blkdev_ioctl+0x9ac/0x2010 [ 432.926046] ? blkpg_ioctl+0xc10/0xc10 [ 432.929941] ? lock_downgrade+0x900/0x900 [ 432.934105] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 432.939912] ? save_stack+0x43/0xd0 [ 432.939925] ? __kasan_slab_free+0x102/0x150 [ 432.939943] ? __fget+0x4d1/0x740 [ 432.939963] ? ksys_dup3+0x680/0x680 [ 432.939978] ? kasan_check_write+0x14/0x20 [ 432.939998] block_ioctl+0xee/0x130 [ 432.963010] ? blkdev_fallocate+0x400/0x400 [ 432.967344] do_vfs_ioctl+0x1de/0x1720 [ 432.971250] ? trace_hardirqs_on+0xbd/0x310 [ 432.975595] ? ioctl_preallocate+0x300/0x300 [ 432.980106] ? __fget_light+0x2e9/0x430 [ 432.984099] ? fget_raw+0x20/0x20 [ 432.987564] ? putname+0xf2/0x130 [ 432.991026] ? kmem_cache_free+0x21a/0x290 [ 432.995279] ? putname+0xf7/0x130 [ 432.998735] ? do_sys_open+0x3ac/0x700 [ 433.002632] ? security_file_ioctl+0x94/0xc0 [ 433.007053] ksys_ioctl+0xa9/0xd0 [ 433.007074] __x64_sys_ioctl+0x73/0xb0 [ 433.007093] do_syscall_64+0x1b9/0x820 [ 433.007110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.007127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.007148] ? trace_hardirqs_on_caller+0x310/0x310 [ 433.014472] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.014490] ? recalc_sigpending_tsk+0x180/0x180 [ 433.014505] ? kasan_check_write+0x14/0x20 [ 433.014526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.014546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.057745] RIP: 0033:0x4573e7 [ 433.060923] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.079811] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 433.087504] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 433.094762] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 433.102033] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 433.109309] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 433.116565] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 433.127341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.134127] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.141862] loop0: p1 [ 433.144950] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 433.155210] loop3: p1 20:55:59 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 433.155862] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.164563] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.189447] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.196711] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.203479] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.210289] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.217146] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.224001] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.230979] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.237886] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.244750] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.251828] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.258759] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.265559] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.272494] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.279362] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.286515] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.293417] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.300323] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.307126] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.314184] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.321064] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.327899] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.327927] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.341486] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.348361] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.355306] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 20:55:59 executing program 5: r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x5, 0x80) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)={0x1c00}) listen(r0, 0x3) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000080)='F', 0x79, 0x0, &(0x7f0000000540)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[], &(0x7f00000000c0)) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)='eth0eth0^GPL\\ppp0\x00', 0x12, 0x2) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, &(0x7f0000000600)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000004c0)) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev, [0xfe80000000000000, 0x300000000000000, 0x0, 0x0, 0x4000000]}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000168cf97660000000000000000000000000000000000000000000000000100"]) msgget(0xffffffffffffffff, 