fc2fea0c2ff710bef3bf88b4737b5bb61ed8eef165f16ce5c09f599be9cefcd095f7996dea36ce04cad191441337ab00051795ca817fdf4309a7c50b098920", @typed={0x4, 0x52}, @generic="d5"]}, 0x127c}, {&(0x7f0000001840)={0x1270, 0x2f, 0x300, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x10f7, 0x2d, 0x0, 0x1, [@typed={0x8, 0x61, 0x0, 0x0, @uid}, @typed={0x1004, 0x6f, 0x0, 0x0, @binary="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"}, @generic="ae12d77f106e8d9a2158f6b0c292f893012158af76eb0c2f428aae3924e31618214e0941ef06b5ad5cc2dfc9f20f2738cc7d6c8a7b0af2a6a81ba11912269d047eef87007bbdcc61d562c5c1266d520c5e8477ac78ff201ebffb369b6ce5029a39145711d167c82877622f9e2b243dcfb15c7286a35c7eb890b235efa6df0981650634e49fb797cea93c68cfc2473634913fa1723ef94e4851a3ef6076c0295d63408adc959ce88500d9b27dc6906e2b95e742b86fb309", @typed={0xe, 0x8d, 0x0, 0x0, @str='/dev/ptmx\x00'}, @typed={0x8, 0xf, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x4, 0x9}, @typed={0x14, 0x5a, 0x0, 0x0, @ipv6=@mcast2}]}, @typed={0x18, 0x35, 0x0, 0x0, @binary="1fca7251749820e20fd2a91209d6800f22fc889c"}, @nested={0xd6, 0x6, 0x0, 0x1, [@generic="833bf7edeedb2214dca39b97c1b80c623ce3a9fc4235c0db891732cab02bd621ed3bf06d20dfbd7951fc69348f683c60e212493062c1efef29405bc5c5528646efe6efd936015aadc46b377a9985dac7bd261807", @typed={0x8, 0x52, 0x0, 0x0, @uid}, @generic, @generic="f9435d", @generic="27ea9b79305060c19d778ca2d41cbef37bf2aa5b8206ccd83a017f95af0996cc81d81e2fa72e6ed06254f584a209c935a1d83afdf6dbf565bce324644bcda15e162d8e486019d052c8d76f4f9aa87f440cc98f7363b9208ab896cfae0b442dfd6eb695ced7c1d5a3fc35ba4452e11dea4a0a81"]}, @typed={0x4, 0x39}, @nested={0x6b, 0x4a, 0x0, 0x1, [@generic="72503f7471655bead7e178f59633f519b626fe4f16c1d88bc55850b68cd9b7a0906a89999381d4fb4c3e158240d5b839a5ea27e1ba1010901285fa23350249e2f9f4c6ef088f4aff10d0118af48325385b6fad2532972c15dcbc234b3392e2", @typed={0x8, 0x8c, 0x0, 0x0, @pid}]}, @typed={0x8, 0x87, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x1270}, {&(0x7f0000002ac0)={0x390, 0x3f, 0x8, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x8, 0x1a, 0x0, 0x0, @u32=0x8001}, @nested={0x10, 0x6, 0x0, 0x1, [@typed={0x4, 0x96}, @typed={0x5, 0x7, 0x0, 0x0, @str='\x00'}]}, @nested={0x1b0, 0x42, 0x0, 0x1, [@typed={0x8, 0xe, 0x0, 0x0, @u32=0xffff}, @typed={0xd, 0x27, 0x0, 0x0, @str='/dev/ppp\x00'}, @generic="8ed38331ec49543f07893428d83e29180cd93409c1fb99e6d0ecf444b2703fcc1e235968e5eb11f6f3b27d8003a9fbf18c2dcd64dc6185a1814d6879c649917c6081cb72f60752561edbac4440edd63b571f01e50dd25afdee510c75609f3f0d88566cc2e313e9679d9c50fa72a9fb7fd3030c46ba476b352b4d4d7e58b8c6d191095dd9aa233fa85517098f481d5bcf6641652284f7930cc4a808844338d4df4a8d24678e4535dc3651aa015c27fe329997c90bc0548b17ffafc55dc057b5d807b4838f1ed937f199ca0f64abc89dfa951a0cb94d8429cd21389e4360eda12d0abeb6965c3ab61955d3", @generic="dcf4697cba6a72dca651f312ed53a7918b3314ab50c433ca946f071233d94c8b8fc3fab41d46e7eb0dd30dd6d637406d053b97cea1a80cca969f951c8b304725d05b8ad7a0f657fcb55e9667185ec6bb26d2c166f0cd3d80313cff5586d7bc0a25bce1bbd5f231cee1df33cf1371df3a59a4fd39a635c2be9997b24da5dee52c012fa99622eaee96df60277d1fdc25b2ac4ee5a7b4bd1c574b5af02f4f83", @typed={0xc, 0x69, 0x0, 0x0, @u64=0x619}]}, @generic="fd4f99d3503010dc9a667eb51e8d1dc87fabcd04a5a44aefd3dd13c52e4c67f02442d6c8ba25228981c2177693dd01448c68d15e203a31f6cc6c1e89cb61e02fd8369819ba4d18e3adba181a11d6b13deb4f4f2095afd51c92f3de5e8593214a708b65a1077512741fea42a84c1e091e3ea91e", @nested={0x142, 0x87, 0x0, 0x1, [@generic="eb64fe397e2d8c176a2d8e151937db1fbdcf74f281977d10bf1f4306ee74dbf752a0a74333e42785c4dc489bb9a3933e39a1915abf6c01880669e73bf8104bb53e06df7a2321e6bc043c491e6371b1d66eb0f7be5780689e42ea90566ccd4ecdef8bd0d9a8d553dafa9fdfcfae9ddb1275199a7dddecdb3e97c9499959b7123b62f309f4750052eb65244b7b8bbcd0e97e7181d0a996c2a23c853c39a58b3e74fadfac929435a141f54561", @generic="993158aeab6bae0bf30873a0e23a89e8079d3adaeeb0a77ab43744c13feac8eef00cc703b3cfc9a5de63559c26e68ef8659ffa18cb30852b57e65ad678b9f210f71c5d2c0bc5177da0b63a7035779f1baf00a2983c18e010507884066dab9404c74eb7a5b182634b4ec4b6ad8d7bb647419ad6532bafa89bed511105bd1ffb57f09562c47d4d9427f714d86b6ed3cecd4ee402"]}]}, 0x390}, {&(0x7f0000002f40)={0x15d0, 0x3f, 0x200, 0x70bd27, 0x25dfdbfe, "", [@typed={0xc, 0x86, 0x0, 0x0, @u64=0x600fc0c8}, @generic="c05a06a16f04cbdfb299ccb9dc41621554d36e553a72e82e94c1ead3a9d0665c455ea41f88f5771f41301b675be4678022b23e694f22615ee9", @nested={0x12ac, 0x84, 0x0, 0x1, [@generic="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", @generic="860a08aee916d058e18dae5b87635481b903013068a2945bc10c07c0c83d720c25ff5ec6f1d8c0895173761040e9353b8947a1ca45a4ff100df839f4df6fd9f779bbdd45469b56e183d73f7476474ad1d49d8b529713b55657af4c07f6def8f400ce9446f699dc8dc56b0bf3d265c21eea0a98910e69b9544b0ba186f263", @typed={0x8, 0x58, 0x0, 0x0, @uid=r2}, @typed={0x8, 0x95, 0x0, 0x0, @uid=0xee00}, @generic="828fe2cc3b240c8fbc8a5cdb4b7240cc3cdd0f0df58d1342aeff2467c79e503b12db1164bd8957ed8af22439662de9e6d65b010092cfef7963496c14b23ae70776e1257752b8b03e3bffc15b8a150157432c871061598570d97f36aab56ad044498356348c367055e7e6c3e250b1fdf39f818bbc4fe65d440531399ca6264b5d5a59619277b8b607728426a81ff5fe02e2465af8b52a8e4c6830b2737ec78f90f3e35118d32752d3d7", @generic="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", @generic="72479940c98d46488a52ad5cdc858076cec702beaae1ba5802903c29befe23e4516931112c0786c90d4020d7bf52f961cdc2040f3172c6b3911a82a63d5600e2d1f0a719862edfa9502ed8deb9b801fd199909847bb77fc43f71a78e887335dc8ad5e5a1af109d017ddc28e71680956ab1110f21"]}, @nested={0x2cb, 0x2, 0x0, 0x1, [@typed={0x8, 0x75, 0x0, 0x0, @uid=0xee01}, @generic="47620f8d31c84a82f6b6e7f44b370a8e91680f5fa61dd17e663707b567bab724b5bd3975b00eaf4656ed41f4cfef116f18410efd74ab343baff70777b7dd409b10d7030338a65bf399414f3534a80f3aa0edb7802741f4cbb7e543595962ed7a9e15099778e5558ae271dcc88559d6266faed01f94c4e2fe0c1f0734de438ce2c31fc2d37efba79442a068d027ccbaa14036", @typed={0x14, 0x6e, 0x0, 0x0, @ipv6=@loopback}, @generic="8d99fd82c448925be5fa1957ccc5e7558c6b7bde1f67ead6f0c97faa61809afdd747b2d0a202af7419b66f1e4a968eb76f658f48652f7449ca2f434c90f92c5f3cacd1fb553db4efa08ecf1c4dcd71a7bec906eaed9cc87320d4adab3b052ce67cb5e8c1e54d94612342ba", @generic="ef9bc456b05f22c56a20c08c66823d9b1335b4ecf887bf9f0b1d360c8bff1da3307841891ac75e581f05fe4fa59aa990ca2e17f17f253bfbb5663244b616fac191bfd795955b5eebef47a669c44bc3dbdedaecaec2fbc6dd6779bfeaa367fc87c9e7d9a20bb702b1e6f08bce8a0eb8940827779668122174b59dbc3893396778518108cf1141e7a1c5aa11a727f98b11a5582f8eef84a7ce4d71021715af0e59b61db04dce14d1a7f8149a555298390feca713c7aaed03ad504756653cc743a14a28431fd1057effde35f48f85362009406f71c8671f858eed72", @typed={0x4, 0x8e}, @typed={0x7, 0x0, 0x0, 0x0, @str='{^\x00'}, @typed={0xc7, 0x1a, 0x0, 0x0, @binary="074d63205b54b31755a61a89952207b14ede559d173c68df4b24d3b56ad5afa7b68cb3a0bd9d0e3f989d9f32181a03163b21d3106a5d8d8fd209e07ab4f146e2bd3568572a54c38c09f3cf65c65ea6e1e2a62e9ab5fc55516d47ea4c55e0cc44439e8174515e1e203d87204e5219674807d4327f9d792027ac4936750b13475c23ada534ef7079038929840b08b89cda3a07f946dcd008c5b29210b0b63178728632b45c71779d89f7cc2747c6b46a5b8a6af063daac6f607f9a77335b6fcf01b9704e"}]}]}, 0x15d0}, {&(0x7f0000004540)={0x228, 0x28, 0x200, 0x70bd2c, 0x25dfdbff, "", [@nested={0x1d7, 0x5c, 0x0, 0x1, [@generic="e1010258285608b28c4fe9507a88566acae9f3ad071ded5264a278f6a81949372104d23ea6ea42cfc40ba9d1fb517bfb190d98e9a736943e87d0a5b0bf126496561a82bd0b6b80e65666a61c06b6cb895cf580bba562b9754ebfc93c993fda44e1782302bd2eb228ce497fc5e9241101a332951df29769872134e2d31480d8627aaa0c736e014f99", @generic="15b172864d0624d81a4609ea56c43bb69b460ffdc355f15b4bea320ac361bf1a6767a48c22e170be919fabe6a09e41d3ab7c0fdfec451d58c46efe", @generic="6e33ffc865514c15387b7193407887f730df457ce3859f76a8e2c4acf8a5a66d3afc58866e72be5326c5be4362961b7905fcffae964238ecfe22e6c9762a27bc019cf75a2552c22237539a923842afc654fad65327d99ec03026baf0a868169684737d75a8f87f2cb189095faf2bb2418d73c9578a3fee69c98e4667485cc8248e8ab7cbec0f6a80587714de696b6453c8c1c7899a90ebfd5f9b1d0efbef143b74c5e1d65c4628a701d477b6d583594257dfa1cc9b72ef564049d285d2e28d5ad69eb883bb3664151a68aa82ae9aed39", @typed={0xc, 0x29, 0x0, 0x0, @u64=0xfffffffffffffc3a}, @generic="ad1baf0e773bfe92c686780d488733517b25bbe7f1192e8aeb97b378c1527e6dba6eb6e38e3cee911fc14d66", @typed={0x8, 0x6b, 0x0, 0x0, @uid=0xee01}]}, @generic="af82ce2b7942b5f560a97ab8990295c60815292b2abc2e78211c75ec49709984526ef74f04c85062b5afbcb28612000af2b7dd27fab069a655e149ec4b74"]}, 0x228}, {&(0x7f0000004780)={0x32c, 0x13, 0x200, 0x70bd29, 0x25dfdbfd, "", [@typed={0x4, 0x16}, @generic="e71bf7b43c183b50e0045bd4f10da33bfc4e53b6b36a6efa2094682c7a407a61f8a44865ec29daf347968cfcef29f0081a106a5eff875dcbe7528d7f97d774160294f153dfce300ce4510a9da1d23498614c2bb2007b89e6bb6dadab4fafd9dec09f0948118c6f9c1e49", @generic="99185250783a626dbfab345123cc297a2eddb83228baffcc3573bfec5f734a56b01cfe7c10b2fd740882028a9d5c24a0f682854972e38d45e1a95981828aea762ba141ada9b36afed6393d580e6292450ede98ebc23f66820391b5b302c5f52ef7a540827aae0e07402d4d2bf457f2ce10209fb3bc7b0cfd05a8af9d473d9de2afab3d913c73a8bcbb43d1005760241f874d22e499121232fe712d643c9828bf1e43d8ad97e24caf136c62297ec58bfaacfe4ba312e4d72931df16f39fc119b6839f2a8cabe5d6d8b68064323600558b35913965e234f8e8b6534ada52d3e5f6abb6dd8167e8", @nested={0x1b7, 0x7c, 0x0, 0x1, [@generic="e02f8775889f78e152e62de314af7fc665ae6219e26027b3580b0f0ea06aafb81eea35ddd211002642676ab539e79225b08b521f626c29224e3a6d95808ad88c58f3db7048f1ed1ce9abcfbcc909405004fac04704aa14beeef2e0b4d306103112935adb349f01b24efb90d67b1c01fbf16dd5d9535e27cf69a222d9815aca23895f2e44391b4afacd06535e39038a214ecf2181e7f44fb3fa095817ffd79f7876b452ba679e64ea3464ee7544aa95b90ba091dce816da826127dd20ef1e3b", @typed={0x8, 0x15, 0x0, 0x0, @pid}, @generic="1392fa6a5c68016abcb381907ec0242f6aa26a13739fd85833a0d937ef038f75783b0ff1c7cdbfcbbe569696169df9791c24d350f737cef7a44077dcfadd7edb2b3b09e7dc727a95108ef0fa285e53ab7fcf8a02a6a0a29b0b8f94a0c138fb9f3bd2985ef12abaf835d0bf063bb21f4473413a592e", @generic="32215c0d24b9400622486d7703a5187d6819b91a2ec599c98f1636835a0d3b0b1aba9f2984630b953da25eade69f1e5d00f64adeb4239690d820949a8e56019624d80be7210570e141ae24cdfc57a4b083d9f90da69742050f2dd5f90c7c8ce202760241b9245d062566749d288c72500889b87352f662"]}, @typed={0xd, 0x70, 0x0, 0x0, @str='/dev/ppp\x00'}]}, 0x32c}, {&(0x7f0000004ac0)={0x364, 0x28, 0x2, 0x70bd29, 0x25dfdbfe, "", [@generic="275eaee574f6397d5227275ad39ca188aa3a801e2b0958f47e74d96ec434dbc5cb383fb320b593839eed76289eef62b2556ce9fecf123caec6128f25b509398157850b67d9d6a2f196c426da261b30982488eba8cb7d8ddd2b7c75e3bd1a08fe88e99123ca02dae16ce03c3cac2ec8a59b2ac05d31892c2ce7e01ec991df7c2ab7ca8e8f6a1bdb76ca73be14ba41dda73ec8a11551555844921bfb6a0643f8fc0243e2d5fceb8120fd6463dafd75b9d22fca0d78cb146dbac429fd0767df47b024ebc4ebed3160e812a815d4140092a52718c298b863ee", @typed={0xe, 0x8c, 0x0, 0x0, @str='/dev/ptmx\x00'}, @generic="409f402feeea5ae4bfeb2fba43ef9eef5b6fef61f0b8c9d1c492ac7210af15a717d9e220ca65363c129213d3e93ae4120b32c7ebb084b8622c9ca8fc4cf9762f3e9c10fe4ff3b9c1e4f101f69320a4823fa88a811403f5adc0c951ff3aceef305790504ae474dbec6bf9aa40310942caceb429699c936ca71550b968973be473c19213dd37362dd1d9e0c8f2c2a71b5949db19ba875903ae820733d8c699bb1ce1087d1c3c5e4bb5b9702f3106276a0b6a34f60f5a7daf409cb9cbcf498a28049857ae894bb639365b711561731ea37c0a891c1a03980240a7ceb290487c8673", @nested={0xde, 0x72, 0x0, 0x1, [@generic="26f84b1b873c2d78dfaa3e3404d5ff62b71663e4b7e739ce77b7a9d7c304c9db10f1138209c762a5b1102f997eb1bc43d46ac6c998fd01063266ffe59ecad10e3954122518e9d1fe4027f0cbaad93a1f8524f1c49d865d2929bcf2efd3ce64b1d19f62178c103e46c23ce9b9d6eb4bd6b792f859c5a27f165b5596158c50dac2013d426e525e25a04de2bb9b399a516da179af5c69f12888c60a243ea728347bc3c08cba584d305748b9fd0265118c017d86464609cf7179091d3aaf709880d74515755fcdac07bd8656beb5d0c0204906d3", @typed={0x8, 0x17, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="493f23c87f3c173c558b83b947354be2a8342c0005ff3bbd75646792a7eaa21d5b25287537b0ed026e168e4550e7b9bd517cfda5ea50b80f5bf600b3513f116fb4ab1aa6dac5c7911210e76ca25f1b6ae35f638c2a885841258bf3950468e57a1624d063b6be3f993d25ce2dbde6fed2cd17e36d72f3827491fa49476885f9e0eb5c2a57dcc0a07c9d42582c506e34ad97ce", @generic="051aa731e8b43492e006131e68da1efd4cd3b153e9852c40466bb3"]}, 0x364}, {&(0x7f0000004e80)={0x624, 0x24, 0x300, 0x70bd2b, 0x25dfdbfd, "", [@typed={0x4, 0x43}, @nested={0x1ab, 0x5f, 0x0, 0x1, [@typed={0x8, 0x25, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x17, 0x0, 0x0, @fd=r0}, @generic="1d85429a78378d5a4cfebf1b18039071ffbf58aed45ed302bda5e657b73433dec6d57892466f0fc426006810df99a568b6146d7981c33c5f41366d9119b671ba9a43385f8e5761db8bc7a9eb068cbb3b39e6358e1a7089bd63b46c2307323ebad1d4c898694c58a69954d8fdcc1635ddb78bb4c561fba69d903c06d1ece2d02a09e65949e28215df3ca2b8af61f333ecb1b3ffa60abad2027e644616803504ef70e170c9e5b63ac54706f9bd32", @typed={0x8, 0x6a, 0x0, 0x0, @pid=r3}, @generic="c5c5e2d02a3a9655cff4a3d02ad3c4cc373c206b90f548aa322dc9158df7ef6b05c8b44823229f3849fcecbd54825704dcff4b345d966c4572370bda2a6c7fb4b46c21b91de353c3", @typed={0x8, 0xf, 0x0, 0x0, @u32=0x5}, @typed={0x4a, 0x87, 0x0, 0x0, @binary="d8dd1ff75457ef380b78f33c34463f4d2d951ae5b539d100e3ab3badd29dabc61f4f9f34d8a5bd5e3cba18c1f9ddd90b6c296dd506ccb385c8d3778e71b84861a6d4a00be999"}, @generic="392f2b1036fbc3f57a017303c723df26a1430bb2e25f5be2b90376d633893a64dd59fc34c2264ff14dd2553bb9fa7ec3c3e613ad1aed6c61c4aaa2aabd5c30966c635fea1f20"]}, @typed={0x8, 0x65, 0x0, 0x0, @uid=r4}, @generic="75ac23fee6cfc8678bfcbe3696cf9d113d088344236afe4d544438f3978ee738ecd31b6cc8a46c7da44e96941ccc64a565379045d636128508e87b3f289aac220e8b13d73965ea", @generic="91d9b81d8df8e2eba43c9ece914c90d7033b615ebb516f5e81077518f44bce8f2ea30c5a3f5a5b72156765b9282df01fd044f7c792cf3c45171b6363798663a0cd57eaf84ff0d97f9f3ad55cfb2c05599a186b7d384da0230647112396c874d2bae791cecc73c46cb15d0f4deef9dc545e1077f2e0b352de579c6a7da2d884cbdce1658e31f92fd5afb890b874185bf6e057c621f786a46da03e2dce65590c5f45026fe5550024266b589187617b6be758211f41471f1378e6c21f24d51319dfa30fb4", @nested={0x2b3, 0x1c, 0x0, 0x1, [@typed={0x8, 0x12, 0x0, 0x0, @uid=r6}, @generic="678a0f4ed96e69000f045e494bc24b0a73939fa3816a2ef0afc3dc3a7a1b4dc62743cec56bf87d6457a2ebdd7702b54f62506d7198b0e74caef78502670fd36cb618d6f38308fc2c10acb9fed8cba1897be53cc8fd8f948cb66f46a453d55dcc30503077d0726153f0b4e3f52e2b9687c2bff20d3586", @generic="f26dd0191a40f62f0299d826c13660b6a5507ffec3fc4e61db7e87d87659cd085b221fcc2d1b96fb65e125888de7147ba08c283fd4a246ff20a1726758d1ba54c4c4f89cd65d7b7c8fe14fda4c80fc27562d8af3d0fb143b8706e1b532f402142b5cfc4d4932397dc923e50823f6e57d6aa5ae9a38b4f8a91b658a05fadcaea9387c4c0a0ab86f6a95d6e91f092d7eeafd553e723b040e5ddf40ef82d76feb3f2ae23e378d036855bc3d4a7a35b1c844eb3418584359", @generic="d69e96c41abf085700d3f71ad7a2ad991ccb9c3be3c723fe47175f916f5ef506bb413d7ace27e0c3d371fa986dc3c3b7da2dca16c94a66395d5325bfd4ff55c5ec5d3413507eac6017af816e958c9ea8a5c4f47fe4d712472ddafb1fe5f9d14c8e2be68bdc88ef7d10234e70aacf698bc0e88a5530daa26314ccc86a1b7fa5b5a28ebe865e77130b6885f24f0dbe8e4d37dd88c5e018b01232412f23fb9a3cbfa373a6285b11755f6f4dc5f11c033e5c92da9eca53c1d9a5f4871086106ac22e8129ffe27ca4068beeb806a1d527a6ed93499bd0a8827d744e4f8cd40ceb2ca4f806c9273411777369550d544da0b9719f", @typed={0x8, 0x45, 0x0, 0x0, @fd=r7}, @generic="5334535c6e5b123211d80cccf5f7d48b63078cac816e2e9cd90ea20a449d2fbc570ce6e6d15c8d7a91321869fc6658d3361946b758cf1adc0b63c561c9eaec9f1b3750cce4bafd3bbca283144c443dec8bd450ddf5e9f71df9c5f23a03d9e97673df1c897ade2c507d84ee21b05d840314214fafd45cb5208a82bc65afcee6bbddab"]}, @generic="1c3f312b8fcd2f2ae4b9a71541e98127725011362a7a25e3f4d917c47b1ca49f092a86da81b3cb986af1620253b4709077f958f46a20c2c441d617631db87c65414e0e9c39ef85dbfdfcbd850dc2c5860484fc6fbfcace58efecd29ac487581ce594a65ab9897a6f85f3d8c3bea39f1732da0a46387ed5687551a48ac5c95e957c99f6ef86ef1e9a2cf9af95edbeb391c3eb29ed691d78071b1b476a902a"]}, 0x624}], 0x9, 0x0, 0x0, 0x5}, 0x40000001) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:15 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000005c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1494.573970][ T26] audit: type=1804 audit(1637828955.762:872): pid=6093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/719/file0/file0" dev="sda1" ino=14575 res=1 errno=0 [ 1494.701690][ T26] audit: type=1804 audit(1637828955.762:873): pid=6093 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/719/file0/file0" dev="sda1" ino=14575 res=1 errno=0 [ 1495.213784][ T26] audit: type=1804 audit(1637828956.402:874): pid=6157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/720/file0/file0" dev="sda1" ino=14575 res=1 errno=0 08:29:18 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x101402, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$KDADDIO(r0, 0x4b34, 0x2) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0x20) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x4, 0x1, 0x3f, 0x80, 0x0, 0x2, 0x80827, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, @perf_config_ext={0x7fff, 0x7}, 0x11884, 0x3f, 0x3ff, 0x1, 0x800, 0x75, 0x1f, 0x0, 0x7ff, 0x0, 0x8001}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x2) 08:29:18 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='emild>\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:18 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='msdos\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:18 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x30, 0xffffffffffffffff, 0x7d10c000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000380)=""/264) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:18 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x8982, 0x0) 08:29:18 executing program 0: unshare(0x48040200) unshare(0x10000000) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3, 0x2010, 0xffffffffffffffff, 0x9a1ad000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/79, 0x4f, 0x0, &(0x7f0000000140)=""/52, 0x34}, &(0x7f0000000340)=0x40) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000380), 0x61c140, 0x0) writev(r0, &(0x7f0000000680)=[{&(0x7f00000003c0)="72a52f1d62791b9d8909fdf34b4c3908c3c0592efac6dc9ac8e637cc7de0191d3a2327feb0ab24ff61b6e05ae230bb06a20e4221ddac9cf2c89dc65e7ca6e7350046ad48f1b41bdaa5257f4add2a1bc4d24b2e74b5f7368eb0286a5ea632186cd0447ba30845f53b0aede2696bac11db90b57fad81ebd9aaac091d68011cbf4f6d16dbc3669502cd6a9b24fa4708680722272bcdc71aec73971238d0edda5eb9381c98962a2e9748ad9864f65763348e5dacf61eb2bbc4edddef7f204b4b09dd0a9742db1ba0aaa56e82f35116db87b5dab742d76a64a1c58a2830c7f062f1250e36aa4a5314911aa7795cbed8f4cff28b", 0xf1}, {&(0x7f00000004c0)="bc210bf9b28c8e3182c2c97f4778dc1c988082cbf80ee5de01f6aeaba3db6f8446c519c889fba8e5c8ad436526abaf8414eac77be09f67f6db81b4127c6e9269503cd8a926a59fee25cc0f003af9330ed9d21a4f32b1ced3bef909ace24ec71e5fe43a91e8d45f4c7fda434232ce2e596dc8b101ea69996c0d60a1076496595731787d3abe21afcefd16fbffbd106efab56a57dfbc02685524d000a6ff0536e0db6a9f0b44125f269705a86b67d1b5171de6488dfa476858f921ddd3f697af0f0522c2dff3d015861cb8df4f8bca0acb83270294d91b2b95d4725e5498df4f95c354394926b841843fee0c730e1fe82c33c1b4063702", 0xf6}, {&(0x7f00000005c0)="e460d3416a40a213dd108099e03bdd092ed0566a1b6002d064d9beb2ae3d", 0x1e}, {&(0x7f0000001580)="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", 0x1000}, {&(0x7f0000000600)="4062efa17fb60f8a5c1acb16200ea786706df07460cfd674c26cc228b97ddfdafca122fdcf0f042d6f44e72ffcf44382d9a6140906c6040ee555fdcf2166b7ccef66314e72eda8b1133549f63c2763f10ade19", 0x53}, {&(0x7f0000002580)="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", 0x1000}], 0x6) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) fcntl$notify(r2, 0x402, 0x10) unshare(0x8000000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000740)='ext3\x00', &(0x7f0000000780)='./file0\x00', 0xfffffffffffffc01, 0x6, &(0x7f00000009c0)=[{&(0x7f0000003580)="06ed80312faaec611f0cc645181f96e7aff7383e3bce34b24d3a8c9fcebd80b5e1b5f874b52f6c53f1cd184ed5d575a6064dcbcd002be9175e95fac89bb8f7caa160089517802806a0730380f9f66007a3ef0bf28649cbe4ff94f8c1012eaa2e00ee87b12cee8da2af6599fe02839bec3ebcb5911fa6e6a0167213d986ccc95c1132b6a48d5007e9001690106d10e451f6f093732bfaa021a20a54f49da25518abe5d1ab024a53a98997dc1a69162d69fe8711ff72afc932b70662e44ee948b6f759799b65519c5f4ea9bfe87a0fda4d15b85aca9ebcc615538fa1138e48cc561e70fa6143a4bbd50ef6029e36b19b09bfa531779e1234407d4d4c6c2b550639cf04cf8293b392d8b26d3338c9829ed5bb167dd8820fa8ba0a9fefe5ef26626c2de3b75992cc2bd841d6f657231cb086a928538d437fcdb0d19f9f618e8112b0b0dff81553ae4a09be70352b2aad38a4edbf9d43e5c67d2012bbef254173ad41b6478527c2f491d8a5fdca045db740f332efa6939546a71f41b3449f027d3bdecd6cf7d20195dec7369dd5ec49092d60e2f7ce6809f626184b711657b969a4e8c48e33ee7b4832fc16fd3642efdfe135c29343ff2ba5e6465a4572bebd1cfcafebe2a1c135090b81efdcac0ccbc0635483c25a5c9e2ee4f7d400296740f47e94ce72271cb327bb9261f998de4af2742fd50cb9b95e95d9d4b158c0c6c4312adfe7eced517e373ac3c3d3630057c1bf720ef10a7cd9c3862ed4ea5b4f364d4920782287b83967bddba0cf9e5de93f5779814752e67cf6d9616b20e075a7e0208fc27f855f560e13dc6d53c3ab2bf7db6b1a50de6159e294977648aa68b538f93e926ef0cdedd2279c2cd8010745d75a5c38ef85c0f6f7a6de13319c98c2de6d21a92a645cc3029998ed59011a757724412b9839f8fdeaac3d5d306570a541d4cec1eb8de6e932fdc78b4ef1104e1a7148d7d080ba38462c32910ebe38719a0de123494470eeb84896acf343754158083b6ba073c0681baa22f403b532d9941c75863a66e8aca517e40e651196782446748562e6521653485d9cb5ee35809f0b2014a7b7bc03b23e626c8e7229ddf29a2866f9eb6000476af1ca25b8b2ea9f78b7cb888d70ce7623d4d794d2d55e119a5ed8d3ed2675007d116a41e22ca6b59675ea7ba9968b37cbe8586ebe162743e9e035f4f624718a4f9129b9bfef003230ab70e9d27215ecbb4705a98073eb540db454104672dc968c313c1bbdf02ea8438740ef48178c21d0e8b50a88c0b57264174afcb8a8db90b36b388cbb8f9c8728d52023ae8da748f36aad935b901ddde6c28d5f2e72ac67520f827b743283fb5b288f5df842aec91fd22f5b131cf0b18d40d1cadcdab695d88949f09346f37c36d6a86372745547e3e0bfc9effe3c06f5ff6c55a270ded3be625525bdca001c0c0b02b851619b49505f5bd3f8dd1562d4cdb358a6e361eaf999a7df4c3045d9a2860b07bb216a0cc95acd763283724df4fc7926e42b9eb36df8d401fc12cadca569d100f0a04d3092de0b03202d1e1be46c81a334072b640b7d40183483475222d1cc2345745bac4e12648dba17b0c0a43f9c7b66ac359b1a8f3160f9b6c1347486d7dcc880da9a712d01da79a6308521c4cf92d6c40d66833b08957f30a0d6022796d05b0fb7ef6c20befb37e68677f34225ff85076f3bdf6ab357fc11c8171b78307d2c1c44d4047ee78383b909dd589317141def3a55a83204cbf4d6fa5dd3366b36269fdd4f2ec5e34b0a08bd17bd626fe25c705f02844011253a954011d5b6eafa3b8ca2db9a4ab147350be57265e3db837289a8c87be26e190b6a772344f816f8c8949ca981a58deb548d884e150e277fc7233c142ebd5d82a80b178fc37b36e00e91d0b6987b5de698743710502accb75207f4958e2e94f939a1cc293bf913395f38ba6ac6780bb3421276e27a89cbb88346bcc69d18381c40a4b7297870c729ec3522596ff224043657c75c924d5ac4023e8057abdc6fe406205cc6fb0c3f782961fcd94edcaac7aca7748ab6381b8cf4cd99068096da7eea3819b722642bf8719af32a82e51433cbe765d6cb708877f008b2d105409aa574b1614d659883602baa100a3d5d3c8d8ca9495f741e3223de022f90bb66519edaa690e5ecde851d6f03b8536d32d36db5577226d36315196ce8f3f4eb1dc52579b907409bf440d4c62053c79aab3d8236fb1b056315c3f3d37e2a7433cb952031470abf24bd719af41d6a20f4ed874d81e5120c8f30d0d950ec658f19eda11bb19891431b53e31d19ed5045f5e9028dd74e03a1f7ef51b91dc123b3036e5758e388ec1868869086d9ed5385206b8f6aa0b3f2ab25f196ac548be8905144f3201700346dc6634d4a644f6f1235b7e08f11253b41327daf748055c507568ff5de4bf3f9975b825b61015079e819e52494969bf9bdf6bfdf92a4a7360ebab4460de98d1bda5da34c51f7caa224fe071a134ca5368311342b59253910944646f3bcbe2c804b860bee8e3295f29cb17a628985611e832712de0b25df3e98bd2089cf7e7e6f8e9f04e04135b1bcf773d2a148df83965fd4b3085ec30075fcfa9e7631583059ef3cce4be992b0ce583a1616a029ef5fc822949fcd0a541fef600613c1e2c1f6e8c37a2a0b65f3c8ffd9cb35d626960bf627f7d656a6c1b5cc2763030df74f7147990ee71a4eb96ba558905aace66cd601268f0558a9150181437dee3876b743b5265cd2a43e2541800caf2a8b954e118498921aa05158e5fd41cab01930dd4f773a45b60fad3ac08c7f624237f0c1d67420263adfa8bd161701510264384dc4712dbee8ccc7c700a601deb87c64b1e9ad28b7684f9078214e016dec2134a86b328f51ad55ba21135f70f00d9f6332b63683a297e25ccc9b72338bf84cc29e1841e8530a4fa61809c17ed15355b7e4543afe287cd14ae882c2370d7716f941d0fcf857143408d40ab35a362b02dba190cd0d6ef129ecc24189bf8cb5f147b9d44ca7a7b10ed1c3a78c213473c81955e8ca4bd99396f359e7b31d9ef0ae902dd6a6eb67cc9c76fa89507764e539091254d45d5c01bb98782e9e70eeb18bf3f02cfbbe9829fa751436f66fcacb6f1d89c4d2e5f7362391a3b45b6eadcadb2426912dd87baf348ea29edae743578867347f46668cffd3d0d0edc4fad7ba26bfddda3efab1ad14cdfb42378390bca2172bf9ea63c46b3d57af5752ebf5ffd07d981eb0107502cc9fff8a5706e1fdfd466fe99eaf3fc52eaa802969ef65cf58935cca12b9df049933d6b5b558571f8fe8bc5c0f00c7e6aff7dc27c475c4df3de2d2bfb1de4b79739bed0c81c95221c3bb30c4e13124b0396d196850f94df3e92f5bed16d8fbfd24bfde5ff20321163a52653dfc5f85b3d6ed0f5b65acab04f24788e387cf2b1bc948b0505a86bee7d031268dab59f4c68f9decf683efee953d6a620290a3a846946c67d168b5878edb7a53b94e8f5e66344e950496fd828bad311471884c0f039b165aa38d26a384f172301db825aed155f5446fc53dea504ed7d97b18544ea64e8d3b7546555583a09395de00ce000a5729cf7c85b571c8335a5ae020473668a963992f64021580941e8e1db6422b16542584fdcb21b7fa2ddb95e723e3654e72686a0ca9cc329cc01a69d0eb39f4beac5649eeb6075bbc58dcac2d89cde993ad77f88228a32e4143eecc80e769469b0aecbd3c0defb573556c26625433de796b5b8079d94106ed561ce69270b970de59f05b51927dfc6ed8d96ba6255069d559eff7d1da370000bbd69cc3e2af4bfc65b1ca728868fed4e011012386026d28cf63a79f50b91af170dffa300fff95d23356adf090f46b78d5954f9f60f6416c37f7f62225cb704ba50319dfbc62e0a6f7f4fd0dc02c1751141f49d60920f14b484f7f94e72923245a612baed97556093fc7bbdae63406e07791bf919d99f8fa7f6b60c6ec5080e1e6bc1f2dc6177d59fa4c17f49e11cdf1a5bbb0bbf532f15fa4f6c35fe50e783f62625adc4eafe3391e43562f078087585b9df4a8ca9ce6088ca799817147c3fdd484d696914e3926eb5dcf4b6d1da2ffbedc0d7c915d6b133a0a761442eeecb3b9c555c51194f80c24eb85ea683e105f80b3e7f94b50bd0a112fa610a9ea9d8b5695357ba6ed3719cd3517bb479e163de28e954ea12d29bf9853bd4c3bda89c18f11d6e354aab3a796e8ccf8989ead0421cccc11090bfcb99211b5a0f4b20ba6cb3bd34cfee6a9175a47525bced0d063932de6a1aee87da9eea74558947e13e7833badf430fde681e835460283d6bf608ebc63bc5181bbea75a698248f6ec3e25bca4a0d21fbff2c48156ff6c36fdc2e13fa2ea879d61a186f54f0a51b4195bf64d5d968e0a4044755e866899dd05fc7163bdd73319c5631c65ab99c845c0327ebf17bf577cba73d325b241f36e310f7582f65f6ddc7b7e289848d334d839e371d4dfac4bebc73bf39bf084236fae81a8e4fac79a877e26b758ff82eb79adbd079ea83d2323f0e6a605b1d5d1704a6f66803c3bf499081e591c5b83f5f76df592caf0e7db7e8c933ab5590ca3cf14ddf2db6742b1733231e031762a53a9f8b0321075e3dca79ea56aaed63481ef120e37f37e1f99d68bc020752192d92cfd08b392ff0c851f9e5e35ab919cdc09253f4f9855e33f79e26b6e590d496bc9ec7304089ec73bbe754ee4123972919fae69977ab6aab04626737233e3795c233bb81312cd9ea0a597c110d6d62b0d23293a9deadace289d2f04d97d47d4db2c0f4b92842e9b6e887a695f882349fd18a3d7ab9aa83188e6fc527a99221116fb6c5f6b4785c2b0e5b20b12fa1782b441b7544f2cd09eff7b01c17b6fc1fed51ae394b7ce92bfa298cb101aecbbe00af3ef3376d6d934e6f19479a12f9dc8fa4db027a7b3f9a540d82b66c426010265d01759e363a2b9fda22fb033e2269d2b929a407a5837b85bf0f3f480a8902cae44afe0bb60801a98d8883fc8550fd0d33bc7c7778b4b288e6d48289381e0e60cba90db319cf7d92f67ab97d37170654a74a54e206cf69b3ddaa46bd9eb1896d3469a3e9fc0c9af57fb8a0e600f7c38bdb24a0b2d44af86892ad7ac27e769a066692964eae17ce88d288036bb852c5f62fe51a16e48ba2dde07053d982ddd70123722183768cfe3b38a3721c3b91a6c40d956d994404b8a4138d9b0e3c1989e4804be5d8f1e221d602287490051f47946cdadada19cc36e994fbf772001c86bcbdb17650865a5c5d977fbe785b6868425cb266de29e9630a1916577af637181372b4d35ba9e035771cc46440f0d0935eaafc3892eb30fee95c4ee234c346649fcda244335652fc24fda17bb5d703b7b965c01b78f63ada34e99cf2e457a3ad1511d9b2e57a3c73fc1868ba134ef15d6dd6ab033962274d347abfae64d3c7e24246f42a82997afa80e601c949d40057c30cc06cc4f05b4a646f690e4bd4633fe17cfc0820eab54395d14eb0811498a32dd5361ed07d9fe01f81b86b5d25d120868982da139c43bf997b062638695674939feba2610c62ffba228d92b33fd3babfbef42ee444afb0bd067bc5bf4d73ae4b183ccc1604cbcc2b2f7f3a81fd67d019c6ff83b987c6afbfbc84488f467d69397db26b9e92701144e53d14b7fa90073acd9a2d1f89ac02f179df3d000c174888c937ab87d4060b44d33d7594e269fcd87920402b60f420f69978659831e233b54e06edc11c824d25b0aea32a81950367f858f889e689884a4d3137", 0x1000}, {&(0x7f00000007c0)="542d241490817ecfd4fd735f17bb6e4b4a39748e", 0x14, 0x100000001}, {&(0x7f0000000800)="9c6cebfbcf051400ba90264ad4d2d7cb3c0e0bcc23cdf205d8ecf365939cd170739ef97381d49d3e2a6a54d8e89f22f86fd6e2ea38a0fb31d69a3a35a2752b26c7d1dd64e0e205f69c43c1c4c5e9f2c4a9fd43d49f6ea6587f72c37493ab035f96e35fa7022f3d18426a803e4435e77a14deaf8a7b2ed3539fb333eaf2d4c35effffe016684429a38f2f0f5eca6d1d7e8dab9e36e12b91ac4ae8", 0x9a, 0x3}, {&(0x7f00000008c0)="cf3a3372244250167f15ed791a95fcc9d4af0f9d69", 0x15, 0x2a}, {&(0x7f0000000900)="fd69b253fa5af796deb4f191ea66b4b79ff167c557741b79dfe4a56f26fe92ead860195e3721734993a2", 0x2a, 0x2}, {&(0x7f0000000940)="a507c370fe0e5a8cac45e310c5cd07bdc2b8a7de3569727723753aaa8633ebdc673eb01e52210239fd5c0cdb21d78a9130fd2983c25da826ee74dfd7bd3749e6824d51deeebd48", 0x47, 0x7}], 0x10, &(0x7f0000000a80)={[{@orlov}, {@nodiscard}, {}, {@data_journal}], [{@dont_hash}, {@hash}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@fsname={'fsname', 0x3d, ').,'}}, {@uid_gt={'uid>', 0xee01}}]}) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000700)={0xa, 