0x2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10400400}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)={0x8c, r3, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffff7fff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8e1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x50}, 0x4044800) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000500)={0x24, 0x8, 0x17, 0x14, 0x0, 0x1, 0x4, 0x1e, 0xa5617672a524600}) 20:55:59 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000300)) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000880)=ANY=[@ANYRES64=r2, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES64, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYRES16=r0, @ANYRES64, @ANYPTR64], @ANYBLOB="357e9dc9e335f992e4d4686a60845f47ea167633570caa47cd6f619101029338d2a23e4e92879d429aac61a82184aca0a5a2e0d7af86e41dcf6f2d3350d667db7b5f64c8ec01ab7dd5fe2621623bce246cd3cd6cd7e5043997cd5f95c2140a391ebc956be540be7872712b345ece1d9e7206f74b73a37009c5cb40672ba5bceff5945067551121d1028bc08eeba4590e3f14a907f00e3ee9f2d7260ee2f280d2c850270dba7b7277b9271822ce9dcfc63fe65d1c1d6a01ef59947b37c14616743b1617828451d522aefdca05e6b47c2aa0fba7bb56a569cec64e1a20ff0f9a3469f84e6dd50d99", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES32, @ANYRESDEC=r0, @ANYRESHEX=r0]], @ANYRES64=r2, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES64=r3, @ANYPTR64=&(0x7f0000000900)=ANY=[@ANYPTR64, @ANYRESDEC=r4, @ANYRESDEC=r3, @ANYPTR64, @ANYBLOB="33b63953517fe11a124854a92323d60a103a3f6377b134e787eaf931736b68cfc2f7b8254f4bebfb086fe6275025dc617d8c63452967be945140c9b50c4f3988d0d9ddd1dbeef3d8c04fe0056d3602e3a00691ca457184e79530527283b15bd8048161fe3e671939ef3d3e87f8d4359b0f7b34bff97be6f2b1c2621aabbd024ec32bfddd55f72a0ccab00864d7515a431e7a4f95e76bb77e4d98b6ae1cbd5fa94cc2aa779c6a8fbefd66979d781a4352a8c41978e013324d1d830b226928dadbdc787d032e0018cf2c358b25319b8ca7a040503dfa", @ANYRESOCT=r3], @ANYRES64=r4], @ANYRES64=r0, @ANYRESHEX=r1, @ANYRESOCT=r3], &(0x7f0000000140)=0x7) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0xa8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000480)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x7}, {0xa, 0x4e23, 0x3f, @local}, 0xffffffffffffffff, 0xffff}}, 0x48) write$uinput_user_dev(r4, &(0x7f0000000e00)={'syz0\x00', {0xffffffff, 0x100, 0x11d}, 0x1f, [0x6, 0x0, 0x2, 0x393d, 0x39973791, 0x4, 0x7ae, 0x0, 0x2, 0x8, 0x100000001, 0xfffffffffffffffb, 0x0, 0x9, 0x0, 0x0, 0x8001, 0xc12a, 0x7ff, 0x5, 0x0, 0x7, 0x3, 0x0, 0x6a1d8cf5, 0x0, 0x2ff78af2, 0x0, 0x3, 0x101, 0x4, 0x3, 0x0, 0x4, 0x9, 0x4, 0x4, 0x9, 0x100000000, 0x2, 0x8000, 0x1, 0xa83e, 0x6, 0x800, 0x1000, 0xd2b6, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x6, 0x7, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0xba0000000, 0x10001, 0x0, 0x20000000000000], [0x1, 0x401, 0x0, 0x9, 0xc5, 0x9, 0x0, 0x8, 0x101, 0x3f7, 0x0, 0x0, 0x6, 0x439f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x8c4a, 0x9, 0x80, 0x0, 0x7, 0x0, 0x57, 0x100000001, 0x6, 0x0, 0x8f3b, 0x9, 0x4c8, 0x3, 0x200, 0x4c5d, 0x4, 0x7, 0xedb, 0x9, 0x7, 0x72, 0x8, 0x5, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x4, 0xfffffffffffffff9, 0x0, 0x7, 0xbd, 0x1f, 0x0, 0x901e, 0x60, 0x7f, 0x5a, 0x0, 0x8, 0x9], [0x0, 0x3, 0x0, 0xfff, 0x7fff, 0x5, 0xa2a0, 0x9, 0x4, 0xfffffffffffff571, 0x80000000, 0x8001, 0x4, 0x2, 0x1f, 0xfffffffffffffffa, 0x0, 0x6, 0x401, 0x5, 0x1000, 0x0, 0x82, 0x8fb6, 0x7, 0x7, 0x5, 0x81, 0xfffffffffffff801, 0xa7, 0x81, 0x6da, 0x7, 0x10000, 0x3, 0x64, 0x0, 0xcd81, 0x0, 0x4, 0x93e8, 0x6, 0x10001, 0x3, 0x1, 0x2, 0x0, 0x0, 0x2cab, 0xc0, 0x84e9, 0x70000000, 0xffff, 0x7, 0x0, 0x0, 0x3f0000000000000, 0x0, 0x3cab, 0x5, 0x3b2, 0x3, 0x20, 0x8], [0x6, 0x0, 0x6, 0x9, 0x0, 0x0, 0x3, 0x8, 0x1e99, 0x9, 0x40, 0x2, 0x6, 0x3, 0x0, 0x0, 0x9, 0x7f, 0x20, 0xfffffffffffffffb, 0x401, 0x0, 0x0, 0x8, 0x3, 0x3, 0x20, 0x7, 0x7, 0x0, 0x1000, 0x8, 0x5, 0x8000, 0x2, 0x8001, 0x401, 0x4, 0x80, 0x1, 0x8, 0x8, 0x100000001, 0x9, 0x20, 0x62, 0x3, 0x2, 0x0, 0x71c, 0x1000, 0x9, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001, 0xcc, 0x0, 0xa140, 0xffffffff, 0x7, 0x1ff]}, 0x45c) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000680)={0x2, {{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x18}, 0x1}}}, 0x88) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x9, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000640)=0x20) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f0000000500)='./bus\x00', &(0x7f00000005c0)='9p\x00', 0x0, &(0x7f0000000600)={'trans=rdma,', {'port'}, 0x2c, {[{@common=@mmap='mmap'}]}}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}) sendfile(r4, r4, &(0x7f00000000c0), 0x8080fffffffe) [ 433.362222] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 433.371908] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 20:55:59 executing program 4 (fault-call:3 fault-nth:12): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:55:59 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) 20:55:59 