0x4e23, 0x1000, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x9}, 0x1c) [ 1498.013602][ T26] audit: type=1804 audit(1637828959.202:875): pid=6227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/721/file0/file0" dev="sda1" ino=14687 res=1 errno=0 [ 1498.155710][ T6305] loop0: detected capacity change from 0 to 264192 [ 1498.235349][ T26] audit: type=1804 audit(1637828959.222:876): pid=6282 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/721/file0/file0" dev="sda1" ino=14687 res=1 errno=0 08:29:19 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1498.350332][ T6305] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 08:29:19 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='emild>\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1498.750312][ T26] audit: type=1804 audit(1637828959.942:877): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/722/file0/file0" dev="sda1" ino=13896 res=1 errno=0 [ 1498.854139][ T26] audit: type=1804 audit(1637828959.982:878): pid=6372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/722/file0/file0" dev="sda1" ino=13896 res=1 errno=0 08:29:20 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r5) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:20 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='msdos\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:20 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1499.789269][ T26] audit: type=1804 audit(1637828960.982:879): pid=6442 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/724/file0/file0" dev="sda1" ino=14081 res=1 errno=0 08:29:21 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='msdos\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1499.954803][ T26] audit: type=1804 audit(1637828961.012:880): pid=6452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/724/file0/file0" dev="sda1" ino=14081 res=1 errno=0 08:29:24 executing program 4: unshare(0x48040200) unshare(0x10000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x141ac0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) unshare(0x26179fd0b520c7c0) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:24 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) chdir(0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="b425b2", @ANYRESHEX]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7f, 0x20, @struct={0x5cb, 0x7}, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8, 0x3756}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0xfd, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x4d1, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe, 0x2]}, {0x4, 0x0, 0xffff}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB="6572726f72733d636f99919903c23e0000000000", @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:24 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000000380)={{r2}, 0x0, 0x16, @inherit={0x80, &(0x7f0000001580)=ANY=[@ANYBLOB="00000000000000000700000100000000060000000000000009000000795b000000000000000000002000000000000000b82700000004000000000000000800000000000000fdff03ffffffffff090007000000000001000000000000000100000000000000008000000000000009000000000000000600000000000000e81e1ca9aa6a7029507b93279c72e9ab0eb00395487b54b3676c358d"]}, @subvolid=0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x0) r3 = syz_open_dev$audion(&(0x7f0000001380), 0x5, 0x2) sendto$inet6(r3, &(0x7f00000013c0)="92f5510e641da755c9c8428421994524280639d2935acd0dc60fba7a9198ec21851260a8b4283bc7ad1c718b292e10f25b61c8e05e924a94b3afd7b9cdb9c13cb04f7137cdddb730a5ba780cb520deb2081ec03ab7bdd1b2427ee05f22d7f974a832ce00db295229d07a0eb4de9533abf1881f57146c115e88c9f7aaadce67998a9397f2e413e418339ff8cc6531a964e5edb8837a756b9d99052b7e70b367544435e93759e858c047c8d2f786d6a87a02ca4dcc124570be0ca236353c308672f0790652a48f68eda18764430232fcbc3ef92ad2c2be822521", 0xd9, 0x80, &(0x7f00000014c0)={0xa, 0x4e20, 0x8, @mcast2, 0x3f}, 0x1c) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0xfffffffa, 0x1, 0x0, 0x2, 0x5, 0x4}, 0x20) r4 = signalfd4(r2, &(0x7f0000001e80)={[0x5]}, 0x8, 0x80800) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000001b80)=@pppol2tp={0x18, 0x1, {0x0, r3, {0x2, 0x4e22, @rand_addr=0x64010102}, 0x4, 0x2, 0x1, 0x2}}, 0x26) sendto$inet6(r4, &(0x7f0000001ec0)="f082ed365e728c08c5310d8010a359b266878cda38e17b7d37c29e82ce63ef22f0c45c4bf3e8c8eeee02d85e1e39ebe57dd18f2c13b757b43cb2354a1074a497339dd502c0f38da923978ca71fcff912d4efcbe6ed76881987957125fcd172764cf9850f2a72dc3a09e15660fe46bb3e5911a18c89857405082ef1a0665f69ada22a8890412b026ddfaec6c51a1b517364b2e28dfb1d013544b96cceac10226b5ba6246dbb92ace7033a0ab66114f80c82", 0xb1, 0x10040000, &(0x7f0000001f80)={0xa, 0x4e24, 0x401, @remote, 0x3}, 0x1c) 08:29:24 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='msdos\x00') syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:24 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x89e2, 0x0) 08:29:24 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) syz_open_pts(r0, 0x4c040) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) [ 1503.428813][ T26] audit: type=1804 audit(1637828964.622:881): pid=6481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/725/file0/file0" dev="sda1" ino=14545 res=1 errno=0 08:29:24 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='ext4\x00', 0xdd25fb27412603f1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) r4 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x3, &(0x7f0000000740)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}, {&(0x7f00000006c0)="7a5aa9afd6189c4dbb05eb627b0af601cf247425a34fe3f3ba7800d69ffe52884844740f8f7cf49f700c1abc26cddfd960a2aee75c1ebec593371d87d3a9f9e6164eb37f4794fcc41a17348bec457057428d8325afdb43d0bdef3d3a8daa38af2c5d6ef52e48503a0e", 0x69, 0x9}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRES32=r4, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba6d6c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0x8, 0x1, 0x8, 0x0, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x400}, 0x2200, 0x8, 0xfffffff8, 0x0, 0x7, 0x2, 0x7, 0x0, 0x2, 0x0, 0x1abe29a}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1503.628127][ T26] audit: type=1804 audit(1637828964.622:882): pid=6481 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/725/file0/file0" dev="sda1" ino=14545 res=1 errno=0 08:29:25 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e5d5f626c6f63733d0031483435345031302c687567653d616c776179732c6d6158073d4d41595f455845432c657569643e0b7130ca2882600a5f1caecb9349cc82b203aad030d62f3081dabfb7732edad9e62156af02556f9b900ce7f16e16a5f1a11b83d5ec43b34dbb4e8ae2027c547ddc4f592ec6f31b3453d3706a8b4c7b7db43fa766e0b4908b9be2c76a34abc876921900", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="657d726f7273ef2cf233871408b1000043523d63", @ANYRESHEX, @ANYBLOB="2c7cd341fa54dfe2421d10fa2f330f3102c8622e52c68685d1ec7b8904e4cc859bd9bc0cf00769945660dcb26398122c0f0aa4ad1f98377a55e5efe70e25e007b502b1c6e446268f663317096822a2a6c526e44759f8614e4ef10aa2666061f1b97c2eead8729ad000be050000000c462ff2f33109376d3ee0733f500c7515bdb29192975ede242a69d72c19efc57918832fc2c4ef726c9b29ed657136c79dc852965ca389", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1504.014298][ T26] audit: type=1804 audit(1637828965.202:883): pid=6600 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/726/file0/file0" dev="sda1" ino=14194 res=1 errno=0 08:29:25 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x29, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x51, @struct, 0x1, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0xbe, @struct={0x40}, 0x0, 0x0, [0x3, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x0, 0x2}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYRES16, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb", @ANYRESOCT, @ANYRESDEC]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) fcntl$setpipe(r4, 0x407, 0xffff) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:25 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e5d5f626c6f63733d0031483435345031302c687567653d616c776179732c6d6158073d4d41595f455845432c657569643e0b7130ca2882600a5f1caecb9349cc82b203aad030d62f3081dabfb7732edad9e62156af02556f9b900ce7f16e16a5f1a11b83d5ec43b34dbb4e8ae2027c547ddc4f592ec6f31b3453d3706a8b4c7b7db43fa766e0b4908b9be2c76a34abc876921900", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="657d726f7273ef2cf233871408b1000043523d63", @ANYRESHEX, @ANYBLOB="2c7cd341fa54dfe2421d10fa2f330f3102c8622e52c68685d1ec7b8904e4cc859bd9bc0cf00769945660dcb26398122c0f0aa4ad1f98377a55e5efe70e25e007b502b1c6e446268f663317096822a2a6c526e44759f8614e4ef10aa2666061f1b97c2eead8729ad000be050000000c462ff2f33109376d3ee0733f500c7515bdb29192975ede242a69d72c19efc57918832fc2c4ef726c9b29ed657136c79dc852965ca389", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1504.633814][ T26] audit: type=1804 audit(1637828965.822:884): pid=6648 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/727/file0/file0" dev="sda1" ino=14594 res=1 errno=0 08:29:26 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) chdir(&(0x7f0000000140)='./file0\x00') ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1504.774951][ T26] audit: type=1804 audit(1637828965.822:885): pid=6688 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/727/file0/file0" dev="sda1" ino=14594 res=1 errno=0 08:29:26 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e5d5f626c6f63733d0031483435345031302c687567653d616c776179732c6d6158073d4d41595f455845432c657569643e0b7130ca2882600a5f1caecb9349cc82b203aad030d62f3081dabfb7732edad9e62156af02556f9b900ce7f16e16a5f1a11b83d5ec43b34dbb4e8ae2027c547ddc4f592ec6f31b3453d3706a8b4c7b7db43fa766e0b4908b9be2c76a34abc876921900", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="657d726f7273ef2cf233871408b1000043523d63", @ANYRESHEX, @ANYBLOB="2c7cd341fa54dfe2421d10fa2f330f3102c8622e52c68685d1ec7b8904e4cc859bd9bc0cf00769945660dcb26398122c0f0aa4ad1f98377a55e5efe70e25e007b502b1c6e446268f663317096822a2a6c526e44759f8614e4ef10aa2666061f1b97c2eead8729ad000be050000000c462ff2f33109376d3ee0733f500c7515bdb29192975ede242a69d72c19efc57918832fc2c4ef726c9b29ed657136c79dc852965ca389", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:29 executing program 4: unshare(0x48040200) unshare(0x60800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0), 0x40080, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)=0x16002af) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:29 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errobs', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:29 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) chdir(&(0x7f0000000140)='./file0\x00') ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:29 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x13) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000440)={0x5, 0xfffd, 0x8, 0x43b, 0x6, "fede61eefcd1a5b3"}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) sendfile(r0, r1, &(0x7f0000000140)=0x9, 0xb07) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x40000, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000400)={0x9, 0x3, 0x7, 0x7, 0x1a, "ab41686276aa6943af0f8a4592c793330d3f2f"}) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:29 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x20000800) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000140)={0x0, 0x5, 0x9, r3, 0x0, &(0x7f00000000c0)={0x980914, 0x6f6, '\x00', @p_u32=&(0x7f0000000080)}}) 08:29:29 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x89f5, 0x0) [ 1508.933736][ T26] audit: type=1804 audit(1637828970.122:886): pid=6819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/729/file0/file0" dev="sda1" ino=14702 res=1 errno=0 08:29:30 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x20002000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x4, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0x7]}, {0x4}}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xc) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1509.169443][ T26] audit: type=1804 audit(1637828970.162:887): pid=6836 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/729/file0/file0" dev="sda1" ino=14702 res=1 errno=0 08:29:30 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x29, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x51, @struct, 0x1, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0xbe, @struct={0x40}, 0x0, 0x0, [0x3, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x0, 0x2}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYRES16, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb", @ANYRESOCT, @ANYRESDEC]) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) fcntl$setpipe(r4, 0x407, 0xffff) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:30 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000280)={{r1}, 0x0, 0x12, @unused=[0x8, 0x800, 0x0, 0x5], @subvolid=0xffffffff}) unshare(0x5a040a00) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) dup(0xffffffffffffffff) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x12) r3 = pidfd_getfd(0xffffffffffffffff, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r4, 0x4020744f, 0x0) [ 1509.565704][ T26] audit: type=1804 audit(1637828970.752:888): pid=6905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/730/file0/file0" dev="sda1" ino=14305 res=1 errno=0 08:29:30 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_bl}cks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYBLOB="6bc0525b737ae0b474d9fa5967503ada56ef742eb5b9d39557f963a95a162b9feb860354fe377a8bc8aa99ed11b2faa588f2c75e16492c169678c8cc9d0cefaf80b939e7f16a607fe4dc84484bae824d777b5eee199bdcab3656b33a9b836dcb92b44f231e48ddbf1855d47ac62644794726d045d200ee8f36dc6a280e82270d60309c495e90e53079695b49a82d670a9d9da15dae0d170512e50477d2996a5eb1a61a2e025a2115ebdeab045d8e3bef5a9daf9f4917a628b13d9835a1559988276826abf973bf136e1aa985ea0c534204cfb07741040dcbe6350104fe651fe27ad6ff2e6ed07312793103f49090645d62b23642", @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x7f, 0x3, 0x3, 0x46, 0x0, 0x89e, 0x2, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000140)}, 0x1000, 0x8, 0x9, 0x0, 0x7fff, 0x80000001, 0x2, 0x0, 0x1, 0x0, 0x80000001}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) unshare(0x12000800) [ 1509.687828][ T26] audit: type=1804 audit(1637828970.792:889): pid=6905 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/730/file0/file0" dev="sda1" ino=14305 res=1 errno=0 08:29:31 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="73c90000", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:31 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x80040, 0x0, 0x15}, 0x18) r2 = syz_open_pts(r0, 0x111440) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0x14) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) unshare(0x10400) [ 1510.182585][ T26] audit: type=1804 audit(1637828971.372:890): pid=6928 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/731/file0/file0" dev="sda1" ino=14693 res=1 errno=0 08:29:31 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x553100, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:31 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="73c90000", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:32 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x10, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x280c000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r3) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1510.851065][ T26] audit: type=1804 audit(1637828972.042:891): pid=7033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/732/file0/file0" dev="sda1" ino=14339 res=1 errno=0 [ 1510.975342][ T26] audit: type=1804 audit(1637828972.072:892): pid=7035 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/732/file0/file0" dev="sda1" ino=14339 res=1 errno=0 [ 1511.271886][ T26] audit: type=1804 audit(1637828972.462:893): pid=7055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/733/file0/file0" dev="sda1" ino=14709 res=1 errno=0 [ 1511.489028][ T26] audit: type=1804 audit(1637828972.502:894): pid=7065 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/733/file0/file0" dev="sda1" ino=14709 res=1 errno=0 08:29:32 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x10000a00) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x100) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540), 0x0, 0x0, 0x400000) 08:29:32 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)="5f0dde10e28fc3184c8041b357c8bc35fafe08406782f73c9f7aad2811f598e18f36ef2381f40233fd7cb1de6de08e25d29691648706c21e4a59bb1c432a1ac0e552371af73ac63f8cfa7d34b3c06f88d0d9772626a03a51cccdff0e38c4dca32f58e2cc936dc245ee44bc85861db3b119673e44b387d086401809cb7b2345ed4afde7cbf01c7b2a7fda281cccf75c4953e40fabe690a65ec466feca0d3d4b20b1c1c7ff9b05758837e2405b7f322b98778576f4d1b81050e94a10ec65f1868b93b7774071e105ff7d640869b70f984fcb33c3c21ebeb1d4661bb4115f27a4f75d", 0xe1}], 0x1) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:32 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="73c90000", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:32 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000103, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x537b, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c7569646d244a712a349401a18685c2d70e440439989491e52373bdeb13c5604dfc3b13207aee47d4ab2c57cf74e360d6e80106242592ac969c0582cc820727422e735169cea25d93124cdd11e8c0ca01dfc1dd21621756d398534efaad6116cd541219d28969b75dde08cc821c28ff9f6c9ec22cafd82cda79e73c45122bda6d4433975f154e446fbd45591fbb969ace3ac111baec6db0a3be25f6e51f8f232f01d09d10f331ab5c6343f04bf851afbb796ecd66657ca718870c024151ea4f8df40bf151e4eac886d2527c4b8f3709a0ed3a2f74b04dcb00000000000000000000000000f2009fd632af771545e2c1981acad8bc579f55064afe25dc3d822354b85bcda206e6bf550bfb2da352e455b51ebad4102a197b35795120d97c595d4cf48f2fd414b1e8888a88c43d527cd77dc0f6d4e3a8278eda4c8f07af4aa9dd103552978fedb08e00f9ee8bb3e53d95519bfd10175a775550ec81637ad49f714900"/367, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:32 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xab09, 0x0) [ 1512.002290][ T26] audit: type=1804 audit(1637828973.192:895): pid=7114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/734/file0/file0" dev="sda1" ino=14716 res=1 errno=0 08:29:33 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8, 0xffffffff}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct={0x0, 0x1}, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @usage=0x1, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:33 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000103, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x537b, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c7569646d244a712a349401a18685c2d70e440439989491e52373bdeb13c5604dfc3b13207aee47d4ab2c57cf74e360d6e80106242592ac969c0582cc820727422e735169cea25d93124cdd11e8c0ca01dfc1dd21621756d398534efaad6116cd541219d28969b75dde08cc821c28ff9f6c9ec22cafd82cda79e73c45122bda6d4433975f154e446fbd45591fbb969ace3ac111baec6db0a3be25f6e51f8f232f01d09d10f331ab5c6343f04bf851afbb796ecd66657ca718870c024151ea4f8df40bf151e4eac886d2527c4b8f3709a0ed3a2f74b04dcb00000000000000000000000000f2009fd632af771545e2c1981acad8bc579f55064afe25dc3d822354b85bcda206e6bf550bfb2da352e455b51ebad4102a197b35795120d97c595d4cf48f2fd414b1e8888a88c43d527cd77dc0f6d4e3a8278eda4c8f07af4aa9dd103552978fedb08e00f9ee8bb3e53d95519bfd10175a775550ec81637ad49f714900"/367, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:33 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000103, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x537b, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="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"/367, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:36 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:36 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x2) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f00000016c0)={0x2, 0x1, @status={[0x4, 0xfffffffffffffffc, 0xff, 0x1ff, 0x3d, 0x1]}, [0x4, 0x5, 0x5, 0xfff, 0x7ff, 0x6, 0x2, 0x9, 0x9, 0xff, 0x1, 0x10001, 0xfffffffffffffff9, 0xffffffff, 0x947, 0x9, 0xe00000000000, 0x7, 0x1f, 0x8, 0x77, 0xffffffffffffff80, 0x3, 0x0, 0x8, 0x1, 0x8, 0x0, 0x6, 0x40, 0x80000001, 0xf829, 0x4, 0x80000001, 0x200, 0xffffffffffffff00, 0x3, 0x80000001, 0x2fb, 0x9, 0x0, 0x0, 0xeb11, 0xde5b, 0x0, 0x2, 0x4, 0x29fb, 0x10000, 0x361, 0xffffffffffff0000, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x8, 0x1000, 0x4, 0x1f, 0x9]}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:36 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001640)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x6, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x2000081}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r3]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c976964", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:36 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x40000000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x4000200) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) [ 1515.941940][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 1515.941957][ T26] audit: type=1804 audit(1637828977.132:899): pid=7306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/736/file0/file0" dev="sda1" ino=14736 res=1 errno=0 08:29:37 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x2) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$BTRFS_IOC_DEV_REPLACE(r2, 0xca289435, &(0x7f00000016c0)={0x2, 0x1, @status={[0x4, 0xfffffffffffffffc, 0xff, 0x1ff, 0x3d, 0x1]}, [0x4, 0x5, 0x5, 0xfff, 0x7ff, 0x6, 0x2, 0x9, 0x9, 0xff, 0x1, 0x10001, 0xfffffffffffffff9, 0xffffffff, 0x947, 0x9, 0xe00000000000, 0x7, 0x1f, 0x8, 0x77, 0xffffffffffffff80, 0x3, 0x0, 0x8, 0x1, 0x8, 0x0, 0x6, 0x40, 0x80000001, 0xf829, 0x4, 0x80000001, 0x200, 0xffffffffffffff00, 0x3, 0x80000001, 0x2fb, 0x9, 0x0, 0x0, 0xeb11, 0xde5b, 0x0, 0x2, 0x4, 0x29fb, 0x10000, 0x361, 0xffffffffffff0000, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x3, 0x0, 0x80000000, 0x0, 0x8, 0x1000, 0x4, 0x1f, 0x9]}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1516.166863][ T26] audit: type=1804 audit(1637828977.182:900): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/736/file0/file0" dev="sda1" ino=14736 res=1 errno=0 08:29:38 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x56, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) kcmp(0xffffffffffffffff, r3, 0x1, r0, r1) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:29:38 executing program 4: unshare(0x48040200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4020744f, 0x0) 08:29:38 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage=0xffffffff, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct={0x5}, 0x1fffffc, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe, 0x0, 0x1]}, {0x4}}) r1 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x20400c0, &(0x7f0000000900)=ANY=[]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:38 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001640)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x6, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x2000081}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r3]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c976964", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:38 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x400448c9, 0x0) [ 1517.520174][ T26] audit: type=1804 audit(1637828978.712:901): pid=7431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/737/file0/file0" dev="sda1" ino=14753 res=1 errno=0 08:29:38 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r1) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:39 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001640)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x6, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x2000081}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r3]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c976964", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:39 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1518.090225][ T26] audit: type=1804 audit(1637828979.282:902): pid=7526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/738/file0/file0" dev="sda1" ino=14761 res=1 errno=0 [ 1518.259933][ T26] audit: type=1804 audit(1637828979.282:903): pid=7526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/738/file0/file0" dev="sda1" ino=14761 res=1 errno=0 08:29:39 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1518.501389][ T26] audit: type=1804 audit(1637828979.692:904): pid=7559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/739/file0/file0" dev="sda1" ino=14759 res=1 errno=0 08:29:39 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1518.581598][ T26] audit: type=1804 audit(1637828979.722:905): pid=7568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/739/file0/file0" dev="sda1" ino=14759 res=1 errno=0 [ 1518.907641][ T26] audit: type=1804 audit(1637828980.092:906): pid=7617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/740/file0/file0" dev="sda1" ino=14764 res=1 errno=0 [ 1518.993364][ T26] audit: type=1804 audit(1637828980.092:907): pid=7627 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/740/file0/file0" dev="sda1" ino=14764 res=1 errno=0 08:29:43 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x2000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmstat\x00', 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:43 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) clock_gettime(0x0, &(0x7f0000002f40)={0x0, 0x0}) recvmmsg$unix(r3, &(0x7f0000002e40)=[{{&(0x7f0000000c80)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000d00)=""/153, 0x99}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000dc0)=""/145, 0x91}], 0x3, &(0x7f0000000e80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000000f40), 0x6e, &(0x7f0000001100)=[{&(0x7f0000000fc0)=""/165, 0xa5}, {&(0x7f00000009c0)=""/28, 0x1c}, {&(0x7f0000001080)=""/11, 0xb}], 0x3}}, {{&(0x7f0000001140)=@abs, 0x6e, &(0x7f00000027c0)=[{&(0x7f00000011c0)=""/68, 0x44}, {&(0x7f0000001240)=""/14, 0xe}, {&(0x7f0000001280)=""/143, 0x8f}, {&(0x7f0000001340)=""/20, 0x14}, {&(0x7f0000001400)=""/50, 0x32}, {&(0x7f0000001440)=""/185, 0xb9}, {&(0x7f0000001540)=""/68, 0x44}, {&(0x7f00000026c0)=""/217, 0xd9}, {&(0x7f00000015c0)=""/9, 0x9}], 0x9, &(0x7f0000002880)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x100}}, {{&(0x7f0000002980), 0x6e, &(0x7f0000002cc0)=[{&(0x7f0000002a00)=""/108, 0x6c}, {&(0x7f0000002a80)=""/158, 0x9e}, {&(0x7f0000002b40)=""/196, 0xc4}, {&(0x7f0000001600)=""/56, 0x38}, {&(0x7f0000002c40)=""/43, 0x2b}, {&(0x7f0000002c80)=""/2, 0x2}], 0x6, &(0x7f0000002d40)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}], 0x4, 0x60, &(0x7f0000002f80)={r4, r5+60000000}) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f00000005c0)='./file0/file0\x00', 0x8, 0x6, &(0x7f0000000bc0)=[{&(0x7f0000000640)="b3102a2c1687f13c8a83638be8f8a286295a602c6f2797a08c07be439c2ff3c97708f649c904b20997b020047f582bbb378312503bdee068e85a4e1f", 0x3c, 0x7fff}, {&(0x7f00000006c0)="59cf68d4f4b7d102cd731b0a36fea9b2a23bb85abd1e699a0b2d2a921bffa5377b2cfad56335ede8ff8f4ee34508ca83b2ee2038b7cb6cf7aef3e803cb91fd8588194cd4f899b87a92c5ee90bb7030473c509a0b4668588c35ef9951bb9417bc5f7b32daa590628d050c4a0e", 0x6c, 0x10001}, {&(0x7f0000000740)="a21a1bbaa06dbe67d1c1a0c241ad172454b81a1aa762424a7bf6cf95f51c321f85cb53b07de3b2fe080082f79ed744861738313639336afa2696e67f503bc6117f5c8a46c827fbce5b92e2545511ed9130f9413a3c92a17a9989c2d9c163056fc49e6be83e89d493b2a25a92a5b397e04eb6e829a63c76fe08", 0x79, 0x7}, {&(0x7f00000007c0)="89e9ab0933a4f3f6caf48cc7fc81cdd1481c4ff633386ab6169ac60b", 0x1c, 0x1c40d9cb}, {&(0x7f0000000a40)="3c2641b08c22c136e8dc9c02f8bfa83e0fabb352c6326bff1729625ea485fd3c5f2816ca14c03212ff19d151eb4d87962c9e40e8bc45cedc8f446d0cf98d147689", 0x41, 0x4}, {&(0x7f0000000ac0)="040668fba9252ea188876b68bceada3147a1eaf825b98c5a20acaf45367d85560fc6c32e2d4da9436a0a6b70721e9bad803d8273bedff99a8a348623cf64be4cf31ff028d753710d4e7bd5834428d88436bbf4f94f4bb15259047e21d538d6d3769bdc8abb15a37a0fbcca3a7ed68f61e24bd38420d8889c9ac0672281067917430b19e62c6acdf4a79c8c5d6368d93efc54e62c764c0045c000b9e20e573919a9c910463a96d9e4c304802f9be5c3774d87f670aa32e74994e32c21b847b547daa924936c0b6fdca1689668482caec9f42c79", 0xd3, 0x7}], 0x1801000, &(0x7f0000002fc0)={[{@dots}, {@nodots}, {@fat=@usefree}, {@nodots}, {@dots}, {@nodots}, {@nodots}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x35, 0x5f, 0x51, 0x34, 0x62, 0x36], 0x2d, [0x34, 0x33, 0x34, 0x35], 0x2d, [0x33, 0x34, 0x38, 0x53], 0x2d, [0x39, 0x36, 0x36, 0x66], 0x2d, [0x61, 0x0, 0x64, 0x64, 0xe8d461b543de9f66, 0x32, 0x31, 0x64]}}}, {@euid_gt={'euid>', 0xee01}}, {@fowner_eq={'fowner', 0x3d, r6}}]}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r7, &(0x7f0000004780)={0x2020}, 0x2020) [ 1522.364423][ T26] audit: type=1804 audit(1637828983.552:908): pid=7664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/741/file0/file0" dev="sda1" ino=14772 res=1 errno=0 [ 1522.466273][ T26] audit: type=1804 audit(1637828983.592:909): pid=7664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/741/file0/file0" dev="sda1" ino=14772 res=1 errno=0 08:29:44 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000200)=""/260) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:44 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1b) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x21, 0x7, 0x3, 0xffff, 0x18, "ca7f65deee39b2eb63b65a267c9f847fb913d6"}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:44 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:44 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x4) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:44 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x400448dd, 0x0) 08:29:44 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000140)=0x1) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) write(r2, &(0x7f0000000200)="db9bf55aa380b500327ec3b1536855df5686e9076081fafa275d790bb17992122750e3b5ffc7294b8286ef6b9632e9773baa2cfb04ea37bded59655cf1058e53691de508e0758de2fb716ade39af51da926b37b632e123300ea47abd279f4eac572c91b52617de874b91807bcca075827e920a9ded553d5ba3dd55dae1d8f60ac8595c28002ceb708095cfffdcbd8113de95359928506964e94747d7dd0d7b254ddec7995a3e592b91493142c97f6d4fd8a29ccc05170e0508fbeb832d91804e69f2744a6ec4381fbb7c7992db80382a9e1b7fac9589", 0xd6) [ 1523.425537][ T26] audit: type=1804 audit(1637828984.612:910): pid=7723 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/742/file0/file0" dev="sda1" ino=14794 res=1 errno=0 08:29:44 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x4, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @usage=0x1, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=alYays,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0x6, 0x4, 0x1, 0x9, 0x0, 0x7fff, 0x30c8, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f0000000140), 0x528b3ad109648315}, 0x4, 0x0, 0x6, 0x6, 0x6, 0x9, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x9, r0, 0x1) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) rmdir(&(0x7f00000005c0)='./file0\x00') creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1523.640132][ T26] audit: type=1804 audit(1637828984.652:911): pid=7752 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/742/file0/file0" dev="sda1" ino=14794 res=1 errno=0 [ 1523.679548][ T7725] warn_alloc: 1 callbacks suppressed 08:29:44 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x7f, 0x20, @struct={0x759, 0xe49e}, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x83}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1523.679565][ T7725] syz-executor.4: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 1523.825461][ T7725] CPU: 1 PID: 7725 Comm: syz-executor.4 Not tainted 5.16.0-rc2-syzkaller #0 [ 1523.834273][ T7725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1523.844330][ T7725] Call Trace: [ 1523.847610][ T7725] [ 1523.850540][ T7725] dump_stack_lvl+0xcd/0x134 [ 1523.855151][ T7725] warn_alloc.cold+0x87/0x17a [ 1523.859843][ T7725] ? zone_watermark_ok_safe+0x290/0x290 [ 1523.865385][ T7725] ? __kmalloc_node+0x62/0x390 [ 1523.870182][ T7725] ? __vmalloc_node_range+0x574/0xab0 [ 1523.875576][ T7725] __vmalloc_node_range+0x883/0xab0 [ 1523.880782][ T7725] ? vfree_atomic+0xe0/0xe0 [ 1523.885279][ T7725] ? __down_timeout+0x10/0x10 [ 1523.889956][ T7725] ? n_tty_open+0x16/0x170 [ 1523.894369][ T7725] vzalloc+0x67/0x80 [ 1523.898278][ T7725] ? n_tty_open+0x16/0x170 [ 1523.902872][ T7725] n_tty_open+0x16/0x170 [ 1523.907106][ T7725] ? n_tty_set_termios+0x1010/0x1010 [ 1523.912384][ T7725] tty_ldisc_open+0x9b/0x110 [ 1523.916970][ T7725] tty_ldisc_setup+0x90/0x100 [ 1523.921641][ T7725] tty_init_dev.part.0+0x1f4/0x610 [ 1523.926746][ T7725] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1523.932216][ T7725] tty_init_dev+0x5b/0x80 [ 1523.936540][ T7725] ptmx_open+0x112/0x360 [ 1523.940771][ T7725] ? pty_unix98_compat_ioctl+0x50/0x50 [ 1523.946240][ T7725] chrdev_open+0x266/0x770 [ 1523.950653][ T7725] ? cdev_device_add+0x210/0x210 [ 1523.955591][ T7725] ? fsnotify_perm.part.0+0x22d/0x620 [ 1523.960968][ T7725] do_dentry_open+0x4c8/0x1250 [ 1523.965828][ T7725] ? cdev_device_add+0x210/0x210 [ 1523.970759][ T7725] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1523.976992][ T7725] ? may_open+0x1f6/0x420 [ 1523.981314][ T7725] path_openat+0x1cad/0x2750 [ 1523.985923][ T7725] ? path_lookupat+0x860/0x860 [ 1523.990675][ T7725] ? perf_trace_lock+0xeb/0x4d0 [ 1523.995520][ T7725] ? check_path.constprop.0+0x50/0x50 [ 1524.000892][ T7725] do_filp_open+0x1aa/0x400 [ 1524.005388][ T7725] ? may_open_dev+0xf0/0xf0 [ 1524.009894][ T7725] ? rwlock_bug.part.0+0x90/0x90 [ 1524.014825][ T7725] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1524.021058][ T7725] ? _find_next_bit+0x1e3/0x260 [ 1524.025911][ T7725] ? _raw_spin_unlock+0x24/0x40 [ 1524.030865][ T7725] ? alloc_fd+0x2f0/0x670 [ 1524.035198][ T7725] do_sys_openat2+0x16d/0x4d0 [ 1524.040172][ T7725] ? build_open_flags+0x6f0/0x6f0 [ 1524.045208][ T7725] ? __context_tracking_exit+0xb8/0xe0 [ 1524.050694][ T7725] ? lock_downgrade+0x6e0/0x6e0 [ 1524.055543][ T7725] __x64_sys_openat+0x13f/0x1f0 [ 1524.060390][ T7725] ? __ia32_sys_open+0x1c0/0x1c0 [ 1524.065322][ T7725] ? syscall_enter_from_user_mode+0x21/0x70 [ 1524.071214][ T7725] do_syscall_64+0x35/0xb0 [ 1524.075625][ T7725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1524.081510][ T7725] RIP: 0033:0x7f099c5f5ae9 [ 1524.085916][ T7725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1524.105517][ T7725] RSP: 002b:00007f0999b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1524.113929][ T7725] RAX: ffffffffffffffda RBX: 00007f099c709020 RCX: 00007f099c5f5ae9 [ 1524.121908][ T7725] RDX: 0000000000000000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1524.129866][ T7725] RBP: 00007f099c64ff6d R08: 0000000000000000 R09: 0000000000000000 [ 1524.137845][ T7725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1524.145822][ T7725] R13: 00007ffcfe607a3f R14: 00007f0999b4a300 R15: 0000000000022000 [ 1524.153800][ T7725] [ 1524.319134][ T7725] Mem-Info: [ 1524.322456][ T7725] active_anon:317 inactive_anon:186839 isolated_anon:0 [ 1524.322456][ T7725] active_file:6690 inactive_file:132162 isolated_file:0 [ 1524.322456][ T7725] unevictable:784 dirty:252 writeback:0 [ 1524.322456][ T7725] slab_reclaimable:22417 slab_unreclaimable:64149 [ 1524.322456][ T7725] mapped:72270 shmem:17250 pagetables:2701 bounce:0 [ 1524.322456][ T7725] kernel_misc_reclaimable:0 [ 1524.322456][ T7725] free:1150299 free_pcp:6348 free_cma:0 08:29:45 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x2050000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1524.562543][ T7725] Node 0 active_anon:1268kB inactive_anon:751344kB active_file:26640kB inactive_file:528648kB unevictable:1600kB isolated(anon):0kB isolated(file):0kB mapped:297780kB dirty:1008kB writeback:0kB shmem:75248kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 301056kB writeback_tmp:0kB kernel_stack:14032kB pagetables:10800kB all_unreclaimable? no 08:29:45 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x4, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @usage=0x1, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xc) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=alYays,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) perf_event_open(&(0x7f00000006c0)={0x5, 0x80, 0x6, 0x4, 0x1, 0x9, 0x0, 0x7fff, 0x30c8, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f0000000140), 0x528b3ad109648315}, 0x4, 0x0, 0x6, 0x6, 0x6, 0x9, 0x0, 0x0, 0x1, 0x0, 0x8}, 0x0, 0x9, r0, 0x1) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) rmdir(&(0x7f00000005c0)='./file0\x00') creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1524.676298][ T7725] Node 1 active_anon:0kB inactive_anon:916kB active_file:120kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2452kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 1524.756047][ T7725] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1524.906860][ T7725] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 1524.917175][ T26] audit: type=1804 audit(1637828986.102:912): pid=7859 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/744/file0/file0" dev="sda1" ino=14811 res=1 errno=0 [ 1524.985627][ T7725] Node 0 DMA32 free:629260kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:19968kB inactive_anon:739792kB active_file:26640kB inactive_file:528648kB unevictable:1600kB writepending:1008kB present:3129332kB managed:2716764kB mlocked:64kB bounce:0kB free_pcp:18112kB local_pcp:7580kB free_cma:0kB 08:29:46 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000640)=0xe8) mount$binder(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0x24b1002, &(0x7f00000007c0)={[{@stats}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@appraise}, {@pcr={'pcr', 0x3d, 0xb}}, {@obj_role={'obj_role', 0x3d, '#!:'}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:46 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0, 0x0, 0x1ff}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYRES64=r4, @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1525.237102][ T7725] lowmem_reserve[]: 0 0 0 0 0 [ 1525.265099][ T7725] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1525.422472][ T7725] lowmem_reserve[]: 0 0 0 0 0 [ 1525.456673][ T7725] Node 1 Normal free:3949768kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:0kB inactive_anon:916kB active_file:120kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:292kB local_pcp:0kB free_cma:0kB [ 1525.581161][ T26] audit: type=1804 audit(1637828986.772:913): pid=7938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/745/file0/file0" dev="sda1" ino=14816 res=1 errno=0 [ 1525.688073][ T7725] lowmem_reserve[]: 0 0 0 0 0 [ 1525.721296][ T7725] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1525.781534][ T7725] Node 0 DMA32: 49*4kB (ME) 39*8kB (U) 630*16kB (UME) 941*32kB (UME) 966*64kB (UME) 283*128kB (UME) 45*256kB (UME) 27*512kB (UME) 8*1024kB (U) 2*2048kB (UM) 108*4096kB (UM) = 618748kB [ 1525.843194][ T7725] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1525.884482][ T7725] Node 1 Normal: 170*4kB (UME) 36*8kB (UE) 22*16kB (UME) 129*32kB (UME) 78*64kB (UME) 18*128kB (UE) 7*256kB (U) 4*512kB (U) 1*1024kB (E) 2*2048kB (M) 959*4096kB (UM) = 3949768kB [ 1525.945320][ T7725] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1525.978082][ T7725] Node 0 hugepages_total=2 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1526.004735][ T7725] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1526.028923][ T7725] Node 1 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 1526.050165][ T7725] 64818 total pagecache pages [ 1526.061350][ T7725] 0 pages in swap cache [ 1526.071542][ T7725] Swap cache stats: add 0, delete 0, find 0/0 [ 1526.085767][ T7725] Free swap = 0kB [ 1526.095563][ T7725] Total swap = 0kB [ 1526.105143][ T7725] 2097051 pages RAM [ 1526.115197][ T7725] 0 pages HighMem/MovableOnly [ 1526.132743][ T7725] 384515 pages reserved [ 1526.149843][ T7725] 0 pages cma reserved [ 1526.230627][ T7725] ptm ptm0: ldisc open failed (-12), clearing slot 0 [ 1526.253758][ T7854] ptm ptm1: ldisc open failed (-12), clearing slot 1 [ 1526.282159][ T7721] ptm ptm2: ldisc open failed (-12), clearing slot 2 [ 1526.298464][ T7860] ptm ptm3: ldisc open failed (-12), clearing slot 3 [ 1526.307293][ T7899] ptm ptm4: ldisc open failed (-12), clearing slot 4 [ 1526.327408][ T7877] ptm ptm5: ldisc open failed (-12), clearing slot 5 08:29:47 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000640)=0xe8) mount$binder(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0x24b1002, &(0x7f00000007c0)={[{@stats}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@appraise}, {@pcr={'pcr', 0x3d, 0xb}}, {@obj_role={'obj_role', 0x3d, '#!:'}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:47 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) r6 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) fcntl$lock(r6, 0x24, &(0x7f0000000140)={0x2, 0x0, 0x3ff, 0x9}) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:47 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000280)=""/4096, 0x1000, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0xc0000, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:29:47 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket(0x80000000000000a, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f0000003940)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000580)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfbc}}], 0x18}}], 0x2, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @broadcast}, 0x10) fstatfs(r1, &(0x7f0000000380)=""/84) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x38040100) ftruncate(r3, 0x3) unshare(0x800) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) preadv(r4, &(0x7f0000000400)=[{&(0x7f0000000080)=""/92, 0x5c}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000140)}, {&(0x7f0000000300)=""/126, 0x7e}, {&(0x7f0000000480)=""/109, 0x6d}], 0x5, 0x7f, 0x0) mmap(&(0x7f000047d000/0x4000)=nil, 0x4000, 0x1, 0x8010, 0xffffffffffffffff, 0xad593000) 08:29:47 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) clone(0x254000, &(0x7f0000000280)="a5904831d6ce5dc271c7ff6dda0d9db00708cda75273a1b520a4b02dd39e38c914d0b4d889c8be3ec6271449077b02a58c144e4652851f001f5d29a5e9b7da4dc03ce82acf1c821ae44bd2f6a3ad96fa42b240492eba0614b7a6a128c2299ec36edc509a11c56d1e061da2ae62c89e9b4066aa4c389e9f65b8bbfa68ef590aead0924bea8d2952bb410ae7388b2ff4cd3de0c0dba5acd94093aca786c514e495f065744ce20e131778d4328226c8b8e023e75922d3eda21267a6627cdf4032ccd96e38dbb12f01ef28874e98f4966e12365fe53201a008415c500e613fc0624a30fa5565483395a42800a3de8823c4f1302d913498897f7f35", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000380)="ceb230750ad618c56ffef3bad09e4f03760e0b89487eeb9e37940e60368ea5ca8deb05003a014d93491ed72cf4661774c0f16cab53dc5427eae64e292223de4c97784d921eafcdc6535f071fda6b167d7f7ae339f7980afa89ef1b768344f4") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:47 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x400454ca, 0x0) [ 1527.046911][ T26] audit: type=1804 audit(1637828988.232:914): pid=8033 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/746/file0/file0" dev="sda1" ino=14830 res=1 errno=0 08:29:48 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:48 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000640)=0xe8) mount$binder(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0x24b1002, &(0x7f00000007c0)={[{@stats}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@appraise}, {@pcr={'pcr', 0x3d, 0xb}}, {@obj_role={'obj_role', 0x3d, '#!:'}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:48 executing program 4: fcntl$getflags(0xffffffffffffffff, 0x408) unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = syz_open_pts(r0, 0x189001) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$AUTOFS_DEV_IOCTL_VERSION(r4, 0xc0189371, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB="0000006c653000d203fbb864607e8b9331e7b73df838e39c31de436a646b1a6f61229b1404f7c0df81728cff94376764c8c94ee9ec3b86960ea885d848b801ac3bc57ee70122d34c96d0ddca6320e093f886666bae8496e82a990f4173d41a3d6d5833769cbaec4d7374d2c00bc94f5e499201d2944668a49184af966f0836cba93feee3fcfe7e709cd803568b05385ccea777eecb8d476a16635ea4b82248885f7d93cff21cbf6a46e9cf639e4c7690aa943e4f71f20254dc08370e1e930b059b75908231163abd6eb55f3510e6eb515ccb90bf887706fc4f5b111fef8d0a6ce0"]) ioctl$TIOCMBIS(r5, 0x5416, &(0x7f00000002c0)=0x2) ioctl$KDSIGACCEPT(r3, 0x4b4e, 0x7) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) [ 1527.757750][ T26] audit: type=1804 audit(1637828988.932:915): pid=8096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/747/file0/file0" dev="sda1" ino=14829 res=1 errno=0 [ 1527.787877][ T7963] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:29:49 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continuuid>\x00\x00', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:49 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f0000000640)=0xe8) mount$binder(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0x24b1002, &(0x7f00000007c0)={[{@stats}], [{@fowner_eq={'fowner', 0x3d, r4}}, {@appraise}, {@pcr={'pcr', 0x3d, 0xb}}, {@obj_role={'obj_role', 0x3d, '#!:'}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1527.959433][ T26] audit: type=1804 audit(1637828988.942:916): pid=8096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/747/file0/file0" dev="sda1" ino=14829 res=1 errno=0 [ 1528.357371][ T26] audit: type=1804 audit(1637828989.542:917): pid=8189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/748/file0/file0" dev="sda1" ino=14823 res=1 errno=0 08:29:49 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000e40)={{0x3, 0x2}, 0x100, './file0/file0\x00'}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd97ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r4 = syz_mount_image$nilfs2(&(0x7f0000000140), &(0x7f00000005c0)='./file0/file0/../file0\x00', 0x6, 0x5, &(0x7f0000000b40)=[{&(0x7f00000006c0)="3f143a27fa5cb2757aedde437e887cca3101132f3d25135bfc481c4663d22d76b4ec93446476cdb36573b9a49c445f03a900612d0ad9a6a9cd04f173e73f714f02285dc4df3b480c54f4bb19c04b981f200b7e05115f6f089479d95b87d61c23a5d8646c854fe74e5cfd8c97f74171e45ea043afb82740fa7c90a2f4846e671f7018113dfd401fa55dd10b981762b4d59916cee3d6c4e0db7a41a0bb1d6b56f9b7c9b7793b7453993cdee058aa4568f42a9aa7cb190b80b2845fe0bfab04033455a78830466be24e27de18527b73d2fe6c8811f73034cef0dcf032b95f38492bc65dd5", 0xe3, 0x5}, {&(0x7f00000016c0)="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", 0x1000, 0x3}, {&(0x7f0000000a40)="baf46dd634328497e95ab0422d46b28110110dbd21bb908169443680909192f9005fc1449d765e84d902a4da2447369918182613b7d1cf9898067fd4d21b60d2c65635c763d1f2acb9be9a65b3450091ec88463e968db4b9fe7d83800144e6625206315b3aa92c36431fbf92fe9cff69321ca69df1c4274ec33fe35db216ec9584fe349075d5b5d3fbfcf9d346656d278b4033eb33117f064eb17eef088a657c392fa7c5ddffd0f451ad9321f01a07d82225eecdc6baed5e08f0be7e29a0ab3b5f0f9809213a6d100b709b8ac87f2fdf05361258cf7ddd6457adc088731d0e38541e8db8d191e823de6ae096f003ddc568a2548869f8", 0xf6, 0x2}, {&(0x7f00000007c0)="00919653faa1cfdbf37ad5f4804308814caf0371d442b3e95cf7b61cdcd0bb5e028330a8886ea1bf0402a9b8e2ca7ea5042c4c130780f3b720e031860ad771de0e663d5f67d9d1063e3a7481b23f2b7e1d697f80cffdafd6ef99da41d3a3706f22b622a8b8581106", 0x68, 0x7f}, {&(0x7f0000000640)="d409450c3e5065acd168", 0xa, 0x7fff}], 0x8400, &(0x7f0000000bc0)={[{}, {@order_relaxed}, {@nobarrier}, {@snapshot}, {@norecovery}, {@order_strict}, {@order_relaxed}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fowner_gt={'fowner>', 0xee00}}, {@fsname={'fsname', 0x3d, '\x00'}}, {@seclabel}, {@uid_lt={'uid<', 0xee00}}, {@audit}]}) pwritev(r4, &(0x7f0000000e00)=[{&(0x7f0000000cc0)="eca56f413bf0a036331523f86fcb907b3ae730d84649399c07abcd73c6dfacb90ef591b4d99f6b9b8097d9d2a7c9082a3daab46a2e77b6f1980799f1daf089f8d99b8f9d08a549fa4c381f24f037eb96374c8789ce3729983426fc41f6ac08cd78dbc28080acc3c1c015fb768e0ac77e16900ec89ff660c620ebdc7e7045d118179677b258144f162c0d331de39a6bda597f2131d116d1bc81132373eea531e25b868335f115d0b722a4c733b5757acd96634d710d53e2f64304d5680651dbc6c431ab6acbb6119e4a5f15ab7214308b875d4e374e94a2c9e693071b2d3d6796dcb588b757679e5df46fca", 0xeb}, {&(0x7f00000026c0)="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", 0x1000}, {&(0x7f00000009c0)="a65847256abcd45828b882de14fcf75fab9983cb195d338b58", 0x19}, {&(0x7f0000000dc0)="43d1d96660d7982c6a1dbf5100bf", 0xe}], 0x4, 0x7, 0x9) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1528.551512][ T26] audit: type=1804 audit(1637828989.552:918): pid=8189 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/748/file0/file0" dev="sda1" ino=14823 res=1 errno=0 08:29:50 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1528.855515][ T26] audit: type=1804 audit(1637828990.042:919): pid=8215 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/749/file0/file0" dev="sda1" ino=14782 res=1 errno=0 08:29:50 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1528.920295][ T26] audit: type=1804 audit(1637828990.092:920): pid=8215 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/749/file0/file0" dev="sda1" ino=14782 res=1 errno=0 08:29:50 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1529.426252][ T26] audit: type=1804 audit(1637828990.612:921): pid=8245 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/750/file0/file0" dev="sda1" ino=13969 res=1 errno=0 08:29:54 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = inotify_init1(0x0) write$binfmt_misc(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x60) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000140)=0x4000) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000280)=""/26) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:29:54 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004550a, 0x0) 08:29:54 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, &(0x7f0000000a40)=0x4e, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) signalfd4(r1, &(0x7f00000001c0)={[0x3f]}, 0x8, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r3, &(0x7f00000017c0)=@known='trusted.overlay.opaque\x00', 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000001540), 0x4) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x33, &(0x7f0000000200)=[{&(0x7f0000010000)="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"/320, 0x140, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a\x00'/32, 0x20, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e4000010000000000000004000000000000200000000000000000001000000000002000000000000000010000000100000001000000100000001000000000000000000100000000000c430e2c23c96488e96a0c3fc74794c0100"/126, 0x7e, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000c0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000b05000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000b05000000000000600000000000000000000010000000000d00000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000005050000000000004000000000000000010100000000000040000000000000000605000000000000400000000000000000050000000000004000000000000000070500000000000040000000000000000805000000000000400000000000000000000010000000000800000000000000100"/640, 0x280, 0x10b20}, {&(0x7f0000010700)="f4ac695800000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400001000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e0300000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e00005000"/224, 0xe0, 0x100000}, {&(0x7f0000010800)="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"/576, 0x240, 0x100ea0}, {&(0x7f0000010b00)="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"/512, 0x200, 0x101ea0}, {&(0x7f0000010d00)="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", 0x140, 0x102f40}, {&(0x7f0000010f00)="000000000000000000000000000000000300000000000000000100000000000000001000000000000000400000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e492a445300000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400401000000000000000000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e01000000000000000500000000000000", 0xa0, 0x103fc0}, {&(0x7f0000011000)="d49892a900000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400501000000000000000000000000001bd6f9831b2ab44c4", 0x48, 0x105000}, {&(0x7f0000011100)="89947bff00000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400601000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e020000000000000002000000000000000a000000000000100000000000c00000400000000000830f0000180000000040100000000000a900000000000000006b0f0000180000000040100000000000b005000000000000006b0f0000000000000050100000000000a90000000000000000530f0000180000000050100000000000b00700000000000000530f0000000000000060100000000000a90000000000000000320f0000210000000070100000000000a90000000000000000110f0000210000000080100000000000a90000000000000000f00e0000210000000000500000000000a90000000000000000cf0e0000210000000000500000000000c00000190000000000b70e0000180000000000500000000000c00000190000000000d80e0000180000000000500000000000c000001900000000000b0f0000180000000050100000000000b007000000000000000b0f0000000000000000500000000000c00000190000000000f30e000018", 0x1c0, 0x106000}, {&(0x7f0000011300)="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"/416, 0x1a0, 0x106f00}, {&(0x7f0000011500)="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"/288, 0x120, 0x107fa0}, {&(0x7f0000011700)="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", 0x100, 0x108f00}, {&(0x7f0000000b00)="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", 0x160, 0x500000}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400"/128, 0x80, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a050000000000000000000000000000010000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000040000000000", 0x60, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000", 0x40, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000b0500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600"/96, 0x60, 0x5008e0}, {&(0x7f0000011e00)="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"/320, 0x140, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d0500000000000000000000000000000300000000000000000000000000000000000000000000001000000000000000000000000000000000000000000010600000000000000ab5963cb4290491094d6f2025d34bbcc000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005bbc645f000000006e163b2b5abc645f00"/224, 0xe0, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed4100"/96, 0x60, 0x500c80}, {&(0x7f0000012200)="000000000000000000000000000000000000060000000000000000000000000000000000510000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600"/128, 0x80, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed4100", 0x40, 0x500e40}, {&(0x7f0000012400)="000000000000000000070000000000000000000000000000000010500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000700000000000000", 0x60, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="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", 0x380, 0x501e40}, {&(0x7f0000012b00)="0000000000000000000000000000000000000000000000010000000000000500000000000000010000000000000004000000000000000000010000000000000500000000000000010000000000000004000000000000000000010000000000000500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000004000000000000000200000000000000b00700000000000000010000000000000004000000000000000200000000000000b00400000000000000010000000000000005000000000000000200000000000000b00200000000000000010000000000000005000000000000000200000000000000b00100000000000000007000000000000000010000000000000500000000000000010000000000000004000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00300000000000000001000000000000000010000000000000200000000000000", 0x1a0, 0x502e60}, {&(0x7f0000012d00)="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"/576, 0x240, 0x506000}, {&(0x7f0000013000)="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"/1056, 0x420, 0x506ca0}, {&(0x7f0000013500)="000000000000000000000000000000000300000000000000000100000000000000006900000000000000190000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e0300000000000000000100000000000000005000000000000000190000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e0300000000000000000100000000000000001000000000000000400000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e6e257ceb00000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400805000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e04000000000000000700000000000000", 0x100, 0x507f60}, {&(0x7f0000013600)="7542746d00000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400905000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e0400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c00"/160, 0xa0, 0x509000}, {&(0x7f0000013700)="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", 0x140, 0x509f40}, {&(0x7f0000013900)="0000000000000000000000000000000000000000000000000500000000000000204e6f1700000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400b05000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c0000000000", 0xa0, 0x50afe0}, {&(0x7f0000013a00)="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", 0x1e0, 0x50bfe0}, {&(0x7f0000013c00)="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", 0x260, 0x50ce40}, {&(0x7f0000013f00)="f25fa2f800000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400e05000000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e0600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c0000000000000000880600007900"/543, 0x21f, 0x50e000}, {&(0x7f0000014200)="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", 0xa80, 