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 433.487641] loop0: p1 [ 433.505054] FAULT_INJECTION: forcing a failure. [ 433.505054] name failslab, interval 1, probability 0, space 0, times 0 [ 433.517543] CPU: 0 PID: 19459 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 433.524923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.534294] Call Trace: [ 433.536894] dump_stack+0x1c4/0x2b4 [ 433.540546] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.545761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.551322] ? replace_slot+0x151/0x520 [ 433.555319] should_fail.cold.4+0xa/0x17 [ 433.559390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.564504] ? lock_release+0x970/0x970 [ 433.568488] ? arch_local_save_flags+0x40/0x40 [ 433.573094] ? __mutex_lock+0x85e/0x1700 [ 433.577165] ? kernfs_activate+0x8e/0x2c0 [ 433.581340] ? fs_reclaim_acquire+0x20/0x20 [ 433.585669] ? lock_downgrade+0x900/0x900 [ 433.589817] ? __mutex_lock+0x85e/0x1700 [ 433.593886] ? ___might_sleep+0x1ed/0x300 [ 433.598034] ? arch_local_save_flags+0x40/0x40 [ 433.602615] ? kernfs_activate+0x21a/0x2c0 [ 433.606854] __should_failslab+0x124/0x180 [ 433.611089] should_failslab+0x9/0x14 [ 433.614892] kmem_cache_alloc+0x2be/0x730 [ 433.619040] ? lock_downgrade+0x900/0x900 [ 433.623188] ? do_raw_spin_lock+0xc1/0x200 [ 433.627424] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.632444] __kernfs_new_node+0x127/0x8d0 [ 433.636679] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 433.641430] ? kasan_check_write+0x14/0x20 [ 433.645670] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 433.650598] ? wait_for_completion+0x8a0/0x8a0 [ 433.655185] ? wait_for_completion+0x8a0/0x8a0 [ 433.659769] ? kasan_check_write+0x14/0x20 [ 433.664004] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 433.668941] ? mutex_unlock+0xd/0x10 [ 433.672656] ? kernfs_activate+0x21a/0x2c0 [ 433.676895] ? kernfs_walk_and_get_ns+0x340/0x340 [ 433.681738] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 433.687281] ? kernfs_link_sibling+0x1d2/0x3b0 [ 433.691874] kernfs_new_node+0x95/0x120 [ 433.695855] __kernfs_create_file+0x5a/0x340 [ 433.700274] sysfs_add_file_mode_ns+0x222/0x530 [ 433.704958] internal_create_group+0x3df/0xd80 [ 433.709557] ? remove_files.isra.1+0x190/0x190 [ 433.714136] ? up_write+0x7b/0x220 [ 433.717673] ? up_read+0x110/0x110 [ 433.721212] ? down_read+0x1d0/0x1d0 [ 433.724924] ? kasan_check_write+0x14/0x20 [ 433.729166] sysfs_create_group+0x1f/0x30 [ 433.733320] lo_ioctl+0x1310/0x1d80 [ 433.736954] ? lo_rw_aio_complete+0x470/0x470 [ 433.741459] blkdev_ioctl+0x9ac/0x2010 [ 433.745346] ? blkpg_ioctl+0xc10/0xc10 [ 433.749232] ? lock_downgrade+0x900/0x900 [ 433.753397] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 433.759199] ? save_stack+0x43/0xd0 [ 433.762821] ? __kasan_slab_free+0x102/0x150 [ 433.767234] ? __fget+0x4d1/0x740 [ 433.770695] ? ksys_dup3+0x680/0x680 [ 433.774409] ? kasan_check_write+0x14/0x20 [ 433.778651] block_ioctl+0xee/0x130 [ 433.782293] ? blkdev_fallocate+0x400/0x400 [ 433.786614] do_vfs_ioctl+0x1de/0x1720 [ 433.790502] ? trace_hardirqs_on+0xbd/0x310 [ 433.794828] ? ioctl_preallocate+0x300/0x300 [ 433.799234] ? __fget_light+0x2e9/0x430 [ 433.803215] ? fget_raw+0x20/0x20 [ 433.806668] ? putname+0xf2/0x130 [ 433.810125] ? kmem_cache_free+0x21a/0x290 [ 433.814381] ? putname+0xf7/0x130 [ 433.817836] ? do_sys_open+0x3ac/0x700 [ 433.821742] ? security_file_ioctl+0x94/0xc0 [ 433.826154] ksys_ioctl+0xa9/0xd0 [ 433.829611] __x64_sys_ioctl+0x73/0xb0 [ 433.833503] do_syscall_64+0x1b9/0x820 [ 433.837405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 433.842789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.847750] ? trace_hardirqs_on_caller+0x310/0x310 [ 433.852764] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 433.857780] ? recalc_sigpending_tsk+0x180/0x180 [ 433.862534] ? kasan_check_write+0x14/0x20 [ 433.866771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.871620] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.876805] RIP: 0033:0x4573e7 [ 433.880002] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 433.898914] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 433.906625] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 433.913893] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 433.921155] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 433.928417] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:55:59 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) [ 433.935680] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 433.946046] loop3: p1 [ 433.954799] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:55:59 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:55:59 executing program 4 (fault-call:3 fault-nth:13): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 