0x50e6e0}, {&(0x7f0000014d00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400"/128, 0x80, 0x50f560}, {&(0x7f0000014f00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000", 0x40, 0x50f840}, {&(0x7f0000015000)="00000600000000000000000000000000000000b0500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600"/96, 0x60, 0x50f8e0}, {&(0x7f0000015100)="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"/320, 0x140, 0x50f9e0}, {&(0x7f0000015300)="000000000000000000000600000000000000000100000000000000d0500000000000000000000000000000300000000000000000000000000000000000000000000001000000000000000000000000000000000000000000010600000000000000ab5963cb4290491094d6f2025d34bbcc000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005bbc645f000000006e163b2b5abc645f00"/224, 0xe0, 0x50fb60}, {&(0x7f0000015400)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed4100"/96, 0x60, 0x50fc80}, {&(0x7f0000015500)="000000000000000000000000000000000000060000000000000000000000000000000000510000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600"/112, 0x70, 0x50fd20}, {&(0x7f0000015600)="0000000000000000000100000000000000000000000000000003000000000000", 0x20}, {&(0x7f0000015700)="0000000000000000000600000000000000000000000000000000c0500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600000000000000", 0x60, 0x50fee0}, {&(0x7f0000015800)="668240a300000000000000000000000000000000000000000000000000000000d681b030ddfd468cbf7e7a9b9838e38400005100000000000100000000000001bd6f9831b2ab44c49bdc9ef8a3a73c2e0600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e00003000"/221, 0xdd, 0x510000}, {&(0x7f0000015900)="00000000000000000300000000000000000100000000000000006900000000000000190000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e0300000000000000000100000000000000005000000000000000190000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e0300000000000000000100000000000000001000000000000000400000000000bd6f9831b2ab44c49bdc9ef8a3a73c2e0000000000000000", 0xa0, 0x510f40}, {&(0x7f0000015a00)="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"/791, 0x317, 0x690000}, {&(0x7f0000015e00)="000000000000000000000000000006000000000000006400000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572730600000000000000090066696c652e636f6c6406000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ff81000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4290400000000000000050066696c65320500000000000000050066696c653306000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ff81000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c42906000000000000000a00000000000000000000000073797a6b616c6c6572730000000000000000000000000000000000060000000000000006000b0008757365722e7861747472317861747472310000000000000000000000000000000000060000000000000006000b0008757365722e7861747472327861747472320300000000000000050066696c653106000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ff81000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4290600000000000000260000000000000000000000002f746d702f73797a2d696d61676567656e3239303134303634312f66696c65302f66696c65300300000000000000050066696c653106000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ffa1000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c42906000000000000001a04000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0200000000000000050066696c653006000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ff81000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c4295bbc645f0000000062c3c42903010000000000000100000000000000000600000000000000000005000766696c653102010000000000000100000000000000000600000000000000000005000166696c65300200000000000000050066696c653006000000000000000600000000000000000000000000000000000000000000000000000000000000010000000000000000000000ff41000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f0000000045ba87295bbc645f0000000045ba87295bbc645f0000000045ba87295bbc645f0000000045ba872904010000000000000100000000000000000600000000000000000005000166696c653105010000000000000100000000000000000600000000000000000005000166696c653205010000000000000100000000000000000600000000000000000005000166696c653306010000000000000100000000000000000600000000000000000009000166696c652e636f6c6401010000000000000100000000000000000600000000000000000005000266696c6530000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005abc645f00000000000000005abc645f00000000000000005abc645f00000000000000005abc645f000000", 0xb3b}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="ebf274dc3d7900"]) socket(0x10, 0x2, 0x0) 08:29:54 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:54 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) unshare(0xd00) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:29:54 executing program 4: unshare(0x48040200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1f) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x10000, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000440)={{0x0, 0x1, 0x3, 0x9, 0xf4800000000, 0x9d, 0xbea6, 0x5, 0x80000001, 0xffff7fff, 0x6, 0x3, 0x2, 0xffffffffffffffff, 0x96d}}) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r3, 0x4020744f, 0x0) 08:29:54 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect$inet(r5, &(0x7f0000000140)={0x2, 0x4e23, @remote}, 0x10) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:55 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:55 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) r6 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) fcntl$lock(r6, 0x24, &(0x7f0000000140)={0x2, 0x0, 0x3ff, 0x9}) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1534.256021][ T26] audit: type=1804 audit(1637828995.442:922): pid=8404 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/752/file0/file0" dev="sda1" ino=14065 res=1 errno=0 08:29:55 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EC,euid>\x00\x00', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000006c0)={0x0, 0x80, 0x5f, 0x2d, 0x0, 0xa5, 0x0, 0x3, 0x8, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x4120, 0x9, 0xc0, 0x5, 0x100000001, 0x441846c6, 0xe108, 0x0, 0x4, 0x0, 0x1f}, r5, 0xffffffffffffffff, r3, 0x9) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:55 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x80060800) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) unshare(0x20600) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x210000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x14) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:55 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1b) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x21, 0x7, 0x3, 0xffff, 0x18, "ca7f65deee39b2eb63b65a267c9f847fb913d6"}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:29:56 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000140)={0x8021}) [ 1535.205326][ T26] audit: type=1804 audit(1637828996.392:923): pid=8447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/753/file0/file0" dev="sda1" ino=14482 res=1 errno=0 [ 1535.303800][ T26] audit: type=1804 audit(1637828996.402:924): pid=8447 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/753/file0/file0" dev="sda1" ino=14482 res=1 errno=0 08:29:59 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047435, 0x0) 08:29:59 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="78001016008f0f36a650a088c4ebefacc03313b8bd74e6f9c8f0243f301c0500c12e9515c6198869b6e81d3eee18d8132a9bd1586cc340510d665ffc1c87c1d118fa0992770af892c708cd68220bc7b9592ee03fa44e11c1aea2ebf05500"/103, @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000140)={r2, 0x7, 0xa9db, 0x2}) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000900)={@x25, {&(0x7f00000016c0)=""/4096, 0x1000}, &(0x7f00000005c0), 0x1a}, 0xa0) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:59 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x1, 0x0, 0x5, 0x8]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB="6572726f72733d636f6eb18dad18dbddad75bfa3643e6a3056b87bc3400ad62532f1e9286cda0491f1b9ce6f936e99a71e3407a936c9a5cad8a8b21b4c17867b3dce15c383805ffb74aa7d582f3def1c7148a49b05d24230d4df2c", @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed22610000776c349e86a321fc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x38) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:29:59 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:29:59 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) 08:29:59 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) renameat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup\x00', 0xffffffffffffffff, &(0x7f0000000140)='./cgroup\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r2 = socket(0x10, 0x3, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0xff0f) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="6000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="0000ebffffffffff000000000a0001006e6574656d0000003000020000000000b00e00000000000009000000000000fc0000000014000600060000000000000000c89668908a46675300000000000000"], 0x60}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000340)={@loopback, 0x5, r4}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r5}, 0x78) r6 = memfd_secret(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="85a6fcff04000000188415ba647f280400cc55b61be03219e9000000000000000000000000000000faec6f205834a4122a90886463a62c18aa18882df8c638870b0917e6c28f2c23e14e96b71d62cd473e8358cff52e50839d0f9b93f34ac74c7f9b5ec894bee9fe4127b51d505900f4003c187a4a4b02e352b0599f41abf49106728c04681cf5ef656cd58fbb64bf53981947bc8af56b01f03ef2ce8e77feb7828e6144b81a1770a9a2a2f5924ceb917025ca08a3b4f1c6d91117a15a4e3fb7523a8c0c07a3553c50b5a85a3d7ff3da76ce926e5ecc2818d8dde943"], &(0x7f0000000140)='syzkaller\x00', 0x8000, 0x38, &(0x7f0000000280)=""/56, 0x40f00, 0x14, '\x00', r4, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x3, 0x1, 0x400}, 0x10, r5, r6}, 0x78) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r7, 0x4020744f, 0x0) [ 1538.850041][ T26] audit: type=1804 audit(1637829000.042:925): pid=8685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/754/file0/file0" dev="sda1" ino=14837 res=1 errno=0 08:30:00 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x400000001, 0x0, 0x0, 0x0, 0x7f, 0x20, @struct={0x8, 0x6}, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x2, 0x10000]}, {0x0, @usage=0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x451, @struct={0x9}, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @usage=0x7, 0x0, 0x4, 0xb516, 0x5, 0x0, 0x0, 0x42, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x3, 0xfffffffffffffffe, 0x8]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000008c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031302c687567653d616c776179732c01800000000000005f45ff45432cad7569643e7230c753e9fef9fa172c4c1b24216f522b02873e9b1db8c717ed5827b2aa282800e40aa87e4edf47e5681738be3053d91918237901b524fc33d9", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8992532fe2c263a02a8987ad3d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x1c}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB="657272aef5c355c259fdbe6f72733d63796ef2ff6e756532081c033ed6cea08373f4848bd30929450a6ff12a56afb599b066803cdca06f7de9d29d5600415881621619478a0b388ebf32a7959e207334aec0aa24c30d1f42ef4daf6b1ec5745b5769be555e0ac400"/113, @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f00000016c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x3, 0x2, 0x1f, 0xe7, 0x0, 0x1f, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x5, 0x4007fffffff}, 0x3020, 0x6255, 0x6f, 0x0, 0x1, 0x8, 0x2, 0x0, 0x4, 0x0, 0x8}, r5, 0x6, 0xffffffffffffffff, 0xa) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) [ 1538.982915][ T26] audit: type=1804 audit(1637829000.042:926): pid=8689 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/754/file0/file0" dev="sda1" ino=14837 res=1 errno=0 08:30:00 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="78001016008f0f36a650a088c4ebefacc03313b8bd74e6f9c8f0243f301c0500c12e9515c6198869b6e81d3eee18d8132a9bd1586cc340510d665ffc1c87c1d118fa0992770af892c708cd68220bc7b9592ee03fa44e11c1aea2ebf05500"/103, @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000140)={r2, 0x7, 0xa9db, 0x2}) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000900)={@x25, {&(0x7f00000016c0)=""/4096, 0x1000}, &(0x7f00000005c0), 0x1a}, 0xa0) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:00 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8082, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) 08:30:00 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x20200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1539.700354][ T26] audit: type=1804 audit(1637829000.892:927): pid=8799 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/755/file0/file0" dev="sda1" ino=14130 res=1 errno=0 08:30:01 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000b40)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}, {&(0x7f0000000140)="48974b194364122cfb01b7eb514d1b07fae017e159ac6109f1505f70e402966b3602c189", 0x24, 0xff}, {&(0x7f00000006c0)="ed931351af56f76028ed99b1aedfed3a38b5257c0621512f96dd5a23dac3e410c040a7b4dfd9c528b84fe7db4be9ef05ebc8bb0d9eb2b4873f3ef482e49b2647c92ecf6192b1661aa24677", 0x4b, 0x6}, {&(0x7f00000005c0)="e5145d9141b0a5480f832a148c011ee438cae4691f61d911ad87c5edfe7a6acb09a593f21b66131a17c19294550f9d8eb42e147084069d05f9325c", 0x3b, 0x2}, {&(0x7f0000000740)="f3470a734f9821ac667d8e98110506cfb231b401f096949535b691308f80ddb3a07f58588df05a3194f66051f2d517a6df6e080e92269dbf7971d433aa4a770990606acbc826f25b5e1f427914553117c700180ddffcf4e9a8e191e0c95bc2073d33ee78c8d3ec966d30aeddb87d26734defe745b9600f20dbc380289968f082cb6365cae473afe961c69e3d", 0x8c, 0x9}, {&(0x7f0000000a40)="d10d85b5398ec88ed858926d45b5bba6847c3ae60200fac47a6d0874da19c45d6c454ec45b19460aa692970b22e4ec036f74e27007af4c322994bc2368ab8dae2194342db53b0a3fc69fda39544d7993780e1d8e1ba6af06903d89b71404df139ebe05e557432e781111e0829ff9f9ab2fd0686a94d88c9f75a1342d8e906ea7faccf25b234291cdd24d68f4ec623282132b39d36ec7508389300ccec55f16681cc099e93e2023561265b16c9d5847b60dc66d01f9a0994efc76fdaeffe05d1a64cc0257c02a4c0d8372c4c4737e198590dd00d653121b1bb3b2b825432353fa3c70d591defef73534", 0xe9, 0x3}, {&(0x7f0000000640)="0e7fbb09a89aae475d8f3ad1ef57c435f3a0c38c2058e4de8f11ad4c", 0x1c, 0x7ff}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:01 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x400000001, 0x0, 0x0, 0x0, 0x7f, 0x20, @struct={0x8, 0x6}, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x2, 0x10000]}, {0x0, @usage=0x1ff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x451, @struct={0x9}, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @usage=0x7, 0x0, 0x4, 0xb516, 0x5, 0x0, 0x0, 0x42, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x3, 0xfffffffffffffffe, 0x8]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000008c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031302c687567653d616c776179732c01800000000000005f45ff45432cad7569643e7230c753e9fef9fa172c4c1b24216f522b02873e9b1db8c717ed5827b2aa282800e40aa87e4edf47e5681738be3053d91918237901b524fc33d9", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8992532fe2c263a02a8987ad3d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x1c}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB="657272aef5c355c259fdbe6f72733d63796ef2ff6e756532081c033ed6cea08373f4848bd30929450a6ff12a56afb599b066803cdca06f7de9d29d5600415881621619478a0b388ebf32a7959e207334aec0aa24c30d1f42ef4daf6b1ec5745b5769be555e0ac400"/113, @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f00000016c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000840)={0x2, 0x80, 0x3, 0x2, 0x1f, 0xe7, 0x0, 0x1f, 0x800, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x5, 0x4007fffffff}, 0x3020, 0x6255, 0x6f, 0x0, 0x1, 0x8, 0x2, 0x0, 0x4, 0x0, 0x8}, r5, 0x6, 0xffffffffffffffff, 0xa) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) [ 1540.291467][ T26] audit: type=1804 audit(1637829001.482:928): pid=8899 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/756/file0/file0" dev="sda1" ino=14837 res=1 errno=0 08:30:05 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743a, 0x0) 08:30:05 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x195) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:05 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="4b50bbcfa3b36819", @ANYRESHEX=r3]) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f00000016c0)={0x2020}, 0x2020) 08:30:05 executing program 2: unshare(0x48040200) unshare(0x600) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, &(0x7f00000003c0)) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000080)) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r4, 0xc0189375, &(0x7f0000000440)=ANY=[@ANYBLOB="000000000000100000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYBLOB="a14a4cf3465516cdbae1b6c885e88e751a87119b04bffb392eed6cb01530b96f7cf7d2c84fdf7e0be9f527f92c803c8aa44b73e4fb98ac079c986bcd67a5ca3b77b63e346817b531306bbe8f1207556eb12039d8308a0dd7eca1364dee03daf0b5b90b32bbbce89cb36d88040de35237fce3400dd0aba50e804c5a86f63d743d45400761a7dcdfb87b4f3e21cdfdbb1beb1f0d091b6eb19cf1a1b1e2ebbecf49ffcfe1920de831fba614ef11414b228cbecbd9b37cb3fcf433a9457a311d08af6bf1b6c34d", @ANYRESHEX=r1], 0x2c}, 0x1, 0x0, 0x0, 0x84}, 0x1) 08:30:05 executing program 0: unshare(0x48040200) mmap(&(0x7f000026e000/0x1000)=nil, 0x1000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000140)={0xbfe, 0x0, 0x0, 0x0, 0x5, "80679d5dfef5055b85a178d65c8ef263e0d25e", 0xffffffff, 0x7}) 08:30:05 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x2, 0xa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1544.543272][ T26] audit: type=1804 audit(1637829005.732:929): pid=9114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/757/file0/file0" dev="sda1" ino=14852 res=1 errno=0 08:30:05 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:30:05 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1545.209372][ T26] audit: type=1804 audit(1637829006.402:930): pid=9178 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/758/file0/file0" dev="sda1" ino=14863 res=1 errno=0 [ 1545.269141][ T1223] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.275676][ T1223] ieee802154 phy1 wpan1: encryption failed: -22 08:30:06 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="2c756964ef9b4edbcba3f6963c934e2a4419866bc4a66387db5aee3f264246bc537345cb037aca8731e7f0625cbfb9a453f86d0ae3c667d58308ff961835f74c4b595809681fe779921113be", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1545.375546][ T26] audit: type=1804 audit(1637829006.432:931): pid=9212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/758/file0/file0" dev="sda1" ino=14863 res=1 errno=0 08:30:06 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:06 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f00000000c0), &(0x7f0000000140)=@sha1={0x1, "bcc5e3e25cc829b6f7f352e76ff5b67f71281566"}, 0x15, 0x2) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="77643d8c0ff1c707ef5e0f5a1546576ee0b2415e32b687c867a79dea4d", @ANYRESHEX=r2]) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000080)=0x8000000) [ 1545.739823][ T26] audit: type=1804 audit(1637829006.922:932): pid=9246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/759/file0/file0" dev="sda1" ino=14863 res=1 errno=0 08:30:07 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct={0x9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x5, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40, 0x1}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000140)='./file0/file0\x00', 0x200000, 0x40) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) rename(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00') 08:30:07 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1546.409978][ T26] audit: type=1804 audit(1637829007.602:933): pid=9301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/760/file0/file0" dev="sda1" ino=14863 res=1 errno=0 08:30:07 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [], {}, [{0x8, 0x3, r3}]}, 0x2c, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000005c0)='./file0\x00', 0x17, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="e7fd2a2ffda0e4e4a472931dd35885e76f59203841d50f983bda051292cac2740b3de5983b315ee709544ae7d4b2aeb06bfb4c9e8e99afafe191cb1d9244d61c342bddf0e705c30e98d693abe9d1b28cd385b8bf92448cc00ac13ec5222dddcbf1ad62cf390fb6bc8f21e0cc651c60dd186edae7a737fc1b472fda5625aea3085da15e4bf98acb7d3504c6698d2b96dc336af8158348ca974662cd1bf3926a04f770df44d53601104c4c9c05b5faa2351ef794f04f7d09b6ffceab88a29635a23478", 0xc2, 0x1}, {&(0x7f0000000640)="251c06e415bf29412414f721c740d77542420bdef0cd4de6ea699d2aeb500fb547d96461ba3d336240298ea85812f2c62562748a835794b6e626522d6e158045", 0x40, 0x6}, {&(0x7f0000000a40)="6fd757800ef55ad0eacb345a84766a293cbc59da4057f9e693ea410ec97cd03652f42a72fe9bbbbb3417a446947455aaddc33e9f50fd49e1d7a45558bda98b111e8651fdf7609b9d99b6e5537059e6b148de24285558eb7a774e64d01531469b797eaacbc99ffa73c4a7974f17b6d73080cbd7f49cb0dfc5a789782dbc39d666177dc11ce6aab9b12017b1c8b35766ddfa3174705748c57086e1b0a9e7968901408bbf0a88efbd6cd4f2af23e110e8e15b613e5044c3c2d5253b7eaf036c1d668925da19daae6659cc", 0xc9, 0xffffffffffff887a}], 0x2081010, &(0x7f0000000b40)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x39, 0x70]}}, {@gid={'gid', 0x3d, r3}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30, 0x33, 0x3a]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x4c, 0x2d, 0x25, 0x78, 0x25, 0x35, 0x74]}}, {@huge_never}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x65, 0x35, 0x25, 0x31, 0x37, 0x67, 0x70, 0xce8e45e0bb8dda4c, 0x33]}}], [{@obj_type={'obj_type', 0x3d, '/proc/keys\x00'}}]}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1546.545162][ T26] audit: type=1804 audit(1637829007.622:934): pid=9301 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/760/file0/file0" dev="sda1" ino=14863 res=1 errno=0 08:30:08 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1547.038598][ T26] audit: type=1804 audit(1637829008.232:935): pid=9347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/761/file0/file0" dev="sda1" ino=14148 res=1 errno=0 08:30:08 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x220c00, 0x100) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1547.226813][ T26] audit: type=1804 audit(1637829008.232:936): pid=9347 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/761/file0/file0" dev="sda1" ino=14148 res=1 errno=0 [ 1547.646077][ T26] audit: type=1804 audit(1637829008.832:937): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/762/file0/file0" dev="sda1" ino=14274 res=1 errno=0 [ 1547.774797][ T26] audit: type=1804 audit(1637829008.832:938): pid=9377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/762/file0/file0" dev="sda1" ino=14274 res=1 errno=0 08:30:10 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x800, 0x80102) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r3 = fsmount(r2, 0x1, 0x70) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000300)) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000280)=0x800) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000002c0)=0x6) 08:30:10 executing program 3: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r3) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:10 executing program 2: unshare(0x4c040200) unshare(0x4010a80) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x12, 0xffffffffffffffff, 0x1000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x16) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000280)=0xfffffffa) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000140)) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:30:10 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=a|ways,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="bc3968ea773c204a65", @ANYRESOCT=r1]) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), 0xa00013, &(0x7f00000006c0)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f66696c65302f66696c65302c75707065726469723d2e1c66696c65302f66696c65302c6673757569643d31383332303737612d313339372d386339662d366666322d34376503666433302c6d6561737572652c646f6e745f61707072616973652c00"]) r2 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1d, 0x10, r2, 0x1a4aa000) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:10 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047452, 0x0) 08:30:10 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x180) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1549.918397][ T9411] overlayfs: unrecognized mount option "fsuuid=1832077a-1397-8c9f-6ff2-47efd30" or missing value 08:30:11 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) [ 1550.065798][ T9506] overlayfs: unrecognized mount option "fsuuid=1832077a-1397-8c9f-6ff2-47efd30" or missing value [ 1550.131334][ T26] audit: type=1804 audit(1637829011.322:939): pid=9518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/763/file0/file0" dev="sda1" ino=14892 res=1 errno=0 08:30:11 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0xa) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1550.802577][ T26] audit: type=1804 audit(1637829011.992:940): pid=9577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/764/file0/file0" dev="sda1" ino=14890 res=1 errno=0 08:30:12 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @usage=0x2, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="636df836add6020000000000000000007065", @ANYRESOCT=r2]) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r5 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r4) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0, 0x13}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYRES32=r1, @ANYRESHEX, @ANYBLOB="cc476e61c146cd2274769d932ea14fb012d5850a97eaedc59376b189a1ade724037687778675009aca775d90f42a438155ca07ff01000014643e9fcf57caeb682922764c3a80f8414e42ec3daaffb4b279366408d398af99247e1c7fdcb858e772c5bdefc620ad8198cb3ecc6e3b56950ba8991736d9923067b4a66ef917e427965d7f6cd89bd80d8321106f2448783f5f65cfa35dabe3a731eee1f2b583f9a2646c55c7b226e021401a9e0fe7cf6f4cc065332f243d24f82c65da8fb308ed70eaa9fe4bc197c3e31b6d9cf57ec8286ddbe5a7560e430348058c70ab979da78c", @ANYRESHEX=r5, @ANYBLOB="1f00000053d5a2010001000060f1f35f9e22dfd6890576affaea2876c84d629f9dad7a8afcdff11ec01527a2074a2db007c4182bee66f322a3ab819621ed0961c9ba776c349e86a31ffc3b426b8f28e305eb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x2a001, 0x0) ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) read$FUSE(r6, &(0x7f0000004600)={0x2020}, 0x2020) [ 1550.897844][ T26] audit: type=1804 audit(1637829012.022:941): pid=9614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/764/file0/file0" dev="sda1" ino=14890 res=1 errno=0 [ 1551.369216][ T26] audit: type=1804 audit(1637829012.562:942): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/765/file0/file0" dev="sda1" ino=14890 res=1 errno=0 08:30:12 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="04c24a0042c0df557013abbac167499c79c360fb284ba2d50a1be97741eac7d33f88c6129f496e1164e373afc82740cd08956870bdea4025ee447f05026c3ad37d1664ce3d658296f3702ea357", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:12 executing program 0: unshare(0x48040200) unshare(0x40000000) unshare(0x20000) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x80000) unshare(0x42008600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000016c0), 0x2aa01, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="266bb0c322e48d9cf757101025b8aac9ef16dc7398aef8723e5f101182891f48c48df11dc5cbe0ea88720b9b98d5bdf6c679c35788b48147193254ba57ea67a679bdf6403455399b0a2050d61ae5ecb23e9feacf1d6bdfebf44fb8fb5df93b347beda065a5c074a1a24f8b28942ae58827a3342a655768d8a7acd077035e1e9613b17b1b00a55a43372a2c62cba0d4e1df3df28a47cbfc", @ANYRESHEX=r3]) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001880)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0xf, 0x0, &(0x7f0000001700), &(0x7f0000001500)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1, '\x00', r4, 0xe, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001900)={0x3, 0xe, 0xd4, 0x13}, 0x10}, 0x78) r5 = syz_mount_image$nilfs2(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x8, 0x5, &(0x7f0000001480)=[{&(0x7f00000002c0)="2040ae1b97a537cffbc9747d606c8c88eda0ae4a61978ed73dddc4e48fe7bde81ba5d8f29e93b7f1c25a403d3af4d1268120c73da38edf8e440aaf02097ad3a676ff6434d24c44c9b3a6686e2117ee5f90e46ada56f2da05592048a6df820f58e21d2a551ac29b7da283e7dd074b86f3f0c778f8c1cdf2ef5816336952902dc0ea78d383f35b19b78169226740663082a5ede0a133f6c8485c73b83ed35b5ee2d677fdc01f0c750d3ecdb7439d1c4eed2d5a13d6bf5d71902ad4f6fd7e3bb7a52107f731caefa25d5833f8df69ede702022ff9039909d97828e37cfa829462edcc3948f984bef4cccb68edcaf119c826", 0xf0, 0x100000000}, {&(0x7f00000003c0)="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", 0x1000, 0x2}, {&(0x7f00000013c0)="798d7e751f3d60423bca21696edda695e5427375c68a0476565eb670d3084d6a85abb05c8925857ecacbdb94105c03039e5fe12fc9882fd305bbae4bf27da4ec4dcd1787bc3c24a1c63ea98ad4d3a278dabb7070fe70e41f203229826fae6296c50912e883c8406fdf515d414004", 