434.058309] loop3: p1 20:56:00 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 434.179070] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 434.198575] print_req_error: I/O error, dev loop3, sector 1 [ 434.205037] print_req_error: I/O error, dev loop3, sector 1 [ 434.206204] FAULT_INJECTION: forcing a failure. [ 434.206204] name failslab, interval 1, probability 0, space 0, times 0 [ 434.210932] Buffer I/O error on dev loop3p1, logical block 0, async page read 20:56:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000"], 0x12) [ 434.236195] loop0: p1 [ 434.250121] print_req_error: I/O error, dev loop3, sector 2 [ 434.256050] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 434.264511] print_req_error: I/O error, dev loop3, sector 3 [ 434.270584] Buffer I/O error on dev loop3p1, logical block 2, async page read [ 434.283527] print_req_error: I/O error, dev loop3, sector 4 [ 434.289797] Buffer I/O error on dev loop3p1, logical block 3, async page read [ 434.297581] print_req_error: I/O error, dev loop3, sector 5 [ 434.303365] Buffer I/O error on dev loop3p1, logical block 4, async page read [ 434.311003] print_req_error: I/O error, dev loop3, sector 6 [ 434.316864] Buffer I/O error on dev loop3p1, logical block 5, async page read [ 434.324605] CPU: 0 PID: 19478 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 434.331974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.331981] Call Trace: [ 434.332005] dump_stack+0x1c4/0x2b4 [ 434.332026] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.332044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.332059] ? replace_slot+0x151/0x520 [ 434.332082] should_fail.cold.4+0xa/0x17 [ 434.332101] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.332116] ? error_exit+0xb/0x20 [ 434.332138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.341976] print_req_error: I/O error, dev loop3, sector 7 [ 434.344077] ? error_exit+0xb/0x20 [ 434.344104] ? lock_release+0x19b/0x970 [ 434.344124] ? fs_reclaim_acquire+0x20/0x20 [ 434.347792] Buffer I/O error on dev loop3p1, logical block 6, async page read [ 434.352916] ? lock_downgrade+0x900/0x900 [ 434.352937] ? ___might_sleep+0x1ed/0x300 [ 434.352955] ? arch_local_save_flags+0x40/0x40 [ 434.352970] ? kernfs_activate+0x21a/0x2c0 [ 434.352994] __should_failslab+0x124/0x180 [ 434.358847] print_req_error: I/O error, dev loop3, sector 8 [ 434.362491] should_failslab+0x9/0x14 [ 434.362509] kmem_cache_alloc+0x2be/0x730 [ 434.362524] ? lock_downgrade+0x900/0x900 [ 434.362544] ? do_raw_spin_lock+0xc1/0x200 [ 434.366655] Buffer I/O error on dev loop3p1, logical block 7, async page read [ 434.371687] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 434.371706] __kernfs_new_node+0x127/0x8d0 [ 434.371725] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 434.371742] ? kasan_check_write+0x14/0x20 [ 434.375588] print_req_error: I/O error, dev loop3, sector 1 [ 434.380118] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 434.380135] ? wait_for_completion+0x8a0/0x8a0 [ 434.380154] ? wait_for_completion+0x8a0/0x8a0 [ 434.380169] ? kasan_check_write+0x14/0x20 [ 434.380189] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 434.385947] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 434.389421] ? mutex_unlock+0xd/0x10 [ 434.389436] ? kernfs_activate+0x21a/0x2c0 [ 434.389454] ? kernfs_walk_and_get_ns+0x340/0x340 [ 434.389470] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 434.389488] ? kernfs_link_sibling+0x1d2/0x3b0 [ 434.393742] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 434.397766] kernfs_new_node+0x95/0x120 [ 434.397787] __kernfs_create_file+0x5a/0x340 [ 434.397808] sysfs_add_file_mode_ns+0x222/0x530 [ 434.397832] internal_create_group+0x3df/0xd80 [ 434.422183] ? remove_files.isra.1+0x190/0x190 [ 434.422198] ? up_write+0x7b/0x220 [ 434.422213] ? up_read+0x110/0x110 [ 434.422228] ? down_read+0x1d0/0x1d0 [ 434.422243] ? kasan_check_write+0x14/0x20 [ 434.422276] sysfs_create_group+0x1f/0x30 [ 434.581418] lo_ioctl+0x1310/0x1d80 [ 434.585057] ? lo_rw_aio_complete+0x470/0x470 [ 434.589560] blkdev_ioctl+0x9ac/0x2010 [ 434.593453] ? blkpg_ioctl+0xc10/0xc10 [ 434.597341] ? lock_downgrade+0x900/0x900 [ 434.601513] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 434.607332] ? save_stack+0x43/0xd0 [ 434.610956] ? __kasan_slab_free+0x102/0x150 [ 434.615368] ? __fget+0x4d1/0x740 [ 434.618829] ? ksys_dup3+0x680/0x680 [ 434.622544] ? kasan_check_write+0x14/0x20 [ 434.626787] block_ioctl+0xee/0x130 [ 434.630417] ? blkdev_fallocate+0x400/0x400 [ 434.634742] do_vfs_ioctl+0x1de/0x1720 [ 434.638632] ? trace_hardirqs_on+0xbd/0x310 [ 434.642957] ? ioctl_preallocate+0x300/0x300 [ 434.647367] ? __fget_light+0x2e9/0x430 [ 434.651344] ? fget_raw+0x20/0x20 [ 434.654797] ? putname+0xf2/0x130 [ 434.658255] ? kmem_cache_free+0x21a/0x290 [ 434.662506] ? putname+0xf7/0x130 [ 434.665965] ? do_sys_open+0x3ac/0x700 [ 434.669916] ? security_file_ioctl+0x94/0xc0 [ 434.674332] ksys_ioctl+0xa9/0xd0 [ 434.677791] __x64_sys_ioctl+0x73/0xb0 [ 434.681681] do_syscall_64+0x1b9/0x820 [ 434.685572] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 434.690939] ? syscall_return_slowpath+0x5e0/0x5e0 [ 434.695874] ? trace_hardirqs_on_caller+0x310/0x310 [ 434.700895] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 434.705911] ? recalc_sigpending_tsk+0x180/0x180 [ 434.710668] ? kasan_check_write+0x14/0x20 [ 434.714906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.719756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.724945] RIP: 0033:0x4573e7 [ 434.728648] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.747548] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 434.755284] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 434.762558] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 434.769822] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 434.777088] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 434.784353] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 434.800894] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000"], 0xc) 20:56:00 executing program 4 (fault-call:3 fault-nth:14): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 434.838635] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r1) socket(0x10, 0x3, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x1, 0x1, &(0x7f0000000040)=""/12, &(0x7f0000000080)=""/250, &(0x7f00000001c0)=""/105, 0x6004}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) 20:56:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000"], 0x15) 20:56:00 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xebffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 434.928723] loop0: p1 [ 434.984776] FAULT_INJECTION: forcing a failure. [ 434.984776] name failslab, interval 1, probability 0, space 0, times 0 [ 434.996243] CPU: 0 PID: 19504 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 435.003635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.012989] Call Trace: [ 435.015593] dump_stack+0x1c4/0x2b4 [ 435.015629] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.015661] ? mark_held_locks+0x130/0x130 [ 435.015687] should_fail.cold.4+0xa/0x17 [ 435.024485] ? __kernel_text_address+0xd/0x40 [ 435.024506] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.024522] ? __save_stack_trace+0x8d/0xf0 [ 435.024545] ? save_stack+0xa9/0xd0 [ 435.024562] ? save_stack+0x43/0xd0 [ 435.053976] ? kasan_kmalloc+0xc7/0xe0 [ 435.057878] ? kasan_slab_alloc+0x12/0x20 [ 435.062040] ? kmem_cache_alloc+0x12e/0x730 [ 435.066379] ? radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 435.072294] ? idr_get_free+0x725/0xec0 [ 435.076295] ? idr_alloc_u32+0x201/0x3f0 [ 435.080366] ? idr_alloc_cyclic+0x166/0x350 [ 435.084696] ? __kernfs_new_node+0x1ee/0x8d0 [ 435.089113] ? kernfs_new_node+0x95/0x120 [ 435.093279] ? kernfs_create_dir_ns+0x4d/0x160 [ 435.097878] ? sysfs_create_group+0x1f/0x30 [ 435.102215] ? mark_held_locks+0x130/0x130 [ 435.106459] ? __x64_sys_ioctl+0x73/0xb0 [ 435.110535] ? do_syscall_64+0x1b9/0x820 [ 435.114607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.119984] ? __update_load_avg_blocked_se+0x730/0x730 [ 435.125367] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 435.130395] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 435.135170] __should_failslab+0x124/0x180 [ 435.139416] should_failslab+0x9/0x14 [ 435.143232] kmem_cache_alloc+0x47/0x730 [ 435.147316] ? plist_requeue+0x620/0x620 [ 435.151386] ? kasan_check_read+0x11/0x20 [ 435.155547] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 435.160843] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 435.166571] idr_get_free+0x725/0xec0 [ 435.170392] ? ida_pre_get+0x130/0x130 [ 435.174314] ? save_stack+0xa9/0xd0 [ 435.177951] ? save_stack+0x43/0xd0 [ 435.181586] ? kasan_kmalloc+0xc7/0xe0 [ 435.185481] ? kasan_slab_alloc+0x12/0x20 [ 435.189637] ? kmem_cache_alloc+0x12e/0x730 [ 435.193962] ? __kernfs_new_node+0x127/0x8d0 [ 435.198379] ? kernfs_new_node+0x95/0x120 [ 435.202534] ? __kernfs_create_file+0x5a/0x340 [ 435.207129] ? sysfs_add_file_mode_ns+0x222/0x530 [ 435.211981] ? internal_create_group+0x3df/0xd80 [ 435.216746] ? sysfs_create_group+0x1f/0x30 [ 435.221076] ? lo_ioctl+0x1310/0x1d80 [ 435.224886] ? blkdev_ioctl+0x9ac/0x2010 [ 435.228956] ? block_ioctl+0xee/0x130 [ 435.232764] ? do_vfs_ioctl+0x1de/0x1720 [ 435.236839] ? ksys_ioctl+0xa9/0xd0 [ 435.240476] ? __x64_sys_ioctl+0x73/0xb0 [ 435.244549] ? do_syscall_64+0x1b9/0x820 [ 435.248622] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.253998] ? __mutex_lock+0x85e/0x1700 [ 435.258127] ? kernfs_activate+0x8e/0x2c0 [ 435.262306] idr_alloc_u32+0x201/0x3f0 [ 