0x6e, 0x401}, {&(0x7f0000001440)="47b7", 0x2, 0xe5}, {&(0x7f0000001580)="d672f65675cf01438cb390ea90033ce71f498420797d5fa9627b7854389c456f45e0f2735fc17d2ba1f58b0bb9e4499ab314fd4f95bf3bc48d89fe13cf42c1915688ad3ae7884d8edf8eaf3de5bc570a60b0b925ed2e46041bcac27d6254aa998aadc8ba9413d0fdd2cc0e63248ddc6368d78900c8fd0beff7fa9545a6190ba5bc3cfecb45be5a7559d067bdbdeb0a66982ae0db92bfec99cfb9b076cec64a9a93efbcc285705c69efb302dbe3e4f9d43460687272bf1f8630f9ddeb67266f57ffdf0bc6ea68eba364d571c50d3285f53758", 0xd2, 0xcbb}], 0x10001, &(0x7f00000017c0)=ANY=[@ANYBLOB='norecovery,discard,order=relaxed,fowner=', @ANYRESDEC=0xee00, @ANYBLOB="2c00e44ede14c3efffe7ce7d50686de760ef1a279dc5430c9b2101ed69207dbada969f2d40f1d28909299a1942e31780000000604fcab819070c5cf6a4886a0e452a9613a1b4dc06ff3827c2ff6e8ba398d856c22a67f40d749e172622529a95ae8568b6"]) ioctl$FS_IOC_FSGETXATTR(r5, 0x801c581f, &(0x7f0000001680)={0x101, 0x1, 0x8, 0x4, 0x1e}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r1) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) [ 1551.508907][ T26] audit: type=1804 audit(1637829012.592:943): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/765/file0/file0" dev="sda1" ino=14890 res=1 errno=0 [ 1551.806921][ T9680] loop0: detected capacity change from 0 to 264192 08:30:13 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) [ 1551.905060][ T26] audit: type=1804 audit(1637829013.092:944): pid=9675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/766/file0/file0" dev="sda1" ino=14893 res=1 errno=0 [ 1551.960648][ T9680] NILFS (loop0): couldn't find nilfs on the device 08:30:13 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x50010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x1, 0x2010000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x41, 0x0, 0x3, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) r2 = open_tree(r1, &(0x7f0000000140)='./file0\x00', 0x9000) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf, 0x31ad}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f0000000640), &(0x7f00000000c0)='./file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x100080, &(0x7f0000000740)=ANY=[]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f00000005c0)="e08b94076e8f32fcd95468bf0d42a81c9658c554765933cb051cd1848767b57f2f", 0x21, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=r2, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1551.997740][ T26] audit: type=1804 audit(1637829013.122:945): pid=9710 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/766/file0/file0" dev="sda1" ino=14893 res=1 errno=0 [ 1552.182268][ T9744] loop0: detected capacity change from 0 to 264192 [ 1552.235735][ T9744] NILFS (loop0): couldn't find nilfs on the device 08:30:13 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:30:16 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9f2799f2a2ffad65, 0x20000000000002ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) io_uring_setup(0x4e90, &(0x7f0000000080)={0x0, 0xed07, 0x0, 0x2, 0xeb}) 08:30:16 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047457, 0x0) 08:30:16 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:16 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) r3 = signalfd4(r1, &(0x7f0000000080)={[0x3]}, 0x8, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x18) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) unshare(0x80) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:30:16 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001640)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @struct={0x1, 0x36bae4f1}, 0x0, 0x0, [0x0, 0x3, 0x5, 0x0, 0x0, 0x10000]}, {0x0, @usage=0xfffffffffffffff8, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @usage, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x1000, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe, 0x80000000]}, {0x10000}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r3]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1555.897657][ T26] audit: type=1804 audit(1637829017.082:946): pid=9959 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/768/file0/file0" dev="sda1" ino=14910 res=1 errno=0 08:30:17 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1556.085424][ T26] audit: type=1804 audit(1637829017.122:947): pid=9942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/768/file0/file0" dev="sda1" ino=14910 res=1 errno=0 [ 1556.593582][ T26] audit: type=1804 audit(1637829017.782:948): pid=10006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/769/file0/file0" dev="sda1" ino=14910 res=1 errno=0 08:30:18 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_io_uring_setup(0x184, &(0x7f0000000080), &(0x7f0000147000/0x2000)=nil, &(0x7f0000149000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_ACCEPT={0xd, 0x6, 0x0, r6, &(0x7f0000000000)=0x80, &(0x7f0000001040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, 0x80800, 0x0, {0x0, r7}}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1800) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x2, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031300761ec9a653d616c776179732c6d61736b3d4d41595f455845432c657579643e2709ebdf1ada2ca0887585870fdae5438084d299912843dc811569da41f575d30a3045b7fb6f18fdafc4fbe515617590ee2e8ba70f700235fba3eb5289f37420b9de636320d3f42268341c9f5bf53056", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r8]) [ 1556.787375][ T26] audit: type=1804 audit(1637829017.812:949): pid=10006 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/769/file0/file0" dev="sda1" ino=14910 res=1 errno=0 08:30:18 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:18 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000140)) 08:30:18 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) open(&(0x7f0000000140)='./file0/file0\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f00000006c0)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESDEC, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:19 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000b, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x20000800) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6664ff", @ANYRES16]) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x9) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) [ 1557.925047][ T26] audit: type=1804 audit(1637829019.112:950): pid=10098 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/771/file0/file0" dev="sda1" ino=14912 res=1 errno=0 08:30:19 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='ext3\x00', 0x2a08000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) [ 1558.067405][ T26] audit: type=1804 audit(1637829019.162:951): pid=10097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/771/file0/file0" dev="sda1" ino=14912 res=1 errno=0 [ 1558.273143][ T26] audit: type=1804 audit(1637829019.162:952): pid=10097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/771/file0/file0" dev="sda1" ino=14912 res=1 errno=0 08:30:19 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) [ 1558.581973][ T26] audit: type=1804 audit(1637829019.772:953): pid=10153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/772/file0/file0" dev="sda1" ino=14912 res=1 errno=0 [ 1558.649662][ T26] audit: type=1804 audit(1637829019.812:954): pid=10139 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/772/file0/file0" dev="sda1" ino=14912 res=1 errno=0 08:30:22 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40049409, 0x0) 08:30:22 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000640)) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x2a5bae66, 0x7c, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x6}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x1}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat2(r3, &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000005c0)={0x0, 0x80, 0x13}, 0x18) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:22 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:22 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x3000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xfd) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="66da220047599c2082ced810a78b40b0a200000000000000017234c2d846a20000000000000000cfa7ab8c50ac165b600be6291d48e1bb2c89c9d7e02bdfb7d864a9bd4d70ae22154ac406d88f1c08823e23c0167bdb5279a51d507615b4e4bd0575cdc3a409cb75514796da56dea8b37afc4be3fdc80699a37795857855f6097ad4741c2469e6c129f103d17f0be2e2c473ffd5b8bb03564fe0ffedf3e6c4cbcc5319a5f7e5c98bc04cc42c03e77e9c1bafeeeee3078cbaaf", @ANYRESHEX=r1]) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000400)=""/4096) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x80000e) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) unshare(0xa0000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x4) 08:30:22 executing program 4: sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x70, 0x0, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x70}, 0x1, 0x0, 0x0, 0x8020}, 0x800) unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(0xffffffffffffffff, 0xc0286687, &(0x7f0000000140)={0x3, 0x1, 0x95, &(0x7f0000000280)=""/149}) unshare(0x70000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x8000000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@loopback, @private, 0x0}, &(0x7f00000000c0)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1f, '\x00', r1, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) [ 1561.946543][ T26] audit: type=1804 audit(1637829023.132:955): pid=10249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/773/file0/file0" dev="sda1" ino=14291 res=1 errno=0 08:30:23 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) unshare(0x4e010880) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:23 executing program 4: unshare(0x7c010a80) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0xe1000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1562.503882][ T26] audit: type=1804 audit(1637829023.692:956): pid=10354 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/774/file0/file0" dev="sda1" ino=13970 res=1 errno=0 08:30:25 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 08:30:25 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x4, 0x7b78, 0x800, 0x63, 0xd, "23c21841db0e08edefa2a5c1a5a9a9bdfd6242"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:30:25 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:30:25 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40085503, 0x0) 08:30:25 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000001480)={0x0, 0xb59, 0x5}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x20480) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001580)=0x5) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f00000014c0)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000001500)={{r3, r4+60000000}, {0x0, 0x3938700}}, &(0x7f0000001540)) r5 = syz_mount_image$gfs2(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x3, &(0x7f0000001400)=[{&(0x7f0000000280)="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", 0x1000, 0x2ca}, {&(0x7f0000001280)="12e0cf0020ff8c94466277c098e8eaf57b355c352fae2f0679aa05707a1fcbce38e89063a311a87f6bc5f1774f927a3012d4658ae830e1759d48816fd19cecc5bcf2f5f66eae993ed3acfd84410dfcaa7433bd3b6017df32589eb8abc14e594442450d4dd1d579188faac4c79cf80ce563e1fc73c6d42b888983a8efcc064e0d1b974166f9c915ae9a4dd739cd3d93d12c146ed80f0061acc99deb4060e6566a0f4cfa157d5562c6", 0xa8, 0x6}, {&(0x7f0000001340)="2fd9b622c525f45cf155c13846f8b8aafc9c1c371956d240171108e4d3061a97aa74be6f20ac8feb2d7e8cbc5dbbffee7b2112a716dc761c054d6dd50c748f4af071d5498dc8b7027ec688ca60611fb56fb83f7dc16d1f7837b9ed74a52eabaa3131d9c89ab335d706ebd31f57d764b1933499046375a6a81b01aa43992471c380cf351e6276a54ae7c777dedbf62c114db69342d0f3bf491e2451fc9f00504847b05acf409fbf5129ecb547bf92f5208d6b26dd6c0b431eaed0", 0xba, 0x4}], 0x800008, &(0x7f0000000140)={[{@nobarrier}], [{@subj_type={'subj_type', 0x3d, '&)'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x66, 0x65, 0x36, 0x37, 0x36, 0x33, 0x37], 0x2d, [0x34, 0x31, 0x32, 0x62], 0x2d, [0x36, 0x65, 0x30, 0x36], 0x2d, [0x62, 0x36, 0x39, 0x37], 0x2d, [0x64, 0x34, 0x34, 0x39, 0x39, 0x65, 0x64, 0x62]}}}]}) preadv(r5, &(0x7f0000001540), 0x0, 0x0, 0x0) [ 1564.246484][ T26] audit: type=1804 audit(1637829025.432:957): pid=10428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/775/file0/file0" dev="sda1" ino=14673 res=1 errno=0 08:30:25 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r3, 0xc058671e, &(0x7f00000006c0)={{}, {0x4}, 0x4, 0x0, 0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000a40)="bf0d3ce854228fdfc857bb25b8d293ef2ba51a54df387b7023394507a4589657efabb362dece1ca3e5aaea3a99fc46aaeb73bcb97d78371579d9efd1b8b3dff49240bae549d2f0fa5334deca4c9d162a264b373a6fe3c0c62aa8b4b4e19720555554d7b893a0b3a979392e53baf86ec0c1702faba0b41a7017b0211484f2c153d0cd641c118f4d8eedd7d4fa390038034caeed36e0f9aa6b07cc76b830c3150832738d2ad20c2a9ed4fd527b610f46db8a05885961b9d3496be5d919087151e2b22f1b9fef6208209cc9a95a7eb7ec707c11f7bf80cd90c65f8e9f10c2f1635bd8162a3a6506a0c6f49d7af73e917bca8669e418809393f173308310cdcdfacb4450a9fa0492515d88c7ad7c5d578cdf6d8f9beb53fd8ded4811f7c698d670c760fb3759eb0471c0104fa4e3f0858eb2db6e88d3cab4bb3f33354e42853476edf5e59f102a683226545e4826a092612c11fe59462ae909bf3ef09227b41fec57f88f007a3533c9cbd6780cec2b323416225c5b3d40135f7ed288dc03f90720fd351a64e0d446ec3ba098f35d3f97d1f2d2c58dd580a0", 0x196, 0x0, &(0x7f0000000c00)={0x2, 0xf9, {0x0, 0xc, 0x0, "", 0xec, "ffd5fa43d102dfc80469c784e596382af6e4a5185cb0776e44481efccab548663bf2e8a53640ad26eca97accc1dc7a1a9a414c1209a584f585e46819276e4327caafd2c91cb7e660642425abc7a5bd2eafdf170a1c89d73615a3e9777a6333d800ce0c300bc38622f7b5235eb36c3aac1fb69e8810920b316b42e6604f075942afa8a069590b18271fea6d826037808ecd1337fe1e25bcd6a707eceedb698ab5c539cf3433e9fc0c244bd58154fe7cace35a75ae8e2325c2dcacb62e93e63d99213a4ee7ae69b9c9d217f9164bfa480f17fd13e4dfb3b1a4ec051c7fb145c18924c1d5be390c5cb64528bdc3"}, 0xff, "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"}, 0x204}) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1564.433788][ T26] audit: type=1804 audit(1637829025.462:958): pid=10494 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/775/file0/file0" dev="sda1" ino=14673 res=1 errno=0 [ 1564.789556][ T26] audit: type=1804 audit(1637829025.982:959): pid=10543 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/776/file0/file0" dev="sda1" ino=14673 res=1 errno=0 08:30:26 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0xffffffffffffffff, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebc0027df57b3f1", 0x38, 0x2}, {&(0x7f0000000140)="0b4cc265d0d1ff42d394cd3f969aff", 0xf}], 0x940001, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1565.201594][T10475] mkiss: ax0: crc mode is auto. [ 1565.443101][ T26] audit: type=1804 audit(1637829026.622:960): pid=10568 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/777/file0/file0" dev="sda1" ino=14673 res=1 errno=0 08:30:26 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:30:28 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40085507, 0x0) 08:30:28 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000600) unshare(0x10000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000640)={'U+', 0x3}, 0x16, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB='pe\x00'/18, @ANYRESOCT=r1]) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:28 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:30:28 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x14000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001280)={&(0x7f000086d000/0x4000)=nil, &(0x7f000070f000/0x2000)=nil, &(0x7f0000419000/0xb000)=nil, &(0x7f00005bb000/0x2000)=nil, &(0x7f0000559000/0x3000)=nil, &(0x7f0000616000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00006e8000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280)="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", 0x1000, r2}, 0x68) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001340)={&(0x7f0000001580)={0x244, r3, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x2c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0xe}, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2f}}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x44, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xa3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x130, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xa396, @private0, 0xffff7fff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7e3c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x400}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @local, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4c}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @private=0xa010100}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x4004}, 0x20000840) 08:30:28 executing program 2: unshare(0x48040200) pipe(&(0x7f0000000100)) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000006c0)={0xc, 0x10001, 0x1f, 0x84000, 0xffffffffffffffff}) mmap(&(0x7f0000211000/0x3000)=nil, 0x3000, 0x3000005, 0x10, r0, 0x69697000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) r3 = syz_mount_image$bfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)='\x00\x00', 0x2, 0x2}, {&(0x7f0000000380)="381ff212efc9bc37bb55effea2a747861b98292ee52089623b4c9516dd5a99819c1a1185bb1d4113", 0x28, 0x9e}, {&(0x7f00000003c0)="6ce029a77eec02fa43db43023a2c9f9bde1c9963e97cf6278889412565efab604724a5d7c7899d9acb0389c66788b59d4551d998f8af54947f25a95c417f3380cec222becc17573201f718579de139209f0504d4c316d5d7985612735421c6a891fa7d809ecfbc325547e0f7479d35db1b584bc320ecc4ad5cd35c114713f5347320dc87377ebb59f47b91130409ecf6aaea0533bd20f607ea1774d7449df9837560f6458a8b5bcd29abf83531c088b7f3336468062f0bde2080c5fd1534", 0xbe, 0x5}], 0x21001, &(0x7f0000000700)=ANY=[@ANYBLOB="2f6465762f607070002c2f87f62b40032e2f5e2c5d2c38242c2f6465762f707070002c2a2c2f6465762f70746d78002c407d00002e5c2c61707072616973652c736d61636b66736861743d002c7065726d69745f646972656374696f2c736d61636b6673666c6f6f72142e2c40396e616d653d2f6465762f707070002c7063723d30303030303030313030303030303030303033332c658375696497d60094449bb2b5c3591094705345b1642cda1a1fb5dc8d233c137e932293e150e7229ec24469539d8142af87355e7364762ea29b9679d77e1ec94b81da5b92b013446e5958970296d91bad5897b1345e3d39dbcdd48731236bd1c1a7259b03dbc850897000", @ANYRESDEC=0xee00, @ANYRESOCT=r2, @ANYRES16=r0, @ANYRESDEC]) mmap(&(0x7f000020f000/0x3000)=nil, 0x3000, 0x200000e, 0x10, r3, 0x694a9000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0xc) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000280)="01b51913d3013daa29ca461eba03bbd74e0c2f646de2fdf64b221ac7a28b6c3cfdb7934b2cfb59716ab8e89860614d17b51c46bc2f6c0b7dd23aac8bcb1188d3efdc1727ecd6117f01aa4c2f66d3d0c93e8ac6e475213da6fd49817a99713e25a8d5076bd47f492e039f146ca77ef9e933ec1ab7f44cf4e008d1bb59769d05d7f182f54d3c98dc12ca7994753102bc4cb4486b16c4ef9b280613bfd45141347672abf7024141ce0021bb4f40f9738415e3e20d293c5ab460154c852ac804d1536e2b2b98042fa0279ffc6deb3c736be47f917f62d6b7da5c82483b5b6382683a01da022de7fb52739008ef8d7e061a920cf0daa4cd") r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000640)={r3, 0x5, 0x3a, 0x6}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000680)=0xf) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047454, 0x0) 08:30:29 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) [ 1568.696987][ T26] audit: type=1804 audit(1637829029.882:961): pid=10812 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/778/file0/file0" dev="sda1" ino=14919 res=1 errno=0 08:30:30 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:31 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:33 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:35 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:30:36 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x100}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x2162, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x78) unshare(0x20000000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:30:37 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_open_pts(r1, 0x400200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:30:38 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40086602, 0x0) 08:30:44 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c83000065", @ANYRESOCT=r1]) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r5, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0/file0\x00'}) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r4) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:44 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40095505, 0x0) 08:30:44 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) unshare(0x4000000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0xc080, 0x0) 08:30:44 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080), 0x2040, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f00000000c0)={0x7ff, 0x7fffffff, 0x7, 0xffffffff, 0xb, "f8a5cd092f5b7ca2fe7f321b80e7f7383de80f"}) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:30:44 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:30:44 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x669) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"/1162], 0x485) [ 1583.506086][ T26] audit: type=1804 audit(1637829044.692:962): pid=11293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/779/file0/file0" dev="sda1" ino=14945 res=1 errno=0 08:30:44 executing program 5: mount(0x0, 0x0, &(0x7f0000000600)='efivarfs\x00', 0x1540d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB='cY\x00e\x00'/18, @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = socket$inet6(0xa, 0x6, 0x1) ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000a40)={r1, 0x4, 0x100000001}) ioctl$BTRFS_IOC_GET_DEV_STATS(r4, 0xc4089434, &(0x7f00000016c0)={r5, 0x5, 0x1, [0x8, 0x2, 0x8, 0xc49, 0xf], [0x46f4d872, 0x6, 0x8, 0x6, 0x9, 0x8, 0x4, 0x1f, 0x9, 0x62d3, 0x5, 0x584, 0x4, 0x2, 0x81, 0x9, 0xd0f, 0x0, 0x1, 0x2, 0x81, 0xffffffffffffff0b, 0x80000001, 0x2, 0xfffffffffffffffd, 0x1, 0x7fff, 0x9b38, 0x7821, 0xffffffffffffff01, 0x3, 0x1, 0x1f, 0x63, 0xcb, 0x6, 0xffff, 0x5, 0x1, 0x5, 0x0, 0x3ff, 0xf3, 0x7, 0xc, 0xfffffffffffffffc, 0x1, 0xffffffffffff8001, 0x20000000005, 0x3, 0x4, 0x0, 0x5, 0xd6b, 0xffffffff7fffffff, 0x7ff, 0x1, 0x100000001, 0x5, 0x8, 0x6, 0x4, 0xfffffffffffffff9, 0x200000000008, 0x101, 0x4, 0x9, 0x4, 0x0, 0x9, 0xffffffffffffff75, 0xea9b, 0x4, 0x5ec7, 0x8001, 0x21, 0x3be, 0x100000001, 0x3, 0x400, 0x3ff, 0x0, 0x407, 0x10000, 0x10001, 0x81, 0x8a46, 0x6, 0x7, 0x200, 0x800, 0x2, 0x20, 0x7fff, 0x20, 0x6, 0x0, 0x13a, 0x3, 0x8000, 0x9, 0x2c74, 0x8, 0x8, 0x2, 0x0, 0x4, 0x2, 0x33, 0xffff, 0xcd3, 0x10000, 0xff, 0xe40, 0x10001, 0x4, 0x81, 0xffff, 0xfff, 0xf4, 0x9]}) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000e40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) read$FUSE(r6, &(0x7f0000004780)={0x2020}, 0x2020) [ 1584.031456][ T26] audit: type=1804 audit(1637829045.222:963): pid=11346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/780/file0/file0" dev="sda1" ino=14950 res=1 errno=0 08:30:45 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) open(&(0x7f0000000140)='./file0/file0\x00', 0x8802, 0x100) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) r3 = open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f00000016c0)={0x2020}, 0x2020) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1584.236696][ T26] audit: type=1804 audit(1637829045.262:964): pid=11344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/780/file0/file0" dev="sda1" ino=14950 res=1 errno=0 08:30:45 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:30:46 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x20000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r3}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r2, 0x26) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x9, 0xa, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x12}, @exit, @alu={0x4, 0x1, 0x1, 0x6, 0x5, 0xc, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x80000000}]}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0xf3, &(0x7f0000000280)=""/243, 0x41000, 0x2, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x0, 0x4, 0x80000001}, 0x10, r2, r1}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r4, 0x4020744f, 0x0) [ 1584.774135][ T26] audit: type=1804 audit(1637829045.962:965): pid=11415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/781/file0/file0" dev="sda1" ino=14950 res=1 errno=0 08:30:46 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) setuid(0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$qnx6(&(0x7f0000000140), &(0x7f00000005c0)='./file0\x00', 0x7fffffff, 0x7, &(0x7f0000000ac0)=[{&(0x7f0000000640), 0x0, 0x7f}, {&(0x7f00000016c0)="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", 0x1000, 0x4}, {&(0x7f00000006c0)="1cfc5deca552b589a4ea37a9e41029323bdd8379fdd053e6d846", 0x1a, 0x7}, {&(0x7f00000026c0)="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", 0x1000, 0x82}, {&(0x7f0000000700)="7b90399454787e0d999ac12ed5b21f6601b59ef45f78468e9014fdc54bcbcbb6c276e4b2d63d3a6c44ccd6d3a5f0621ed4a0baafb86fc659b31262bb3de2006edc5a0cf40bad3b815ab8bf59877135869aac5f98ae727b94a3e40ebd1f07cc111dfc4aa134cc04fe373765fe4884796222b23dfa761b23f57a4b05b2d816c46e476f9a8841bdf25130724ba70e5ab0d093f01f019e91ebcad8f63cbfd586c7a26d9b849a8cd7dd5cb82ef90774f6d7c464db6811755f93622ebcc9e11a8fad40f0d40acfc341768b9fb6f70bcfe127d646dff793372d4a61fc3509a870c0b409458024da26cda64814250ba52904", 0xee, 0x83b}, {&(0x7f0000000a40)="ebcbf71b0e1d4b7b182182f5d28ae28d478fe698b8ec77e67c9e73221cb7d01ceb8ba49e9bcda89c8893ff60bc0022d3be8be41bc2e0b59f9b0c6ed781d89f11319b851f7123bc5fbef620ff5552540353fc55d2d8135a4fa8", 0x59, 0xfffffffffffffff7}, {&(0x7f0000000800)="3e62eaea65a9e846189b9fee8471f36b76f25bf2c5232bf42b", 0x19, 0x2}], 0x2141c90, &(0x7f0000000cc0)=ANY=[@ANYBLOB="215e5b28342b2a2e2c002c262e7b5b902c2c657569643d", @ANYRESDEC=0xee00, @ANYBLOB=',dont_measure,uid>', @ANYRESDEC=0x0, @ANYBLOB=',uid>', @ANYRESDEC=r1, @ANYBLOB="2c5dfd848768bb20a5c158001622de241a1cc02450ec151c424cba4f7f17adbd497fe340788df724b27258d27c32d9868fa4944ffedee6c935"]) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x4, [0x0, 0x3, 0x1, 0x10000000, 0x0, 0x10000]}, {0x0, @struct, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x6, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x401, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x0, 0x10001}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) [ 1584.911236][ T26] audit: type=1804 audit(1637829046.002:966): pid=11415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/781/file0/file0" dev="sda1" ino=14950 res=1 errno=0 08:30:46 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16, @ANYBLOB="090d0000000000f0ff000700000008000300", @ANYRES32=r4, @ANYBLOB="0800051d000000001400060076657468115f746f5f7465616d0000000400cc0008000500040000001400040073"], 0x58}}, 0x4890) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000006c0)={0x8c, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x10000, 0x7e}}}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4080}, 0x8004) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1585.440389][ T26] audit: type=1804 audit(1637829046.632:967): pid=11474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/782/file0/file0" dev="sda1" ino=14950 res=1 errno=0 08:30:47 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40186366, 0x0) [ 1586.010112][ T26] audit: type=1804 audit(1637829047.202:968): pid=11509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/783/file0/file0" dev="sda1" ino=14566 res=1 errno=0 [ 1586.153931][ T26] audit: type=1804 audit(1637829047.202:969): pid=11506 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/783/file0/file0" dev="sda1" ino=14566 res=1 errno=0 08:30:47 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) r4 = openat(r2, &(0x7f00000005c0)='./file0/file0\x00', 0x10040, 0xb690dce78408ece) perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0x6, 0xe9, 0x2, 0x0, 0x0, 0x7, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffc00, 0x2, @perf_config_ext={0x800, 0x7fff}, 0x4, 0x5b5, 0x9, 0x5, 0x5, 0x800, 0xc315, 0x0, 0x7, 0x0, 0x6}, r3, 0x1, r4, 0x1) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:47 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x1, &(0x7f0000000140)={0x0, 0x2e, 0x2, @thr={&(0x7f0000000280)="1e1c4e77e5455a745407f9aeef1c76ca2658bdee057217427f20bcceede23050c121d8773741cfb0520c753233acbd3f05dcea92db8e0ca91961986764e6ecfdb05a46d8309fdafe2e0e90d0634cbdc87b4c0308f69515b0ed", &(0x7f0000000300)="1a976fdefcc7416d9ab94fedaf98d1a0ae1441edbd58e60b278952d6dd972e8c89f8f45634ad3278f64efb72742ede4f245d5e19356ca95bbdd4d6844e7fdfe80aae7999a8d93bd88234186c1c0423f27f99080b839a795017441f3d76e0afe23d1bf87eef6e96b073bc0b66a00d3b9d54dfcc11077c59f40df602859c90316227af4041ad32d01b"}}, &(0x7f00000003c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x39e49928aef2ccce, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) renameat(r2, &(0x7f0000000100)='./cgroup\x00', 0xffffffffffffffff, &(0x7f0000000140)='./cgroup\x00') ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x1a, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="6000000024000b0f000048a743391fcf3bdc0000", @ANYRES32=r6, @ANYBLOB="0000ebffffffffff000000000a0001006e6574656d0000003000020000000000b00e00000000000009000000000000fc0000000014000600060000000000000000c89668908a46675300000000000000"], 0x60}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000340)={@loopback, 0x5, r6}) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xd, 0x1, &(0x7f0000000400)=@raw=[@alu={0x7, 0x0, 0xb, 0x7, 0x3, 0xfffffffffffffffc, 0x8}], &(0x7f0000000440)='GPL\x00', 0x3f, 0xb9, &(0x7f0000000480)=""/185, 0x40f00, 0x1, '\x00', r6, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x0, 0x401, 0x6}, 0x10}, 0x78) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:30:47 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:30:47 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x400) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080), 0x21a000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x10, 0x3, &(0x7f00000003c0)=@raw=[@generic={0xfd, 0xb, 0x2, 0x20, 0x7}, @ldst={0x1, 0x0, 0x1, 0x3, 0x7, 0x80, 0x1c}, @ldst={0x1, 0x0, 0x1, 0xb, 0x5, 0x0, 0xffffffffffffffe8}], &(0x7f0000000400)='syzkaller\x00', 0x4, 0xca, &(0x7f0000000440)=""/202, 0x40f00, 0x12, '\x00', 0x0, 0x19, r3, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x5, 0x3, 0x7}, 0x10, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r5, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r5}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1b, 0x8, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x7, 0xa1, 0xfffffffffffffffb}, @call={0x85, 0x0, 0x0, 0x3a}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x4e}, @exit, @map={0x18, 0x7, 0x1, 0x0, r3}], &(0x7f0000000140)='GPL\x00', 0x9000, 0x8, &(0x7f0000000280)=""/8, 0x41000, 0xd, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xf, 0x4, 0xfffffffc}, 0x10, r5, r1}, 0x78) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:30:47 executing program 2: unshare(0x28070200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0x10, &(0x7f0000001680)={0x0, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0x7, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe0000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}, @generic={0x3f, 0x0, 0xb, 0x1, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x4, 0x3, 0x2, 0x101, 0x8000}]}, &(0x7f0000000600)='GPL\x00', 0x581, 0xc6, &(0x7f0000000640)=""/198, 0x1f00, 0x8, '\x00', 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0x7, 0x8000, 0x6}, 0x10, 0xffffffffffffffff}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1c, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0xfffffffd, 0x18, &(0x7f0000000240)=""/24, 0x41000, 0x1, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0), 0x10, r1}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1d, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000280)="d5302fa54dbb8f2e390a4a2d5fceb1420e824bd8ecc8418a9bb73ec1921f313751b2338334e23df263400eb0a111d91d99dfd6f711b02f7080413ea12a0c729fb980c87d2d062b8c23b21f3dae122901135160445df33a356c49daa84fb6bed4f0720e0076c84391307429ff27b9fa7b9aa778ea3ad64a87c780ebd8f264728944baef3187aeb3248a66d3f3cc8b750477081824bc49c445aaac7909a4a00a4be4377e02d8ab2475b16898ca", &(0x7f0000000080)=@tcp6}, 0x20) ioctl$PPPIOCSFLAGS1(r3, 0x40047454, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', 0x0, 0x8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x16, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xb763}, [@btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @exit]}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x31, &(0x7f00000003c0)=""/49, 0x40f00, 0x2c, '\x00', 0x0, 0x2, r2, 0x8, &(0x7f0000000400)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0x1, 0x80000000, 0xfffffff9}, 0x10, r1, r4}, 0x78) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r5, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) ioctl$BTRFS_IOC_QGROUP_CREATE(r5, 0x4010942a, &(0x7f0000000580)={0x800, 0x100000000}) [ 1586.617031][ T26] audit: type=1804 audit(1637829047.802:970): pid=11559 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/784/file0/file0" dev="sda1" ino=14954 res=1 errno=0 08:30:48 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r1, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:48 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x2000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xc) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:30:48 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x7fff}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031302c687567653d616c7761797366f74ea070d05a75c9dea0f32c6d61736b3d4d6f48bad895e9802fb2888341a9215bdad6ef211f61eda479a784554273ee12b8baf0e4fca249310aae6567aeeb5a05cc8031c78dea25173b3a19296381", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:48 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40189429, 0x0) 08:30:49 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) [ 1587.972109][ T26] audit: type=1804 audit(1637829049.162:971): pid=11740 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/786/file0/file0" dev="sda1" ino=14966 res=1 errno=0 08:30:49 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x30000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:30:49 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f00000006c0), 0x4000) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:49 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000080)) [ 1588.640473][ T26] audit: type=1804 audit(1637829049.832:972): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/787/file0/file0" dev="sda1" ino=14970 res=1 errno=0 [ 1588.790529][ T26] audit: type=1804 audit(1637829049.862:973): pid=11803 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/787/file0/file0" dev="sda1" ino=14970 res=1 errno=0 08:30:50 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:30:50 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$nfs4(&(0x7f0000000140), &(0x7f00000005c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000a40)=[{&(0x7f0000000640)="4a15e48ac0d8839e33c7", 0xa, 0x1}, {&(0x7f00000006c0)="634a27b90523a930c4c1d6d0e96bde79b9be8153e5553ba57f51a082063cc3a14877ef247f468bc7b1353d54e7fd270357e91de9a0e7e8a14d540c89bf7645d4f44fec804052e8b8a05be56c505b9534c120cf250aeb05db995be8cbac5131752f4bb90ee07d42e91fc383dab05451cbb6d4ac6e2dc6f88bcab370e89a4a84a45d6a223133eb4472a9a0dae504e492c05a553d28c3422cc0fdd848df63f33cc6c46c11eb50654865b9131f2e337ace16e148a1e5717b207c04e6b0016644be645e5fbaa4969a39ccd753438e6fda5088f619f0da09961246323d4a959a60f7c3c036d74d3d9d6664c3104757", 0xec, 0x2fe}, {&(0x7f00000007c0)="8add64794d554e4db4284c8d556f81ae21aed9ee6e7314d9d656fba3d1945658881d8bdcd9fc4edf674e66ef16b512c33f8c4fe83a55782f90", 0x39, 0x200}], 0x11080, &(0x7f0000000ac0)={[{'/dev/loop-control\x00'}, {'configfs\x00'}, {'msdos\x00'}, {'((&'}, {'/proc/keys\x00'}, {'.\'&(-'}, {'/proc/keys\x00'}, {}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', r1}}]}) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:50 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x401c5820, 0x0) 08:30:50 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) [ 1589.759700][ T26] audit: type=1804 audit(1637829050.942:974): pid=11925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/788/file0/file0" dev="sda1" ino=14940 res=1 errno=0 08:30:51 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0x7, 0xff, 0xf9, 0x1f, 0x0, 0x6, 0x2, 0x21f726caf54622f8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x666, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x900, 0x1, 0x9, 0x7, 0x800, 0xaf73, 0xa1d, 0x0, 0x5, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x3) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1589.943033][ T26] audit: type=1804 audit(1637829050.962:975): pid=11925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/788/file0/file0" dev="sda1" ino=14940 res=1 errno=0 08:30:51 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) unshare(0x10000) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) [ 1590.399565][ T26] audit: type=1804 audit(1637829051.592:976): pid=12001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/789/file0/file0" dev="sda1" ino=14084 res=1 errno=0 [ 1590.564465][ T26] audit: type=1804 audit(1637829051.592:977): pid=12001 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/789/file0/file0" dev="sda1" ino=14084 res=1 errno=0 08:30:51 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x0, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8, 0x6}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x200081}, 0x0, 0x4, 0x0, 0x5, 0xfffffffffffffffd, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) creat(&(0x7f0000000140)='./file0\x00', 0x41) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/219, 0xdb}], 0x1, 0x2, 0x2) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="8de7522c756b6462240f7c707b340d6ca0a262b8409fa0078fdcedf28e84bbb53bb6a5d5865db4189e40f08dd1d26a33cca98648c98a968ca21906d2b8c545eb2f634b40eb25ac4fe46b65e600aa4ad6ecaa944445977ef0a2ff82baeb95901f30260c27b462defa797beef10c6eabcf848a9b87010f36c9556195f4c2d80bb93b75adb3da2bfb09c0d9eb3bacf3a6587b6ea964d23798686853fcdd2ca917ef1bd9de674d38c72026310615c1b036c219a35479e6b734a80cdd74ccb70db980f51ebb2127df440d78297efbfd0f0d3694a8d9c757a24e3006c4023e90ab60180b8bb9e3e9f67d", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) [ 1591.018796][ T26] audit: type=1804 audit(1637829052.212:978): pid=12052 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/790/file0/file0" dev="sda1" ino=14129 res=1 errno=0 08:30:52 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='overlay\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x80001, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @usage=0x401, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636bcc0a48caffdfe34f5031302c687567653d616c776179732c6d61736b3d4d41595f455845432c657569643e", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r2]) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f0000000640)='./file0\x00', 0x3, 0x2, &(0x7f0000000740)=[{&(0x7f00000006c0)="b2e050598daa870ea1", 0x9, 0x9}, {&(0x7f0000000700)="6613ff92a2be", 0x6, 0x5}], 0x204000, &(0x7f0000000780)={[{@min_batch_time={'min_batch_time', 0x3d, 0x80}}, {@nobarrier}, {@journal_ioprio}, {@nouser_xattr}, {@orlov}], [{@appraise}, {@audit}, {@appraise_type}, {@dont_measure}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede221f000000000000002876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:52 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000340), 0x121300, 0x0) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) statx(r4, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x400, &(0x7f0000000b00)) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [], {}, [{0x8, 0x3, r8}]}, 0x2c, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a40)=[{&(0x7f00000002c0)={0x80, 0x31, 0x10, 0x70bd28, 0x25dfdbfc, "", [@typed={0x8, 0x96, 0x0, 0x0, @pid}, @nested={0x4, 0x6}, @nested={0x59, 0x26, 0x0, 0x1, [@generic="ee868ce741c47af667c4af39df3c1d5ec15ac0d9a0d5d6c7479ddcd1a483945b29377afea8bdbc56ac3c8831f1948198a2c9dadeddd358f915ce5ba07fcf76f21f", @typed={0x8, 0x4d, 0x0, 0x0, @ipv4=@multicast1}, @typed={0xb, 0x4b, 0x0, 0x0, @str='-\xce\'\')6\x00'}]}, @typed={0x8, 0x60, 0x0, 0x0, @fd}]}, 0x80}, {&(0x7f0000000380)={0x144, 0x12, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@generic="8e6c69b7d900fd7c48c0f2f71345df1071da4f3a09a29aafa2e620dbe9d3daf3f0431c8150b62af7acdd361ad0404b381e9bdbaa7d00f618f78f1c98a35127f8d06ab3672b84f7313e73d5653d21447f7309152db1b2611345b1d70990faf898d510c8362612", @nested={0xc9, 0x14, 0x0, 0x1, [@generic="9446d97a584973d7414025af6dbb090327240eaf957ca419ff", @generic="dac035db63d5869a64b55ac7acc27ee27febf5cb6821e5860b384b3696c870bb23b4ec75ffc2e50fbbc54042bdb52d0a224843cde94b37624dbf5ab4b819828d06c84af9cbcfb5748c67ff411c0ef47d44f5dcf407718983437b735c74191a083ac26845d6531b1bda80b9f93009773e52ea7350c72fa443d1ebbaf012e5e769e69aa9f780c49d8a14ee3ac9f2b9205cacb85a2ca66a1c94", @typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@private0}]}]}, 0x144}, {&(0x7f0000000680)={0x18c, 0x19, 0x200, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x3d, 0x0, 0x0, @pid}, @generic="e203325c716e11071d173c29a9953fea4108147d9025e35674c7652887f67e3596ea5c844543252e3774caf09b9ff184a934e720a21209df8be0a164916d3a91a8dff55772d0b569e7be10cb58af3940043606f640b061e1979f5a9866ee6fdbf5092b7c98bb6bc1dd9676525fbe60ec309dd6e49d", @generic="88e672816c85cd26bd9e7ea77cfa52ec4cfd", @generic="d1ccc75cff292e869bff1ed89116d0318750e1507288d5c8f479938d2969cbcbcdf2fe9e72fc039db71ccc6108d41abe720bb1dbf4a5f87e2b7f139a226166369c86e7a2013056f00bfad3eb3a66b6dc7bf168612cbe96e94b8c37fecf12bd0effed1c19d334fc4d111ced30efb8574cb11d0a949c9c02cf4e744298e35b5a43bbf0979073f51993007fb43853fdf11c8d61cf705b040b64752356247b6b11c27ef5ef5d22131f2c5ba0179da4417ca04c248d2c4fd77efef500556608f0fe2ae9e8a80c86e64a97cd668a25d4b60fc46d121136e9bec2521ec9f5287119b3e2dac5b11b1bb89938a2be92e5ec"]}, 0x18c}, {&(0x7f0000000cc0)=ANY=[@ANYBLOB="500100003a0020032dbd7000fedbdf2520006c8008002c00", @ANYRES32=0x0, @ANYBLOB="14001500fc00000000000000000000000000000108004200", @ANYRES32, @ANYBLOB="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"], 0x150}, {&(0x7f00000009c0)={0x40, 0x402f, 0x200, 0x70bd27, 0x25dfdbfd, "", [@nested={0x20, 0x12, 0x0, 0x1, [@typed={0x14, 0x79, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @typed={0x8, 0x27, 0x0, 0x0, @uid=r7}]}, @typed={0x8, 0x5d, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x78, 0x0, 0x0, @u32}]}, 0x40}, {&(0x7f0000001580)={0x137c, 0x1f, 0x10, 0x70bd29, 0x25dfdbfe, "", [@nested={0x11b4, 0x74, 0x0, 0x1, [@generic, @typed={0xe7, 0x8f, 0x0, 0x0, @binary="4750e4ceb134cacead463c0a60abfb559e079c5bcd7f100122b675cd04181758e6030f6cf992940e4212a5cb3ec65ccfed0a87f9033345e0b07201d1c1839b5f8122e66bf5f479f82775539cd094c0c239e4b4fc584fe9351939ff2b49791fdf0303f095acb7dc1e3ee259c06733a0846a7a12204c13bff7814b0d096437f72e8173f32189a3c49fea975d9833776709c9cadad917ee6543ac3dbfab5d69aba7b511661b5df1515e71d06917b18da4a8532f4a703586da0ee39dcbd55cdc8ae3f150bdc24fced3c68f0b1b91fd4a33c82f5eb7d1e65df8c6a46097e1d395b77463818e"}, @typed={0x14, 0x74, 0x0, 0x0, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @typed={0x8, 0x5, 0x0, 0x0, @pid=r6}, @generic="7c916dba6329400a2a24ac40390a533c5975749ce3dd4d468ba998e5b2721158c0b593", @generic="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", @generic="8360a987ae001f7bf13007a2ac6712addadd642f96c52ad3decd7b1cd63480d99eb9669e0ae980fcdefadbf862145638590ee657594c9c977399732eafc3deff5c7112e309e633a89977a5af91a157bff9c9c777a5b5948a7a4e9875b83b6c495499957e75b16efbd5aa2582473af9ed0a308f3b0bc9a846adcfcc54be9e5e087903e59fa552dfca8a"]}, @typed={0xc6, 0x4e, 0x0, 0x0, @binary="632fda17c4638ab0fcd5502432c82bf3c5673b4abc15e23381d1570a0f873eb2fb5582fc80193b37e4ad7a04f31a84dd97e020286161fe9839df9a7e728efa2d4de5b61113f8711c8b9a4237357f80ef31ad5c49ce700e8a011d56370ca13ab844b4b414719a0fddea8075be42cd93c20800986ba669c586bc62cff313ffb2101c8ba302f73336aa35a00806f7fb3e2a6078b64602c566e06acbadb3298e5522f7551a99c8511c07c3aec82999a8ce3a485086e84cc98f1cb2aaefdb9431b555c269"}, @generic="51a1f952e33105ca0caf1626e1254ec40e98fe6a57f7ca4b6beca8bc69318c8b10a891231529e9cee0d242ec14abea29140a0de03b1d04f59b80ed6aeac358ad0ca93e2f5e5d2e32ba1aad5f5441078799b9d5bc57c727d6f8ea7ece8995c6d9a2af97322460eff31e89b55dc759cc0c30b05bfdc99401afdcedfb01e02dff01abae45cecb67373a84f0165baf17d4c693c02788a6ce12c14701bcbe183c46f4b0a6165d225bc8d8d651d0502bc702134a50414348a038c3b4279c9e4a713c17c98506cedf67750271360fcbf49f096a1478508c85f6ed67ab25043d917f89207a5d200cf8068eb4c8ddc9bb829655"]}, 0x137c}], 0x6, &(0x7f0000000540)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r4, r2, r1, 0xffffffffffffffff, r2, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, r8}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00}}}], 0x70, 0x4000}, 0x4800) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) [ 1591.581812][ T26] audit: type=1804 audit(1637829052.772:979): pid=12076 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/791/file0/file0" dev="sda1" ino=14177 res=1 errno=0 [ 1591.745788][ T26] audit: type=1804 audit(1637829052.772:980): pid=12100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir995069178/syzkaller.JsrUYg/791/file0/file0" dev="sda1" ino=14177 res=1 errno=0 08:30:54 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = syz_io_uring_complete(0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000380)=""/251) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:30:54 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:54 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x0, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8, 0x6}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x200081}, 0x0, 0x4, 0x0, 0x5, 0xfffffffffffffffd, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) creat(&(0x7f0000000140)='./file0\x00', 0x41) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f00000005c0)=[{&(0x7f00000006c0)=""/219, 0xdb}], 0x1, 0x2, 0x2) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000a40)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB="8de7522c756b6462240f7c707b340d6ca0a262b8409fa0078fdcedf28e84bbb53bb6a5d5865db4189e40f08dd1d26a33cca98648c98a968ca21906d2b8c545eb2f634b40eb25ac4fe46b65e600aa4ad6ecaa944445977ef0a2ff82baeb95901f30260c27b462defa797beef10c6eabcf848a9b87010f36c9556195f4c2d80bb93b75adb3da2bfb09c0d9eb3bacf3a6587b6ea964d23798686853fcdd2ca917ef1bd9de674d38c72026310615c1b036c219a35479e6b734a80cdd74ccb70db980f51ebb2127df440d78297efbfd0f0d3694a8d9c757a24e3006c4023e90ab60180b8bb9e3e9f67d", @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:54 executing program 2: unshare(0x48040200) mmap(&(0x7f0000697000/0x2000)=nil, 0x2000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f00000000c0)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = accept$alg(r1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000580)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x7, r1, &(0x7f0000000280)="5cd45fd8c9320765341f77fbee0b517819dbb4e606fb25c4bdf7fa9f8164327766f16f4ff0980ca98d945334495a2efbb3a40aa6622c493cdfcfde0fd278393e1299da8c1ecf68207a19780a24860ec514af4790afba0618fa6a6d249cfde6673d5017561857f0012bc130c16bd7ee140c5af77e41c4f7b8f79dbe66c6677b5c1ef06273e6fb1602f508fe23a938c39378b82f4b4dc5d7e4efcbdea1e7bff70b1a994d41ba1a31b642bd7b49bedcd2561b878fa8cafd76efb98230a685f108f30621d2b85337e3e3f749ae9d670141e7de69", 0xd2, 0x8249, 0x0, 0x1, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f0000000380)="90ec3a7d9ee15eb2293e0b20daf64dfdf57410077e7b3c9db0998cedae69d2296578654deb2db5aa6b42387a1b736d49f65108ae7c8806919792a3e866cb152169dfd8983a721f998aa34be7ab32ffdad4a6db316e972a0c1ed4b6db4d696c868b3e35c6cd7cccabd4feaefa8d", 0x6d, 0x6, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2, r3, &(0x7f0000000440)="b4514ac5d9327ca084611c45faad3ceb792a69a4a3ecc1110872b43fa8f3d8a81c65cf5c9d1cd262f4e5d519f503bf3f01b8ea6879c33c42f8adf47b25ad2dd9f5f0a99109ef213abd44130a46baba786f90635683f69c115020392c30c89f11fe6e106ff110378c54ec6aec341efb09bed1f88b7fdcffedca88da1078e48ceda2257a339fde67a250282c42ac667cc3a0c30f4d4f74c57746642567b9435c01436cf10c18ec7876037a31e04e112bd966654d3a2da859ec3c3c4e08a16321acf1f55f0324b1de39650ef31ed7207ae9a225f9899de2498e3144", 0xda, 0x200, 0x0, 0x1}]) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:30:54 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:30:54 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x7fff}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031302c687567653d616c7761797366f74ea070d05a75c9dea0f32c6d61736b3d4d6f48bad895e9802fb2888341a9215bdad6ef211f61eda479a784554273ee12b8baf0e4fca249310aae6567aeeb5a05cc8031c78dea25173b3a19296381", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:54 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:55 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4, 0x7fff}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031302c687567653d616c7761797366f74ea070d05a75c9dea0f32c6d61736b3d4d6f48bad895e9802fb2888341a9215bdad6ef211f61eda479a784554273ee12b8baf0e4fca249310aae6567aeeb5a05cc8031c78dea25173b3a19296381", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:55 executing program 3: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:55 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:30:56 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000380)=""/260) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:30:56 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:58 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000600) unshare(0x10000000) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) r2 = syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000640)={'U+', 0x3}, 0x16, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r3 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB='pe\x00'/18, @ANYRESOCT=r1]) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:30:58 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:30:58 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x400000e) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:30:58 executing program 4: unshare(0x48040200) unshare(0x8000080) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x1, 0x800, 0x6, 0x7fff, 0x7, "2ba4b421a63997dda8643bd4f6bc7a60f290bb"}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000280)=""/262) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:31:00 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020940d, 0x0) 08:31:00 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40085507, 0x0) 08:31:00 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:00 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xa2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3]) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047454, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000140)={0x18, 0x0, 0x0, {0x4}}, 0x18) 08:31:02 executing program 3: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:02 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x41015500, 0x0) 08:31:03 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) dup3(r1, r0, 0x80000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000140)=0x80) 08:31:03 executing program 5: unshare(0x48040200) pipe(&(0x7f0000000100)) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f00000006c0)={0xc, 0x10001, 0x1f, 0x84000, 0xffffffffffffffff}) mmap(&(0x7f0000211000/0x3000)=nil, 0x3000, 0x3000005, 0x10, r0, 0x69697000) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) r3 = syz_mount_image$bfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x3, &(0x7f0000000480)=[{&(0x7f0000000140)='\x00\x00', 0x2, 0x2}, {&(0x7f0000000380)="381ff212efc9bc37bb55effea2a747861b98292ee52089623b4c9516dd5a99819c1a1185bb1d4113", 0x28, 0x9e}, {&(0x7f00000003c0)="6ce029a77eec02fa43db43023a2c9f9bde1c9963e97cf6278889412565efab604724a5d7c7899d9acb0389c66788b59d4551d998f8af54947f25a95c417f3380cec222becc17573201f718579de139209f0504d4c316d5d7985612735421c6a891fa7d809ecfbc325547e0f7479d35db1b584bc320ecc4ad5cd35c114713f5347320dc87377ebb59f47b91130409ecf6aaea0533bd20f607ea1774d7449df9837560f6458a8b5bcd29abf83531c088b7f3336468062f0bde2080c5fd1534", 0xbe, 0x5}], 0x21001, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESDEC=0xee00, @ANYRESOCT=r2, @ANYRES16=r0, @ANYRESDEC]) mmap(&(0x7f000020f000/0x3000)=nil, 0x3000, 0x200000e, 0x10, r3, 0x694a9000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0xc) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000280)="01b51913d3013daa29ca461eba03bbd74e0c2f646de2fdf64b221ac7a28b6c3cfdb7934b2cfb59716ab8e89860614d17b51c46bc2f6c0b7dd23aac8bcb1188d3efdc1727ecd6117f01aa4c2f66d3d0c93e8ac6e475213da6fd49817a99713e25a8d5076bd47f492e039f146ca77ef9e933ec1ab7f44cf4e008d1bb59769d05d7f182f54d3c98dc12ca7994753102bc4cb4486b16c4ef9b280613bfd45141347672abf7024141ce0021bb4f40f9738415e3e20d293c5ab460154c852ac804d1536e2b2b98042fa0279ffc6deb3c736be47f917f62d6b7da5c82483b5b6382683a01da022de7fb52739008ef8d7e061a920cf0daa4cd") r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000000640)={r3, 0x5, 0x3a, 0x6}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000680)=0xf) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047454, 0x0) 08:31:03 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000380)=""/231) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:31:03 executing program 3: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:03 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80047453, 0x0) 08:31:04 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x1000) 08:31:04 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:05 executing program 3: unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:05 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:06 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='&d=', @ANYRESHEX=r2]) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x17) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000080)=0x2) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000280)={0x9, 0x7f}) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) pread64(r5, &(0x7f00000002c0)=""/33, 0x21, 0x9) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) unshare(0x8000080) 08:31:06 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:06 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x6000, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000140)={r0, 0x8001, 0xffffffff, 0x7}) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000280)=""/168) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:07 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:07 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) [ 1606.709067][ T1223] ieee802154 phy0 wpan0: encryption failed: -22 [ 1606.716348][ T1223] ieee802154 phy1 wpan1: encryption failed: -22 08:31:08 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x4, 0x7b78, 0x800, 0x63, 0xd, "23c21841db0e08edefa2a5c1a5a9a9bdfd6242"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:08 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:09 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80047455, 0x0) 08:31:09 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) unshare(0x4e010880) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:09 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x20000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x84640, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x21000000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) unshare(0x10000100) 08:31:09 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:09 executing program 4: unshare(0x48040200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4020744f, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000080)) 08:31:09 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x300) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x29, 0x9c, 0x0, 0x7f, 0x10, @local, @remote, 0x8000, 0x7f47, 0x3, 0x100}}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', r1, 0x3, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x6, 0x101, 0x8f, 0x1c, 0x12, "034995a40f021c34b6511c95a2dc4b4959379f"}) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:31:10 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:10 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) unshare(0x4e010880) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:10 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:10 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='&d=', @ANYRESHEX=r2]) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x17) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000080)=0x2) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$BLKRESETZONE(r4, 0x40101283, &(0x7f0000000280)={0x9, 0x7f}) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) pread64(r5, &(0x7f00000002c0)=""/33, 0x21, 0x9) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) unshare(0x8000080) 08:31:11 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:12 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80047458, 0x0) 08:31:12 executing program 0: fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:12 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='ext3\x00', 0x2a08000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:13 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='ext3\x00', 0x2a08000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r4 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r5, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:13 