435.266211] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 435.271065] ? lock_acquire+0x1ed/0x520 [ 435.275047] ? __kernfs_new_node+0x14e/0x8d0 [ 435.279464] ? __kernfs_new_node+0x127/0x8d0 [ 435.283886] idr_alloc_cyclic+0x166/0x350 [ 435.288047] ? idr_alloc+0x1b0/0x1b0 [ 435.291771] ? kasan_check_write+0x14/0x20 [ 435.296023] ? do_raw_spin_lock+0xc1/0x200 [ 435.300278] __kernfs_new_node+0x1ee/0x8d0 [ 435.304538] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 435.309313] ? kasan_check_write+0x14/0x20 [ 435.313565] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 435.318505] ? wait_for_completion+0x8a0/0x8a0 [ 435.323097] ? wait_for_completion+0x8a0/0x8a0 [ 435.327690] ? kasan_check_write+0x14/0x20 [ 435.331937] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 435.336883] ? mutex_unlock+0xd/0x10 [ 435.340608] ? kernfs_activate+0x21a/0x2c0 [ 435.344853] ? kernfs_walk_and_get_ns+0x340/0x340 [ 435.349704] ? kernfs_link_sibling+0x1d2/0x3b0 [ 435.354314] kernfs_new_node+0x95/0x120 [ 435.358321] __kernfs_create_file+0x5a/0x340 [ 435.362742] sysfs_add_file_mode_ns+0x222/0x530 [ 435.367432] internal_create_group+0x3df/0xd80 [ 435.372031] ? remove_files.isra.1+0x190/0x190 [ 435.376619] ? up_write+0x7b/0x220 [ 435.380172] ? up_read+0x110/0x110 [ 435.383727] ? down_read+0x1d0/0x1d0 [ 435.387446] ? kasan_check_write+0x14/0x20 [ 435.391697] sysfs_create_group+0x1f/0x30 [ 435.395860] lo_ioctl+0x1310/0x1d80 [ 435.399507] ? lo_rw_aio_complete+0x470/0x470 [ 435.404012] blkdev_ioctl+0x9ac/0x2010 [ 435.407911] ? blkpg_ioctl+0xc10/0xc10 [ 435.411807] ? lock_downgrade+0x900/0x900 [ 435.415972] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 435.421785] ? save_stack+0x43/0xd0 [ 435.425422] ? __kasan_slab_free+0x102/0x150 [ 435.429842] ? __fget+0x4d1/0x740 [ 435.433316] ? ksys_dup3+0x680/0x680 [ 435.437043] ? kasan_check_write+0x14/0x20 [ 435.441308] block_ioctl+0xee/0x130 [ 435.444942] ? blkdev_fallocate+0x400/0x400 [ 435.449299] do_vfs_ioctl+0x1de/0x1720 [ 435.453202] ? trace_hardirqs_on+0xbd/0x310 [ 435.457621] ? ioctl_preallocate+0x300/0x300 [ 435.462041] ? __fget_light+0x2e9/0x430 [ 435.466023] ? fget_raw+0x20/0x20 [ 435.469487] ? putname+0xf2/0x130 [ 435.472954] ? kmem_cache_free+0x21a/0x290 [ 435.477198] ? putname+0xf7/0x130 [ 435.480663] ? do_sys_open+0x3ac/0x700 [ 435.484566] ? security_file_ioctl+0x94/0xc0 [ 435.488988] ksys_ioctl+0xa9/0xd0 [ 435.492450] __x64_sys_ioctl+0x73/0xb0 [ 435.496351] do_syscall_64+0x1b9/0x820 [ 435.500458] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 435.505829] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.510773] ? trace_hardirqs_on_caller+0x310/0x310 [ 435.515800] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 435.520831] ? recalc_sigpending_tsk+0x180/0x180 [ 435.525600] ? kasan_check_write+0x14/0x20 [ 435.529850] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.534707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.539993] RIP: 0033:0x4573e7 [ 435.543192] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 435.562111] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 435.569837] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 435.577111] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 435.584388] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 435.591665] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 435.598937] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 435.608258] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:01 executing program 4 (fault-call:3 fault-nth:15): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x7b, 0x0, [0x48]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='/dev/kvm\x00', &(0x7f00000000c0)='/dev/kvm\x00'], &(0x7f0000000340)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)=',\x00', &(0x7f0000000240)='%&\x00', &(0x7f0000000280)='*vmnet0md5sum\x00', &(0x7f00000002c0)='*\x00', &(0x7f0000000300)='/dev/kvm\x00']) 20:56:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xd43f58e118afee75}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00142c00fe8000000000000000000000000000aafe8000000000000000000000000000aa21000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000dc62cd58074d9ae147244ccd05512cd42f10de504f322079a638c95c49b7c036e6f6c4ca888ca8aac77420c1b79707f8316aded36f27c67bfe9d728d0b789c9002afb34ff2122a89760801f867ce2b4731b5b2d4a642959853062b89a4510b9a1b23c0c0f1603148c95f1beea595c9cdb44aafae6305092a8445e429518dc724758d2ad61d595985000000000000000000000000000000"], &(0x7f0000000100)={0x0, 0x2, [0x0, 0xad4, 0xfffffffffffffffe]}) 20:56:01 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000"], 0x17) [ 435.737114] loop3: p1 [ 435.802034] FAULT_INJECTION: forcing a failure. [ 435.802034] name failslab, interval 1, probability 0, space 0, times 0 [ 435.817315] loop0: p1 [ 435.824546] CPU: 1 PID: 19565 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 435.831930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.831936] Call Trace: [ 435.831962] dump_stack+0x1c4/0x2b4 [ 435.831989] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.852821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.852836] ? replace_slot+0x151/0x520 [ 435.852858] should_fail.cold.4+0xa/0x17 [ 435.866404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 435.869185] dccp_invalid_packet: P.Data Offset(80) too large [ 435.871519] ? lock_release+0x970/0x970 [ 435.871537] ? arch_local_save_flags+0x40/0x40 [ 435.871566] ? __mutex_lock+0x85e/0x1700 [ 435.881317] ? kernfs_activate+0x8e/0x2c0 [ 435.881341] ? fs_reclaim_acquire+0x20/0x20 [ 435.881360] ? lock_downgrade+0x900/0x900 20:56:01 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 435.889977] ? __mutex_lock+0x85e/0x1700 [ 435.889998] ? ___might_sleep+0x1ed/0x300 [ 435.890017] ? arch_local_save_flags+0x40/0x40 [ 435.898466] ? kernfs_activate+0x21a/0x2c0 [ 435.898492] __should_failslab+0x124/0x180 [ 435.906684] should_failslab+0x9/0x14 [ 435.906701] kmem_cache_alloc+0x2be/0x730 [ 435.906717] ? lock_downgrade+0x900/0x900 [ 435.906732] ? do_raw_spin_lock+0xc1/0x200 [ 435.906748] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 435.906765] __kernfs_new_node+0x127/0x8d0 [ 435.906783] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 435.927733] ? kasan_check_write+0x14/0x20 [ 435.927756] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 435.927775] ? wait_for_completion+0x8a0/0x8a0 [ 435.967979] ? wait_for_completion+0x8a0/0x8a0 [ 435.972568] ? kasan_check_write+0x14/0x20 [ 435.976812] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 435.981768] ? mutex_unlock+0xd/0x10 [ 435.985495] ? kernfs_activate+0x21a/0x2c0 [ 435.989737] ? kernfs_walk_and_get_ns+0x340/0x340 [ 435.994589] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 436.000136] ? kernfs_link_sibling+0x1d2/0x3b0 [ 436.004732] kernfs_new_node+0x95/0x120 [ 436.008719] __kernfs_create_file+0x5a/0x340 [ 436.013138] sysfs_add_file_mode_ns+0x222/0x530 [ 436.017827] internal_create_group+0x3df/0xd80 [ 436.022430] ? remove_files.isra.1+0x190/0x190 [ 436.027018] ? up_write+0x7b/0x220 [ 436.030567] ? up_read+0x110/0x110 [ 436.034124] ? down_read+0x1d0/0x1d0 [ 436.037848] ? kasan_check_write+0x14/0x20 [ 436.042101] sysfs_create_group+0x1f/0x30 [ 436.046281] lo_ioctl+0x1310/0x1d80 [ 436.049930] ? lo_rw_aio_complete+0x470/0x470 [ 436.054441] blkdev_ioctl+0x9ac/0x2010 [ 436.058341] ? blkpg_ioctl+0xc10/0xc10 [ 436.062238] ? lock_downgrade+0x900/0x900 [ 436.066422] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 436.072252] ? save_stack+0x43/0xd0 [ 436.075957] ? __kasan_slab_free+0x102/0x150 [ 436.080390] ? __fget+0x4d1/0x740 [ 436.083860] ? ksys_dup3+0x680/0x680 [ 436.087586] ? kasan_check_write+0x14/0x20 [ 436.091840] block_ioctl+0xee/0x130 [ 436.095482] ? blkdev_fallocate+0x400/0x400 [ 436.099820] do_vfs_ioctl+0x1de/0x1720 [ 436.103724] ? trace_hardirqs_on+0xbd/0x310 [ 436.108466] ? ioctl_preallocate+0x300/0x300 [ 436.112892] ? __fget_light+0x2e9/0x430 [ 436.116878] ? fget_raw+0x20/0x20 [ 436.120351] ? putname+0xf2/0x130 [ 436.123823] ? kmem_cache_free+0x21a/0x290 [ 436.128079] ? putname+0xf7/0x130 [ 436.131549] ? do_sys_open+0x3ac/0x700 [ 436.135455] ? security_file_ioctl+0x94/0xc0 [ 436.139882] ksys_ioctl+0xa9/0xd0 [ 436.143356] __x64_sys_ioctl+0x73/0xb0 [ 436.147285] do_syscall_64+0x1b9/0x820 [ 436.151194] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 436.156579] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.161530] ? trace_hardirqs_on_caller+0x310/0x310 [ 436.166570] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 436.171601] ? recalc_sigpending_tsk+0x180/0x180 [ 436.176381] ? kasan_check_write+0x14/0x20 [ 436.180645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.185516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.190796] RIP: 0033:0x4573e7 [ 436.194013] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.212929] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 436.220655] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 436.227933] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 436.235213] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 436.242495] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 436.249778] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 20:56:02 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:02 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)=ANY=[]) mkdir(&(0x7f0000001700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x400000, 0x0) getdents64(r1, &(0x7f0000000240)=""/8, 0x8) symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file1\x00') getdents64(r1, &(0x7f0000000400)=""/229, 0xffffffff20000418) 20:56:02 executing program 2 (fault-call:2 