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_io_uring_setup(0x184, &(0x7f0000000080), &(0x7f0000147000/0x2000)=nil, &(0x7f0000149000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_ACCEPT={0xd, 0x6, 0x0, r6, &(0x7f0000000000)=0x80, &(0x7f0000001040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, 0x80800, 0x0, {0x0, r7}}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1800) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x2, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031300761ec9a653d616c776179732c6d61736b3d4d41595f455845432c657579643e2709ebdf1ada2ca0887585870fdae5438084d299912843dc811569da41f575d30a3045b7fb6f18fdafc4fbe515617590ee2e8ba70f700235fba3eb5289f37420b9de636320d3f42268341c9f5bf53056", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r8]) 08:31:15 executing program 4: unshare(0x48040200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x800) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) unshare(0xc6ff796d4164f3b2) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000440)={0x0, 0x10000}) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:31:15 executing program 2: ppoll(&(0x7f0000000080), 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={[0x1]}, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:31:15 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x8004745a, 0x0) 08:31:15 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) r1 = syz_io_uring_setup(0x184, &(0x7f0000000080), &(0x7f0000147000/0x2000)=nil, &(0x7f0000149000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r5 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup2(r5, r4) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_ACCEPT={0xd, 0x6, 0x0, r6, &(0x7f0000000000)=0x80, &(0x7f0000001040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x0, 0x80800, 0x0, {0x0, r7}}, 0x0) io_uring_enter(r1, 0x45f5, 0x0, 0x0, 0x0, 0x1800) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x2, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f00000006c0)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="2c6e725f626c6f636b733d0031483435345031300761ec9a653d616c776179732c6d61736b3d4d41595f455845432c657579643e2709ebdf1ada2ca0887585870fdae5438084d299912843dc811569da41f575d30a3045b7fb6f18fdafc4fbe515617590ee2e8ba70f700235fba3eb5289f37420b9de636320d3f42268341c9f5bf53056", @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r8]) 08:31:16 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x220c00, 0x100) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:16 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file0\x00', 0x220c00, 0x100) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:18 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:18 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [], {}, [{0x8, 0x3, r3}]}, 0x2c, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000005c0)='./file0\x00', 0x17, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="e7fd2a2ffda0e4e4a472931dd35885e76f59203841d50f983bda051292cac2740b3de5983b315ee709544ae7d4b2aeb06bfb4c9e8e99afafe191cb1d9244d61c342bddf0e705c30e98d693abe9d1b28cd385b8bf92448cc00ac13ec5222dddcbf1ad62cf390fb6bc8f21e0cc651c60dd186edae7a737fc1b472fda5625aea3085da15e4bf98acb7d3504c6698d2b96dc336af8158348ca974662cd1bf3926a04f770df44d53601104c4c9c05b5faa2351ef794f04f7d09b6ffceab88a29635a23478", 0xc2, 0x1}, {&(0x7f0000000640)="251c06e415bf29412414f721c740d77542420bdef0cd4de6ea699d2aeb500fb547d96461ba3d336240298ea85812f2c62562748a835794b6e626522d6e158045", 0x40, 0x6}, {&(0x7f0000000a40)="6fd757800ef55ad0eacb345a84766a293cbc59da4057f9e693ea410ec97cd03652f42a72fe9bbbbb3417a446947455aaddc33e9f50fd49e1d7a45558bda98b111e8651fdf7609b9d99b6e5537059e6b148de24285558eb7a774e64d01531469b797eaacbc99ffa73c4a7974f17b6d73080cbd7f49cb0dfc5a789782dbc39d666177dc11ce6aab9b12017b1c8b35766ddfa3174705748c57086e1b0a9e7968901408bbf0a88efbd6cd4f2af23e110e8e15b613e5044c3c2d5253b7eaf036c1d668925da19daae6659cc", 0xc9, 0xffffffffffff887a}], 0x2081010, &(0x7f0000000b40)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x39, 0x70]}}, {@gid={'gid', 0x3d, r3}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30, 0x33, 0x3a]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x4c, 0x2d, 0x25, 0x78, 0x25, 0x35, 0x74]}}, {@huge_never}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x65, 0x35, 0x25, 0x31, 0x37, 0x67, 0x70, 0xce8e45e0bb8dda4c, 0x33]}}], [{@obj_type={'obj_type', 0x3d, '/proc/keys\x00'}}]}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:18 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) syz_io_uring_setup(0x77b5, &(0x7f0000000280)={0x0, 0x4ade, 0x1, 0x3, 0x2, 0x0, r1}, &(0x7f0000280000/0x1000)=nil, &(0x7f00004d4000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000300)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:18 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0xab27) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000300)={0x2, 0x85, 0x6, 0xe0ae, 0xde73}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0xc5) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140), 0x210640, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@map=r4, r2, 0x19}, 0x10) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r3, 0x40047454, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5]) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000280)=0x375) 08:31:18 executing program 4: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @null}, [@null, @netrom, @null, @remote, @netrom, @null, @null, @default]}, &(0x7f0000000140)=0x48, 0x800) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001640)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001840)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000008c0)={r2, 0x1, 0x8}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000002040)={0x2, 0x0, @start={r2, 0x0, "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", "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"}, [0xf00, 0x0, 0x1, 0x858, 0x3, 0x400000000, 0x80, 0x40, 0x0, 0x9, 0x7, 0x3ea, 0x2, 0xfffffffffffffff9, 0x0, 0x3203, 0x7fff, 0x3, 0x100000001, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40, 0x0, 0x0, 0x10000, 0x2, 0x20, 0x0, 0x8, 0x0, 0x0, 0x100000001, 0x1f, 0x0, 0x2, 0x0, 0x8, 0x0, 0x5, 0x3, 0x7, 0x5, 0x2000, 0x200, 0x101, 0xfffffffffffffff8, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x4, 0x6, 0x1, 0xfffffffffffffffe, 0x0, 0x100000000]}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000280)={r2, 0x4, 0x100000001, 0x1}) unshare(0x48040200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r4, 0x4020744f, 0x0) 08:31:18 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80085502, 0x0) 08:31:18 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @usage=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x3, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000680)='./bus/file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [], {}, [{0x8, 0x3, r3}]}, 0x2c, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f00000005c0)='./file0\x00', 0x17, 0x3, &(0x7f00000007c0)=[{&(0x7f00000006c0)="e7fd2a2ffda0e4e4a472931dd35885e76f59203841d50f983bda051292cac2740b3de5983b315ee709544ae7d4b2aeb06bfb4c9e8e99afafe191cb1d9244d61c342bddf0e705c30e98d693abe9d1b28cd385b8bf92448cc00ac13ec5222dddcbf1ad62cf390fb6bc8f21e0cc651c60dd186edae7a737fc1b472fda5625aea3085da15e4bf98acb7d3504c6698d2b96dc336af8158348ca974662cd1bf3926a04f770df44d53601104c4c9c05b5faa2351ef794f04f7d09b6ffceab88a29635a23478", 0xc2, 0x1}, {&(0x7f0000000640)="251c06e415bf29412414f721c740d77542420bdef0cd4de6ea699d2aeb500fb547d96461ba3d336240298ea85812f2c62562748a835794b6e626522d6e158045", 0x40, 0x6}, {&(0x7f0000000a40)="6fd757800ef55ad0eacb345a84766a293cbc59da4057f9e693ea410ec97cd03652f42a72fe9bbbbb3417a446947455aaddc33e9f50fd49e1d7a45558bda98b111e8651fdf7609b9d99b6e5537059e6b148de24285558eb7a774e64d01531469b797eaacbc99ffa73c4a7974f17b6d73080cbd7f49cb0dfc5a789782dbc39d666177dc11ce6aab9b12017b1c8b35766ddfa3174705748c57086e1b0a9e7968901408bbf0a88efbd6cd4f2af23e110e8e15b613e5044c3c2d5253b7eaf036c1d668925da19daae6659cc", 0xc9, 0xffffffffffff887a}], 0x2081010, &(0x7f0000000b40)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x39, 0x70]}}, {@gid={'gid', 0x3d, r3}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30, 0x33, 0x3a]}}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x4c, 0x2d, 0x25, 0x78, 0x25, 0x35, 0x74]}}, {@huge_never}, {@mode={'mode', 0x3d, 0x7}}, {@size={'size', 0x3d, [0x65, 0x35, 0x25, 0x31, 0x37, 0x67, 0x70, 0xce8e45e0bb8dda4c, 0x33]}}], [{@obj_type={'obj_type', 0x3d, '/proc/keys\x00'}}]}) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r4, &(0x7f0000004780)={0x2020}, 0x2020) 08:31:19 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct={0x9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x5, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40, 0x1}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000140)='./file0/file0\x00', 0x200000, 0x40) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) rename(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00') 08:31:19 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="006801", @ANYRESHEX=r1]) unshare(0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x13) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x402000, 0x0) unshare(0x24000a00) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) syz_open_pts(r0, 0x103400) 08:31:20 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:31:20 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct={0x9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x5, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40, 0x1}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000140)='./file0/file0\x00', 0x200000, 0x40) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) rename(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00') 08:31:20 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct={0x9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x5, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40, 0x1}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000140)='./file0/file0\x00', 0x200000, 0x40) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) rename(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00') 08:31:21 executing program 5: mount(0x0, 0x0, &(0x7f0000000180)='configfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) chdir(&(0x7f00000006c0)='./file0/file0\x00') ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) chdir(0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f00000001c0)={0x0, 0x4, {0x0, @struct={0x9, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20, @usage, 0x0, 0x0, [0x0, 0x5, 0x1, 0x0, 0x0, 0x10000]}, {0x0, @struct={0x8}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x51, @struct, 0x2000000, 0x45d, [0x101, 0x40, 0x0, 0x0, 0x5, 0x2000]}, {0x0, @struct={0x10000010, 0x81}, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, @struct={0x40, 0x1}, 0x0, 0x0, [0xfffffffffffffffc, 0xfff, 0x0, 0xfffffffffffffffe]}, {0x4}}) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000010c0)='./file0\x00', 0x0, 0x4, &(0x7f0000001640)=[{0x0}, {0x0}, {&(0x7f0000001380)="3a70f160f3c74159989a316b7418e5880b4f89520f330485772011f7f60e0dc863e00a27ec3a31ae902e6dc64df8a16eeebceb4162698199d43ce2c71c9c9104149d27df57b3f1", 0x47, 0x9}, {&(0x7f0000001500)="0b4cc265d0d1ff42d394cd7f969aff", 0xf}], 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r2 = syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x1400c0, &(0x7f0000000900)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB=',nr_blocks=\x001H454P10,huge=always,mask=MAY_EXEC,euid>', @ANYRESDEC=0x0, @ANYBLOB="6363f836add6b8d6fd19006d008c832c7065", @ANYRESOCT=r1]) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) open(&(0x7f0000000140)='./file0/file0\x00', 0x200000, 0x40) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000045c0)='/proc/keys\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x1, 0x2, &(0x7f0000000a00)=[{&(0x7f0000000ac0), 0x0, 0x24}, {0x0}], 0x20000, &(0x7f0000000840)=ANY=[@ANYBLOB='errors=continue,uid>', @ANYRESHEX, @ANYBLOB=',uid', @ANYRESDEC=0x0, @ANYBLOB="cd93ada353d5a20fa695d173670c713ede22dfd6890576affaea2876c84d629f9dadb007a3ab819621ed2261c9ba776c349e86a31ffc3b426b8f28e305eb04945813a0b5a85df560b00100cedba8a5a152fb"]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(&(0x7f0000000600)='./file0/file0\x00', 0x0) read$FUSE(r3, &(0x7f0000004780)={0x2020}, 0x2020) rename(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000640)='./file0/file0\x00') 08:31:21 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:31:24 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80086301, 0x0) 08:31:24 executing program 2: unshare(0x48040200) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000f, 0x88071, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000680), 0x141280, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f00000006c0)={0x0, {{0xa, 0x4e20, 0x8, @remote, 0x4}}, {{0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, '\x00', 0xd}, 0x1000}}}, 0x108) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$TCSBRKP(r4, 0x5425, 0x8272) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:31:24 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:24 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x4004743c, 0x0) 08:31:24 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ppoll(&(0x7f0000001800)=[{0xffffffffffffffff, 0x2102}, {r0, 0x23}], 0x2, &(0x7f0000001840)={0x77359400}, &(0x7f0000001880)={[0x1]}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280), 0x254fc0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000080)=""/68, 0x44}], 0x1, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f00000002c0)=@hci={0x1f, 0x2}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000340)="481b1cf154319b4a96fc88c56f903fd010c3be72ee335fa44955dcf197dce7996f060c024fd34e7ea1d354b84c554a9cee2fe0d1fe965f94c668e0770256c4902ddec037cffcaa5ece59af805109c175ba9d4d7db44d4f2a1383b3", 0x5b}, {&(0x7f00000003c0)="21a3cf8cca00ed76d5d86c859c1619c6309b236e4b7d6638c8a31201f20655189b67b9595a529ae87e532822a339a0494baf05f801437aeb3470fc92907163bf521f74ea8ddce19a888fb055cb28e2902ad933a25ce61e115961b601ae61e853043b2050c315cdea6ed95a85d2657a84c30ea827b34f6edd51a2cc3e2a5784a1c7e54bb2b971", 0x86}], 0x2, &(0x7f0000000480)=[{0x88, 0x10c, 0x4, "8988343dd879f8efa199b6ee0a222033952b3ce295188158aa7f93caefc8e04d3e4bb3d37ec4c2347b3856bb6879885fd7d37c1644f6bb2d3bfad4ca894210a8765b1fb9d337239e4fb315adf7cd254aed505cce63b9438c52c6c55b3ff92df52352ee42a1449fbd5ec3c83cafd780ed49"}, {0x40, 0x109, 0x7f, "8f5ae0d33bced3e1a48b8987e970b944efcfc65c6eaabe99fe4e0d7dc51364c0c7c38968d498bebffc"}, {0xc8, 0x1, 0x7ff, "8b0196eb5698dbee7a403e02eca626d1ea5e08af8d418ef300bc3e214a6d81665eb91cf16e23746a4db085eaf07db02559d34d9cf7a09f7da7efc3815330093cb03e62691b35221729204f94c8a6db4269651b592a78365492b8f633a0145eb162080840b3b5825645d41affbeff3e5d11cf95087cddf23ab7f6f044201e49e9a5c2bb43125a189cdc6f7e646d4fa06b2430d394df16eec529f58c9785f4a6cd5750a3a130bb78d6352d3c66f638f4c8c2d099432a3188dc"}, {0x30, 0x1, 0x5, "ddebda9b462433517b800644acbb5e452c2ddf98a3a482315882fe61edd58b"}, {0x18, 0x111, 0x3, "e0ddfe"}, {0x38, 0x1, 0x35, "50f5a14a9fa495681dcaee91c32ee7913365a34ef86dd950c1ffd94b0adc0162e1d2797027bf6034"}, {0x58, 0x116, 0x2, "b8b8fecd9681c0046f157abf654ceca349d702bf4252a0c41a43d91df03a73864c314db69b72d365aec6947ae9726f09b233b82303eeaa097f435e3622e2d066427045d0"}, {0x1010, 0x88, 0xfff, "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"}, {0x10, 0x6, 0x7}, {0x80, 0x115, 0x8, "825730a91b03a0cad483981b0ac3efca29bbecb0beda1a5bbdd1c4c42682139b56ec0f9962ba31e68d00fdf66ffd839619bbd6421f35d68ae8123c5f810901b16d5af05efa7741e560d52120e01a4cc0252465fbe78e31951244684bc924beeff14a6e9917690eda30d0aa8104d37b"}], 0x1308}, 0x10) 08:31:24 executing program 4: unshare(0x48040200) unshare(0x2000500) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:25 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80086601, 0x0) 08:31:25 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:25 executing program 0: mmap(&(0x7f00003e3000/0x1000)=nil, 0x1000, 0x100000c, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000280)=""/246) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000004c0)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x2f, 0x7, 0x0, 0xf28, 0x40, @remote, @private1, 0x1, 0x700, 0x0, 0x3}}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='ns\x00') accept$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) renameat(r4, &(0x7f0000000100)='./cgroup\x00', r3, &(0x7f0000000140)='./cgroup\x00') ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r6 = socket(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="6000000024000b0f00"/20, @ANYRES32=r8, @ANYBLOB="0000ebffffffffff000000000a0001006e6574656d0000003000020000000000b00e00000000000009000000000000fc0000000014000600060000000000000000c89668908a46675300000000000000"], 0x60}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000340)={@loopback, 0x5, r8}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x94, 0x0, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5867b85bfc8cfd84}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x814}, 0x4) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:25 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:26 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_POST(r1, 0x5008, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000140)=0x2000000) ioctl$SNDCTL_DSP_SUBDIVIDE(r1, 0x5000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0), 0x8400, 0x0) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) r4 = syz_io_uring_complete(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0008001d00", @ANYRESHEX=r5]) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000140)={r4, r5}, 0xc) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:27 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:28 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:30 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:30 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:30 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:30 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x200884, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}, {@uname={'uname', 0x3d, ',\xfd\f+,:,'}}, {@access_user}, {@version_9p2000}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fowner_gt={'fowner>', r3}}, {@subj_type={'subj_type', 0x3d, '\xcb'}}, {@euid_gt={'euid>', r5}}, {@obj_role}]}}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r6, 0x40047454, 0x0) 08:31:31 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xf4, 0x0, 0x10, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xe0, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x91f8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x40}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x81}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x62db4232}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb0f}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x50b5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x72}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x444}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x345}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9b9}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x84084) unshare(0x48040200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x14) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) [ 1630.595236][T14922] debugfs: Directory 'ptm0' with parent 'caif_serial' already present! 08:31:33 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x801c581f, 0x0) 08:31:33 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:33 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:33 executing program 4: unshare(0x48040200) unshare(0x40000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:33 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6664364d499a1ef61c3d17c4bb18f0014d83145defe57f2cd8f91b67fd5b6cf029eb598b6388a968d35412566e369db8fa609b23d71f85513c2f1ab43b0b1dcfc2", @ANYRESHEX=r1]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xe) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:31:33 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:34 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:34 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:35 executing program 0: unshare(0x48040200) unshare(0x13020000) mmap(&(0x7f0000943000/0x12000)=nil, 0x12000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x101) fallocate(r1, 0x0, 0x400, 0x100000001) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:35 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80207450, 0x0) 08:31:35 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x16, 0x0, 0x0, 0x0, 0x0, 0xffffff83, 0x0, 0x0, 0x12, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080), 0x22600, 0x0) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f0000000280)=""/4096) 08:31:35 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:36 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:36 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:37 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:40 executing program 4: unshare(0x48040200) unshare(0x24000a00) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:40 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:40 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc0045878, 0x0) 08:31:40 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:41 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xcfe}], &(0x7f00000000c0)='syzkaller\x00', 0x800, 0x61, &(0x7f0000000280)=""/97, 0x40f00, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x8, 0xfffffe01, 0x5}, 0x10, 0x18086, r1}, 0x78) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:31:41 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:41 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=0x2f, 0x4) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x10000200) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) signalfd(r0, &(0x7f00000000c0)={[0x6]}, 0x8) r1 = syz_open_pts(r0, 0x20841) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x5, 0x80000000, 0x3db, 0x5, 0x5, "3a1352e53f2d904dea95937f1e5f0275811ec9"}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) r3 = socket(0x80000000000000a, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f0000003940)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000580)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfbc}}], 0x18}}], 0x2, 0x8001) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000280), 0x4) 08:31:41 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:41 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc0045878, 0x0) 08:31:41 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:43 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:43 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080), 0x101801, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2]) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0xffffffffffffffcf, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r3, 0x40047454, 0x0) 08:31:43 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc0046686, 0x0) 08:31:43 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:44 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140), 0x18500, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f00000003c0)={0xfac, {{0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, '\x00', 0x34}, 0xffffffff}}, {{0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}}}, 0x108) fcntl$setflags(r0, 0x2, 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) preadv(r3, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:44 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:46 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = syz_mount_image$hfsplus(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000280)="1839a48454457687f78a28e072b63ce746041d0d543e8007e0c60ea4d60c7e51680ba2e89518d4a282d77c74d8d156473a84a76609099d5bf464f5c2cf50aea80ad09645bb38ac936307318ccd4a763cd011ea7c2e78357dbf34a85430fa45557b1670f4805dde420e77c0398a8511eed47df736f57e04a84b39ba4d645ec4cc47e7056bd3ee046c", 0x88, 0x2}], 0x2000052, &(0x7f0000000340)={[{@nobarrier}, {@nobarrier}], [{@euid_gt={'euid>', 0xee00}}, {@fowner_lt={'fowner<', 0xee00}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/ptmx\x00'}}, {@euid_eq}, {@dont_hash}, {@appraise}, {@smackfsdef={'smackfsdef', 0x3d, 'Y/\\/&'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/ppp\x00'}}, {@dont_hash}]}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000440)=0x4) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) 08:31:46 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047454, 0x0) 08:31:46 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:46 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:46 executing program 0: r0 = syz_mount_image$efs(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x942b, 0x7, &(0x7f0000001680)=[{&(0x7f00000002c0)="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", 0x1000, 0x8}, {&(0x7f00000012c0)="77cca1bb1a", 0x5, 0xf4ef}, {&(0x7f0000001300)="da947ce6117bc5ec5f1b2e84499f6784168281f21a8770e64ec91560d29870c6e761e6758ff4e5c84d781a519a6108ba69247ae49b9f45fc22d49ba70350e78e741b4f8809cb5c3bee67833767f81844214dcb3123f5b007e411acb6501b330fcc83c260111da4869230fab8229c102898bd2ed2b4033365ca78f344e0bf4e61bc263dd192022f4752634d19a9ffda66766f7dee867f1eccafa1a60e8e6d8b7fbaaf7cba4c8677d6b7d305442c1792867e9394e66765c57290b8d732795fde9e088095e0ad0b208b62352091c10b891092f03950be94ba5e6f33724d998de41d408d3c92d3810706defb4d425fe8f8eedbefdce26f", 0xf5, 0x1bf}, {&(0x7f0000001400)="acd9d0f93e30cff646b9fbe8e1c8175ebb71437ff8613ee1b0b8f617", 0x1c, 0x1f}, {&(0x7f0000001440)="1b466d1919b0881a18ff939c344afc973ebf365d3c0f1de5f79a1ddb38e93856", 0x20, 0x400}, {&(0x7f0000001580)="c2409670d291cab540279499840f7b39e43cc5e40a217ec45622c50fa8f9d779e4163cc62301d2d89c11d44450266541aeee9df9b0c0961f90fb264a9869ccd941160f84cd424e91c96f986ce4d51e86964024133eab35a198970b728f9d1f7d797c3b965dd8786375c645d6e48f56460b4d6bda36c34c33fb998dcb7659cbad654c48d795aee79c4bf436a476c48da16ef8d631b13f9d5b1f6e3f11113f558539b5bca11d3e4665e4c1db662b0d8a35bf6f713e13ff78521f1eacf69419bf9d25c59f7d98bebcd62212", 0xca}, {&(0x7f0000001480)="ce3a99d416435f41c316785c7920fb6f41a009b082b4a42d95c83d164ef15908144e616dcbbeaaca1bd871d2ff9a3c579f94a8daa553be9d13d5d6616ca0b14ab71b2bedb8a2457b2d87afc709581aa069534766fd3b05343d708e2408cb70eaabfe9dad9890c7bd645e4c5ea1c0c6496858c273955c36648d1dfae6406c1cc0cf8a2bd3554c19ed055e00f01b3d169eda6271de70cf2b529f7b1c1e46ed3ab08848bf58bde99608fb5976d09db2f25634e52908", 0xb4, 0xfffffffffffffffb}], 0x80080, &(0x7f0000001740)={[{'\x00'}, {}, {'*:%&/#'}, {'/dev/ppp\x00'}, {'\x00'}, {'-\'\\/!)'}, {'\x00'}, {'\x00'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/ptmx\x00'}}, {@appraise}, {@smackfshat={'smackfshat', 0x3d, '/dev/ppp\x00'}}, {@dont_hash}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000017c0)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x3, 0x0, 0xfffffffffffffffb, 0xd8, 0x0, 0x7fffffff}, {0x8, 0x200, 0x1, 0x80, 0x55, 0x100}], ['\x00', '\x00', '\x00', '\x00']}) unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) [ 1645.776259][T16275] loop0: detected capacity change from 0 to 16383 [ 1645.856212][T16284] loop4: detected capacity change from 0 to 264192 [ 1645.901186][T16284] hfsplus: unable to parse mount options [ 1646.588511][T16290] loop4: detected capacity change from 0 to 264192 [ 1646.644288][T16290] hfsplus: unable to parse mount options 08:31:48 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) ioctl$TCFLSH(r0, 0x540b, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0x4, 0x81, 0x7f, 0x0, 0x7fff, 0x2480, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x4}, 0x8, 0x5, 0x4, 0x0, 0x0, 0x4, 0x80, 0x0, 0x60000000, 0x0, 0x1}, r2, 0xf, 0xffffffffffffffff, 0x8) write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "c8acf5771cbabff294966acbc8bd582ae625a9de32e588aea47c231f8508743d40c233f87ae728bd425040e4cdaaed5f23a1451fce996dc376830752ef4f2764783397a3e98a0151ca4f6ccb86f3a90ccc17d03bcf593807ee7ef005528db22f20e6ce7e4f54595f59a9ecdff238cb8257c762aac31ccb247a93bd6127b1e3273ae7e28f9e6ff60b9804f249442f472d4d81873ae14ed8adba89d1e81c4828afb92a37e25935cf4d8337dcde988e564ccae789cdb5a5bcc6927e7a7c302fb8b43e0b1127725eda5293e43de0d35e72514806bd75087a257df2fd4ce2210c2f7bd100951668f762898a46900c53"}, 0xf1) [ 1646.864950][T16275] loop0: detected capacity change from 0 to 16383 08:31:48 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:48 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:50 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc0085504, 0x0) 08:31:50 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) dup2(r1, r2) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:50 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:51 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:51 executing program 0: syz_mount_image$squashfs(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000002c0)="10a89ba7130a2e5d57405cbd9e0b8d41829fe30f6b55225363be6d935d34254d17af2316f6c0d251ed4f6cc02b9585a7dc3fa99d35de60e1f32d96e99f28084b8eabfd6f8b937ba20b4bd6b063f80b5964002b70101503ce9fe8adf1e3415eb4845dae7ed79d473e4b4fcd43953c019423915d3ec2b644ef342124c81f2e6278a55d25be9974f96ac49c62cefa14b8bd2d52ea0eb8", 0x95, 0x6}, {&(0x7f0000000380)="7080f34659b1448a402f4c639c2d9f6d8ca83af786999fd0148e6d49c335033eb6a359f4276b7a1e1fcd94fdf88110235deff734c9ed7424000ae8864a9efe76ee455ba43ea442f6e7559ff478445ccc8f2b45173c8b6d6e089829df51e84d1358efa16cd58c736d0580f0", 0x6b, 0x1f}, {&(0x7f0000000400)="6be6090747c554e679822e155fe486bac83267ec6886f58ba6ab256ace636963bda6d32ce266aa7d4f8bfc0550f253ea05299d4a5dfc27c93ab6a12c45d58c956888913ddba8544a2c361e2cfc7de610b764f047ad26b4de3111c71dc00e94fe2fa17cf46c124ed0870ba78b2c2b44fced9962faf0b50c78d55d2a2d406f95c4dcab1cdff92570c07433", 0x8a, 0x5}, {&(0x7f00000004c0)="c744797c", 0x4, 0x1f}], 0x4, &(0x7f0000000580)={[{'/dev/ppp\x00'}, {'\x00'}, {'/dev/ppp\x00'}, {}, {','}, {}, {}, {'./'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/ppp\x00'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) unshare(0x48040200) unshare(0x4000000) syz_emit_ethernet(0x46, &(0x7f0000000180)={@local, @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "b139ed", 0x10, 0x21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, "1a48d6", 0x0, "31846f"}}}}}}}, 0x0) unshare(0x100) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) [ 1650.875546][T16781] squashfs: Unknown parameter '/dev/ppp' [ 1651.909507][T16801] squashfs: Unknown parameter '/dev/ppp' 08:31:54 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x2) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:31:54 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:54 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000140)=0x1f) unshare(0x4020400) 08:31:55 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:31:55 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:56 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:56 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:31:57 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc0189436, 0x0) 08:31:57 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) madvise(&(0x7f0000616000/0x4000)=nil, 0x4000, 0xe) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:31:57 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080), 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000340)={@private0, 0x0}, &(0x7f0000000380)=0x14) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r5]) r6 = socket(0x80000000000000a, 0x2, 0x0) sendmmsg$inet6(r6, &(0x7f0000003940)=[{{&(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}, {{&(0x7f0000000580)={0xa, 0x4e21, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000880)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfbc}}], 0x18}}], 0x2, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000018c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001880)={&(0x7f0000000500)=@newtaction={0x1364, 0x30, 0x4, 0x70bd27, 0x25dfdbfd, {}, [{0x1a4, 0x1, [@m_csum={0x12c, 0x0, 0x0, 0x0, {{0x9}, {0x90, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x8f, 0x8, 0x8, 0x3, 0x79a}, 0xd}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0x7, 0x2, 0xfff, 0x4d4}, 0x72}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xc80, 0x3f80000, 0x7, 0x1, 0x6}, 0x6b}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x909f, 0xff, 0x0, 0x9, 0x93}, 0x56}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xd5, 0x7f, 0x1, 0x7ff, 0x9}, 0x16}}]}, {0x73, 0x6, "6c6d9e3c6098c0313258cf0bd6b69cd929f44ddb6ff9b0b4fef967e4b6d5c19197f224b4749d2f6cd43f9959dffdb00f5761479b94e5766cff3775a7f03d16a91b191f65fb077ea06d6c8d37f1e12d77a1ddb37a823e328f85d6eeb3aa5771af8c256bf98ac4678a5d86972ac18cc5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}, @m_skbedit={0x74, 0x12, 0x0, 0x0, {{0xc}, {0x44, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xe, 0xffff}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x8}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x5, 0xffff}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xffe0, 0x7}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0xc0000000}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x3}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x9, 0xb}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x1, 0xe}}]}, {0x6, 0x6, "68e5"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}, {0x158, 0x1, [@m_mpls={0xbc, 0x14, 0x0, 0x0, {{0x9}, {0x54, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x9, 0xfffffff9, 0x5, 0xf6, 0x6}, 0x4}}, @TCA_MPLS_TC={0x5, 0x6, 0x1}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x2, 0x1, 0x1, 0x8000, 0x500b}, 0x3}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x15}]}, {0x3f, 0x6, "8f278bbbd81203fc47fa956b911df642cc677314b929d9924980f02fe68992885b607813d855990cfc8aeaa5e213cf308e80f4be83821d880ac9fc"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0xe506694443cd77f5}}}}, @m_vlan={0x98, 0x18, 0x0, 0x0, {{0x9}, {0x5c, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x5, 0x4, 0x4, 0x9, 0x9bf}, 0x1}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xb8f}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x8000, 0x1, 0x3, 0x80000001, 0xfffffffa}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x7}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0x14, 0x6, "497eece4c0339d4a186d80c56c4eb1bc"}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}, {0x1054, 0x1, [@m_connmark={0x1050, 0x11, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x100, 0x6, 0x3, 0xffff07f9, 0xfffffc01}, 0xe}}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x1364}, 0x1, 0x0, 0x0, 0x200080b4}, 0x4000000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1b, 0x7, &(0x7f00000000c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x81}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x3}, @alu={0x7, 0x1, 0x0, 0x6, 0x9, 0xfffffffffffffffe, 0x4}, @map={0x18, 0xa, 0x1, 0x0, r2}], &(0x7f0000000140)='GPL\x00', 0xe6c, 0xb1, &(0x7f0000000280)=""/177, 0x40f00, 0x2e, '\x00', r3, 0xb, r4, 0x8, &(0x7f00000003c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0x0, 0x1, 0x3ff}, 0x10, 0x0, r5}, 0x78) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:31:57 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:31:58 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) [ 1657.359004][T17144] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 08:31:59 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x44000200) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) 08:31:59 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:00 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:32:02 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) 08:32:02 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0xc020660b, 0x0) 08:32:02 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1) 08:32:02 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:32:02 executing program 2: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "c051e0116eb2d8d1ccfa65b0737a3c25a216c80524b9d63caf1551e78584ce785c785e22822a05a5e1"}, 0x2d) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:32:03 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = dup(r1) recvmsg$unix(r2, &(0x7f0000000540)={&(0x7f0000000280)=@abs, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000300)=""/100, 0x64}, {&(0x7f0000000380)=""/243, 0xf3}], 0x2, &(0x7f0000000480)=[@rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}, 0x3040) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) recvmsg(r3, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000580)=""/99, 0x63}, {&(0x7f0000000600)=""/244, 0xf4}], 0x2, &(0x7f0000000740)=""/61, 0x3d}, 0x2) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) preadv(r4, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:32:03 executing program 4: unshare(0x60040a80) unshare(0x2040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) clone(0x100180, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200), &(0x7f0000000380)="02a03321a8c690181885b04ba69624909c1500dd0ec9448c7602be468917794ff3570bc35e4c383356611f47418b06b55e160939be72fd142993c97ae2a797fcc066470b44df9d7d386b9e7be7ab429cc8ac1a68a220817aa86b31788733278655f0e8b4") unshare(0x18020080) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x40080) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000280)=""/234) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000400)) 08:32:03 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1) 08:32:03 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:32:03 executing program 4: unshare(0x48040200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xa) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) 08:32:04 executing program 2: unshare(0x18040c40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) renameat(0xffffffffffffffff, &(0x7f0000000100)='./cgroup\x00', 0xffffffffffffffff, &(0x7f0000000140)='./cgroup\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) r4 = socket(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001980)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="6000000024000b0f00"/20, @ANYRES32=r6, @ANYBLOB="0000ebffffffffff000000000a0001006e6574656d0000003000020000000000b00e00000000000009000000000000fc0000000014000600060000000000000000c89668908a46675300000000000000"], 0x60}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000340)={@loopback, 0x5, r6}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000003c0)={0x8, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x50f5, 0x0, 0x0, 0x0, 0x8001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='syzkaller\x00', 0x80, 0xd5, &(0x7f0000000280)=""/213, 0x41100, 0x1, '\x00', r6, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x1, 0xe, 0xd73, 0x1f}, 0x10, r7}, 0x78) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) ioctl$PPPIOCSFLAGS1(r2, 0x40047454, 0x0) 08:32:04 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r2, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000000c0)={0x5, 0x0, &(0x7f0000000140)=[r1, r2, 0xffffffffffffffff]}, 0x3) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, 0x0) 08:32:04 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) unshare(0x40000000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000d00)={@private0, 0x0}, &(0x7f0000000d40)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r2, 0x4020744f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000280)=0xc) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1, 0x0, 0x1c, 0x94, 0x0, 0xff, 0x2000, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0xff}, 0x410, 0xaf, 0x8, 0x3, 0x4, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0xcef}, r3, 0xb, 0xffffffffffffffff, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0xb, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000280)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) getsockopt$inet6_buf(r4, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xf9) bind$inet(0xffffffffffffffff, &(0x7f0000000d80)={0x2, 0x4e23, @private=0xa010101}, 0x10) ioctl$BTRFS_IOC_DEV_REPLACE(r4, 0xca289435, &(0x7f00000002c0)={0x1, 0x10000, @status={[0x80, 0x9, 0x1000, 0x38, 0x1, 0x8]}, [0x0, 0x373, 0x6, 0xcf2e, 0x100000000, 0x6, 0x1, 0x3, 0x7ff, 0x7, 0x5, 0x6, 0xd9, 0x3, 0x1, 0x36d1, 0x20, 0x3, 0x36e, 0xffffffffffffffc1, 0x1, 0xdf, 0x2000000000000000, 0x6, 0x3, 0x6010e1ad, 0x2, 0x2, 0x3, 0xc0000000000000, 0x1f, 0x7, 0x3, 0x9, 0x1, 0x62d9, 0x1, 0x9, 0x80000000, 0x9, 0x1, 0x401, 0xffffffff, 0x16c, 0x8, 0x8, 0x0, 0x4, 0x1238, 0x41b4, 0x0, 0xf7fc, 0x5, 0x80000001, 0x3, 0x0, 0x4, 0x7, 0xfffffffffffffffd, 0x3f, 0x1, 0x20, 0x3, 0x3e]}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="6000000024000b0f00"/20, @ANYRES32, @ANYBLOB="0000ebffffffffff000000000a0001006e6574656d0000003000020000000000b00e00000000000009000000000000fc0000000014000600060000000000000000c89668908a46675300000000000000"], 0x60}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={@loopback, 0x5}) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000e00)={&(0x7f0000001040)={0x26a8, 0x0, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1234, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x75, 0x4, "5ac3291c0c855724a402c4783c48c64d6eca0ffa8bc05298d5bbc610a3421013c35b2b0f076528e583c01a9de79bc35345611b6ed1db1b710194b5de3c9137e68e84b14935c459e89609763946ceed1db2ec558299493195bb72576f878b75b38ffd825f60900fc2e24a1c9bd8a6d03c0d"}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0xb1, 0x4, "08333223e8a102af0498bd7cb66674c455d0b0dd7c2bedb0463a53ad9523853b72f42a4812edce20a0110628560e359745bcb3a2eb873b1f8a49913bbb04029965fa8f7ec3d17c173d8d2245da08122a066de978d4ba95780819cdcae56ae0b3cb62de0631bd24ed413401bf8c2eb084edc37edcde422b3b7481b4b131cbd9b76269bdab2b7d6ee40f4baa275d5f25f4a55af86fa0d8653b50e1d1cfd9c206f9e154ea65178a95733a76639213"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x60, 0x4, "6fc8ccaa0c533f41f85b45f235f88658806043099d5e14fecde4f1193196a5562b814d37c539ac0c6a06cdb94c306e22644e8565d4d7ee4097bc78121efac0bca1b2ee2857010430c1aecf4df325e75e5750a61ccaa53c06de6ab159"}, @ETHTOOL_A_BITSET_VALUE={0x8a, 0x4, "c1855c3f01bb7cfc52fb85e4e09c7cd2ed45070284ffa07df48b0b563aac04b1308a47f7f6cfc7b27eada09eecb9c6b2d980c5deaa54a8f25974307c252b92d925f0a616424419b624ca8386089a4d714659feb1e3f9fe6cd755a527ca685cdfb7413f6a928f14de08fc4bfe0498d80162cc35254ab89fccfff7189b1bf3aed4fdf0a3d97e0a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fffffff}]}, @ETHTOOL_A_FEATURES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0x104, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x24, 0x5, "caeee1014e4d914317a7938ce9a848c92b697a063735e5256d58e2a58c8a3e66"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x50, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\x81&#\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-\\:|*@:\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x6f, 0x5, "19c939b0c29f1909e08b8d44fbbb64200b8ffa18b00bc49af326bda1ac3f17cd4b631dd41ee179781dd86b07b21395136429040f4bf80699e209212ad61511f0aa831d8acdce431481dff09933b4b8f85c6491052c376d8cd61566aa92bd26184bf161dd3d010f40578e72"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x18, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x7, 0x5, "cba981"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x128, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5b, 0x5, "8f69b44f8bb9036598dfa8dcdd4c1d04742055159061a7cf493b9498b20a02b25235830e7d941499492c3264b23b29a1a020b0e610d1f5a41134905bc7fb12a453342d1e541ca427455ce02533de8dc224f7a4cb124f08"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x636f079e}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_MASK={0xaf, 0x5, "0e163ba841d90781c99d4c26ce8e6cbad06b1de8506e6a75eb749bf7b07558c587e7494955b76ff70f23dcfa7dd012326609b9654c3eb49f6683bd2f7569a8009d99ae8222ac9a5dfaac5f973da1f4a81c23b4656504e86012f54ee5472a2f6134857216f39b42a1f24c667fac2c3c12172269e71f7c2669883186a610362a65c144c8173ce93eb8c0ff397a3ba568b3fdc60090b01037aa46c9de933c4cdbd296a1e934b0265b483d6b33"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x1e4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_VALUE={0xa2, 0x4, "b7ece624ec7cfd1ca2f19406e9e3797f7477a1d6d72a2484e3600c19df013062693c0e0246fe32fb257256b52537dd9899a6fb6a5466b5fd46b895f27d62bc7331232dc0dc41584fabb31a0e4d1b11b08b18de2c22d9864733f594a61e01698558ddd350ab137e6f91da7916755db4621ff01fbaae3ce5db085e562e226eda70db39cc4f714757229b2749acddb17cce86c96e7bdc25d8b5160cfb5b2fb8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x9a, 0x5, "63c176b8cd6fc1907b018b1cd546cbdb6143830d2c95c09f127d259dd5f87e6be1622e4b1cf6c10f7ad2c9178e13818de22a50a102152dbc833008e0e8ce514adf5edf0b5fb257200ae8466bd47d3977065574169040cdcb55418b98f1dae0def6bf64acea2657075777ee9e6a470456dc0a962e57d6214a4c95dc72c9c0696abb33c8011bb6df244a50009a93abcbb6998468e3e28f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x85, 0x5, "f14bd3caf45dec06549c4c6f87ead598eb862ac1c5721e0eac9e39b376dff20b32b5d21ee288adbded89c4e76f52a7b0cf7f29548e5930f5934b67521a16e5c61f473560e786f255d507930cc802f46621d0dd66781809353404f46c4703ab5d2016d3418194ec1a306ec7f04cbc0d4c13be83df003127a0f82374b052ef157c25"}]}, @ETHTOOL_A_FEATURES_WANTED={0x100c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x26a8}, 0x1, 0x0, 0x0, 0x100}, 0x4) 08:32:04 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:32:04 executing program 5: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0x1) 08:32:06 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:06 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, 0x0) ioctl$PPPIOCSFLAGS1(r1, 0x4004743c, 0x0) 08:32:09 executing program 0: unshare(0x48040200) unshare(0x4010100) unshare(0x8050000) unshare(0x1a010300) unshare(0x4010000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) 08:32:09 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:09 executing program 2: unshare(0x48040200) openat$capi20(0xffffffffffffff9c, &(0x7f0000000140), 0x40000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) unshare(0x4000000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x40047454, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="66643d8b9c1bdd58cb9a61b24064cf2514fe10a92b99aa38d76e9c939f1fb789e4aaa6f1bcbe4d8ad8", @ANYRESHEX=r2]) ioctl$TIOCL_PASTESEL(r2, 0x541c, &(0x7f00000000c0)) unshare(0x4000000) 08:32:09 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x19) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) 08:32:09 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:32:09 executing program 4: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getroute={0x14, 0x1a, 0x800, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10000}, 0x8000) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, &(0x7f0000000280)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x4020744f, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x6) [ 1668.149199][ T1223] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.155555][ T1223] ieee802154 phy1 wpan1: encryption failed: -22 08:32:09 executing program 5: unshare(0x48040200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:10 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:10 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:32:11 executing program 0: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) unshare(0x10000000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) unshare(0x10000000) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) unshare(0x1e050000) unshare(0x6000000) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) unshare(0x80) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) unshare(0x40000300) 08:32:11 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) 08:32:12 executing program 1: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) r2 = syz_open_dev$swradio(&(0x7f0000000080), 0x0, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3]) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f00000000c0)={0x4, 0x2}) mmap(&(0x7f00007b8000/0x1000)=nil, 0x1000, 0x4, 0x12, r2, 0xb1a00000) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, 0x0) 08:32:12 executing program 3: unshare(0x48040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x4004743c, 0x0) 08:32:13 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xe) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000080)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x1) [ 1673.655043][T14184] ================================================================== [ 1673.663565][T14184] BUG: KASAN: use-after-free in icmpv6_sk_exit+0x228/0x240 [ 1673.670770][T14184] Read of size 8 at addr ffff88803c5ba180 by task kworker/u4:9/14184 [ 1673.678830][T14184] [ 1673.681147][T14184] CPU: 0 PID: 14184 Comm: kworker/u4:9 Not tainted 5.16.0-rc2-syzkaller #0 [ 1673.689726][T14184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1673.699779][T14184] Workqueue: netns cleanup_net [ 1673.704548][T14184] Call Trace: [ 1673.707816][T14184] [ 1673.710740][T14184] dump_stack_lvl+0xcd/0x134 [ 1673.715336][T14184] print_address_description.constprop.0.cold+0x8d/0x320 [ 1673.722390][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1673.727241][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1673.732089][T14184] kasan_report.cold+0x83/0xdf [ 1673.736859][T14184] ? lockdep_hardirqs_on+0x10/0x100 [ 1673.742176][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1673.747033][T14184] icmpv6_sk_exit+0x228/0x240 [ 1673.751712][T14184] ? icmpv6_getfrag+0x180/0x180 [ 1673.756651][T14184] ops_exit_list+0xb0/0x160 [ 1673.761175][T14184] cleanup_net+0x4ea/0xb00 [ 1673.765590][T14184] ? unregister_pernet_device+0x70/0x70 [ 1673.771144][T14184] process_one_work+0x9b2/0x1690 [ 1673.776082][T14184] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1673.781446][T14184] ? rwlock_bug.part.0+0x90/0x90 [ 1673.786376][T14184] ? _raw_spin_lock_irq+0x41/0x50 [ 1673.791400][T14184] worker_thread+0x658/0x11f0 [ 1673.796078][T14184] ? process_one_work+0x1690/0x1690 [ 1673.801266][T14184] kthread+0x405/0x4f0 [ 1673.805328][T14184] ? set_kthread_struct+0x130/0x130 [ 1673.810520][T14184] ret_from_fork+0x1f/0x30 [ 1673.814944][T14184] [ 1673.817947][T14184] [ 1673.820339][T14184] Allocated by task 16875: [ 1673.824731][T14184] kasan_save_stack+0x1e/0x50 [ 1673.829414][T14184] __kasan_slab_alloc+0x90/0xc0 [ 1673.834251][T14184] kmem_cache_alloc+0x202/0x3a0 [ 1673.839086][T14184] sk_prot_alloc+0x5f/0x290 [ 1673.843574][T14184] sk_alloc+0x30/0xa60 [ 1673.847634][T14184] inet6_create+0x36f/0x1030 [ 1673.852212][T14184] __sock_create+0x353/0x790 [ 1673.856793][T14184] inet_ctl_sock_create+0x88/0x1d0 [ 1673.861893][T14184] icmpv6_sk_init+0xfa/0x2d0 [ 1673.866475][T14184] ops_init+0xaf/0x470 [ 1673.870530][T14184] setup_net+0x40f/0xa30 [ 1673.874763][T14184] copy_net_ns+0x318/0x760 [ 1673.879166][T14184] create_new_namespaces+0x3f6/0xb20 [ 1673.884436][T14184] unshare_nsproxy_namespaces+0xc1/0x1f0 [ 1673.890072][T14184] ksys_unshare+0x445/0x920 [ 1673.894561][T14184] __x64_sys_unshare+0x2d/0x40 [ 1673.899310][T14184] do_syscall_64+0x35/0xb0 [ 1673.903716][T14184] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1673.909598][T14184] [ 1673.911914][T14184] Freed by task 14184: [ 1673.916133][T14184] kasan_save_stack+0x1e/0x50 [ 1673.920799][T14184] kasan_set_track+0x21/0x30 [ 1673.925381][T14184] kasan_set_free_info+0x20/0x30 [ 1673.930308][T14184] __kasan_slab_free+0xff/0x130 [ 1673.935165][T14184] slab_free_freelist_hook+0x8b/0x1c0 [ 1673.940627][T14184] kmem_cache_free+0xbd/0x5d0 [ 1673.945296][T14184] __sk_destruct+0x5a2/0x900 [ 1673.949872][T14184] sk_destruct+0xbd/0xe0 [ 1673.954101][T14184] __sk_free+0xef/0x3d0 [ 1673.958243][T14184] sk_common_release+0x292/0x390 [ 1673.963167][T14184] inet_release+0x12e/0x280 [ 1673.967760][T14184] inet6_release+0x4c/0x70 [ 1673.972269][T14184] sock_release+0x87/0x1b0 [ 1673.976673][T14184] icmpv6_sk_exit+0x14c/0x240 [ 1673.981337][T14184] ops_exit_list+0xb0/0x160 [ 1673.985824][T14184] cleanup_net+0x4ea/0xb00 [ 1673.990227][T14184] process_one_work+0x9b2/0x1690 [ 1673.995402][T14184] worker_thread+0x658/0x11f0 [ 1674.000072][T14184] kthread+0x405/0x4f0 [ 1674.004216][T14184] ret_from_fork+0x1f/0x30 [ 1674.008639][T14184] [ 1674.010947][T14184] The buggy address belongs to the object at ffff88803c5b9d00 [ 1674.010947][T14184] which belongs to the cache RAWv6 of size 1696 [ 1674.024548][T14184] The buggy address is located 1152 bytes inside of [ 1674.024548][T14184] 1696-byte region [ffff88803c5b9d00, ffff88803c5ba3a0) [ 1674.038004][T14184] The buggy address belongs to the page: [ 1674.043704][T14184] page:ffffea0000f16e00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88803c5bc140 pfn:0x3c5b8 [ 1674.055155][T14184] head:ffffea0000f16e00 order:3 compound_mapcount:0 compound_pincount:0 [ 1674.063470][T14184] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 1674.071447][T14184] raw: 00fff00000010200 ffffea0001f3fe08 ffffea000206be08 ffff8880220d4b40 [ 1674.080019][T14184] raw: ffff88803c5bc140 000000000011000e 00000001ffffffff 0000000000000000 [ 1674.088667][T14184] page dumped because: kasan: bad access detected [ 1674.095060][T14184] page_owner tracks the page as allocated [ 1674.100756][T14184] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 16649, ts 1650106194645, free_ts 1648797249943 [ 1674.121666][T14184] get_page_from_freelist+0xa72/0x2f50 [ 1674.127143][T14184] __alloc_pages+0x1b2/0x500 [ 1674.131719][T14184] alloc_pages+0x1a7/0x300 [ 1674.136123][T14184] new_slab+0x32d/0x4a0 [ 1674.140264][T14184] ___slab_alloc+0x918/0xfe0 [ 1674.144840][T14184] __slab_alloc.constprop.0+0x4d/0xa0 [ 1674.150286][T14184] kmem_cache_alloc+0x35c/0x3a0 [ 1674.155123][T14184] sk_prot_alloc+0x5f/0x290 [ 1674.159613][T14184] sk_alloc+0x30/0xa60 [ 1674.163692][T14184] inet6_create+0x36f/0x1030 [ 1674.168271][T14184] __sock_create+0x353/0x790 [ 1674.172850][T14184] inet_ctl_sock_create+0x88/0x1d0 [ 1674.177951][T14184] ndisc_net_init+0x7b/0x220 [ 1674.182531][T14184] ops_init+0xaf/0x470 [ 1674.186609][T14184] setup_net+0x40f/0xa30 [ 1674.190860][T14184] copy_net_ns+0x318/0x760 [ 1674.195265][T14184] page last free stack trace: [ 1674.199939][T14184] free_pcp_prepare+0x374/0x870 [ 1674.204787][T14184] free_unref_page+0x19/0x690 [ 1674.209451][T14184] qlist_free_all+0x5a/0xc0 [ 1674.213939][T14184] kasan_quarantine_reduce+0x180/0x200 [ 1674.219383][T14184] __kasan_slab_alloc+0xa2/0xc0 [ 1674.224327][T14184] kmem_cache_alloc_node+0x255/0x3f0 [ 1674.229600][T14184] copy_process+0x5c4/0x75a0 [ 1674.234179][T14184] kernel_clone+0xe7/0xab0 [ 1674.238581][T14184] kernel_thread+0xb5/0xf0 [ 1674.243002][T14184] call_usermodehelper_exec_work+0xcc/0x180 [ 1674.248884][T14184] process_one_work+0x9b2/0x1690 [ 1674.253809][T14184] worker_thread+0x658/0x11f0 [ 1674.258494][T14184] kthread+0x405/0x4f0 [ 1674.262550][T14184] ret_from_fork+0x1f/0x30 [ 1674.266960][T14184] [ 1674.269267][T14184] Memory state around the buggy address: [ 1674.274965][T14184] ffff88803c5ba080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1674.283011][T14184] ffff88803c5ba100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1674.291056][T14184] >ffff88803c5ba180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1674.299096][T14184] ^ [ 1674.303231][T14184] ffff88803c5ba200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1674.311362][T14184] ffff88803c5ba280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1674.319406][T14184] ================================================================== [ 1674.327446][T14184] Disabling lock debugging due to kernel taint [ 1674.404456][T14184] Kernel panic - not syncing: panic_on_warn set ... [ 1674.411265][T14184] CPU: 0 PID: 14184 Comm: kworker/u4:9 Tainted: G B 5.16.0-rc2-syzkaller #0 [ 1674.421235][T14184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1674.431303][T14184] Workqueue: netns cleanup_net [ 1674.436065][T14184] Call Trace: [ 1674.439327][T14184] [ 1674.442242][T14184] dump_stack_lvl+0xcd/0x134 [ 1674.446827][T14184] panic+0x2b0/0x6dd [ 1674.450716][T14184] ? __warn_printk+0xf3/0xf3 [ 1674.455300][T14184] ? preempt_schedule_common+0x59/0xc0 [ 1674.460840][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1674.465685][T14184] ? preempt_schedule_thunk+0x16/0x18 [ 1674.471050][T14184] ? trace_hardirqs_on+0x38/0x1c0 [ 1674.476197][T14184] ? trace_hardirqs_on+0x51/0x1c0 [ 1674.481225][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1674.486072][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1674.490916][T14184] end_report.cold+0x63/0x6f [ 1674.495500][T14184] kasan_report.cold+0x71/0xdf [ 1674.500256][T14184] ? lockdep_hardirqs_on+0x10/0x100 [ 1674.505445][T14184] ? icmpv6_sk_exit+0x228/0x240 [ 1674.510293][T14184] icmpv6_sk_exit+0x228/0x240 [ 1674.514965][T14184] ? icmpv6_getfrag+0x180/0x180 [ 1674.519893][T14184] ops_exit_list+0xb0/0x160 [ 1674.524390][T14184] cleanup_net+0x4ea/0xb00 [ 1674.528799][T14184] ? unregister_pernet_device+0x70/0x70 [ 1674.534343][T14184] process_one_work+0x9b2/0x1690 [ 1674.539275][T14184] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1674.544862][T14184] ? rwlock_bug.part.0+0x90/0x90 [ 1674.550420][T14184] ? _raw_spin_lock_irq+0x41/0x50 [ 1674.555653][T14184] worker_thread+0x658/0x11f0 [ 1674.560758][T14184] ? process_one_work+0x1690/0x1690 [ 1674.565987][T14184] kthread+0x405/0x4f0 [ 1674.570293][T14184] ? set_kthread_struct+0x130/0x130 [ 1674.575484][T14184] ret_from_fork+0x1f/0x30 [ 1674.579904][T14184] [ 1674.584025][T14184] Kernel Offset: disabled [ 1674.588550][T14184] Rebooting in 86400 seconds..