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000"], 0x18) [ 436.314975] dccp_invalid_packet: P.Data Offset(80) too large [ 436.322149] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:02 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xebffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:02 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x1, 0xe1, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000400000039}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") 20:56:02 executing program 4 (fault-call:3 fault-nth:16): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 436.399721] FAT-fs (loop5): bogus number of reserved sectors [ 436.405701] FAT-fs (loop5): Can't find a valid FAT filesystem [ 436.446575] loop3: p1 20:56:02 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0fe8e5eb9075a1080123c46ba58684dfda01b6592052110a0864fbdbbd19cb8322783ecaf2cbc333ad778dcabd3184bc5eb58a3a0ecfa7c196641589d7d065266583d99a1483a77b6d61369122005704fdbfa14b04727a56506506cf97fe7bc6feb95bf1938f333b893938c773f9f49cafe538f198a9658824a7796ad34614f41fe8ec9f5ad7b867daac66cba6d68b693d369349c391d5c7c1e436fbc213284b80042cd3"], 0x2, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000000)={0x9, 0x771c6b20, 0x398b, 0x100000000}, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000001c0)=""/189) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bond0\x00', 0x10) 20:56:02 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 436.518550] loop0: p1 [ 436.534543] FAT-fs (loop5): bogus number of reserved sectors [ 436.540684] FAT-fs (loop5): Can't find a valid FAT filesystem [ 436.549449] FAULT_INJECTION: forcing a failure. [ 436.549449] name failslab, interval 1, probability 0, space 0, times 0 [ 436.561351] CPU: 1 PID: 19609 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 436.568830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.578202] Call Trace: [ 436.580821] dump_stack+0x1c4/0x2b4 [ 436.584478] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.589691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 436.595251] ? replace_slot+0x151/0x520 [ 436.599303] should_fail.cold.4+0xa/0x17 [ 436.603475] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.608619] ? error_exit+0xb/0x20 [ 436.612247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.617139] ? error_exit+0xb/0x20 [ 436.620711] ? lock_release+0x19b/0x970 [ 436.624705] ? fs_reclaim_acquire+0x20/0x20 [ 436.629043] ? lock_downgrade+0x900/0x900 [ 436.633221] ? ___might_sleep+0x1ed/0x300 [ 436.637395] ? arch_local_save_flags+0x40/0x40 [ 436.641994] ? kernfs_activate+0x21a/0x2c0 [ 436.646345] __should_failslab+0x124/0x180 [ 436.650596] should_failslab+0x9/0x14 [ 436.654430] kmem_cache_alloc+0x2be/0x730 [ 436.658596] ? lock_downgrade+0x900/0x900 [ 436.662763] ? do_raw_spin_lock+0xc1/0x200 [ 436.667023] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 436.672057] __kernfs_new_node+0x127/0x8d0 [ 436.676337] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 436.681253] ? kasan_check_write+0x14/0x20 [ 436.685537] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 436.690482] ? wait_for_completion+0x8a0/0x8a0 [ 436.695084] ? wait_for_completion+0x8a0/0x8a0 [ 436.699683] ? kasan_check_write+0x14/0x20 [ 436.703933] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 436.708891] ? mutex_unlock+0xd/0x10 [ 436.712623] ? kernfs_activate+0x21a/0x2c0 [ 436.716880] ? kernfs_walk_and_get_ns+0x340/0x340 [ 436.721744] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 436.727659] ? kernfs_link_sibling+0x1d2/0x3b0 [ 436.732289] kernfs_new_node+0x95/0x120 [ 436.736313] __kernfs_create_file+0x5a/0x340 [ 436.740745] sysfs_add_file_mode_ns+0x222/0x530 [ 436.745447] internal_create_group+0x3df/0xd80 [ 436.750059] ? remove_files.isra.1+0x190/0x190 [ 436.754654] ? up_write+0x7b/0x220 [ 436.758210] ? up_read+0x110/0x110 [ 436.761765] ? down_read+0x1d0/0x1d0 [ 436.765498] ? kasan_check_write+0x14/0x20 [ 436.769780] sysfs_create_group+0x1f/0x30 [ 436.773955] lo_ioctl+0x1310/0x1d80 [ 436.777698] ? lo_rw_aio_complete+0x470/0x470 [ 436.782218] blkdev_ioctl+0x9ac/0x2010 [ 436.786122] ? blkpg_ioctl+0xc10/0xc10 [ 436.790025] ? lock_downgrade+0x900/0x900 [ 436.794255] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 436.800101] ? save_stack+0x43/0xd0 [ 436.803743] ? __kasan_slab_free+0x102/0x150 [ 436.808172] ? __fget+0x4d1/0x740 [ 436.811716] ? ksys_dup3+0x680/0x680 [ 436.815456] ? kasan_check_write+0x14/0x20 [ 436.819719] block_ioctl+0xee/0x130 [ 436.823367] ? blkdev_fallocate+0x400/0x400 [ 436.827705] do_vfs_ioctl+0x1de/0x1720 [ 436.831613] ? trace_hardirqs_on+0xbd/0x310 [ 436.835954] ? ioctl_preallocate+0x300/0x300 [ 436.840384] ? __fget_light+0x2e9/0x430 [ 436.844379] ? fget_raw+0x20/0x20 [ 436.847849] ? putname+0xf2/0x130 [ 436.851335] ? kmem_cache_free+0x21a/0x290 [ 436.855587] ? putname+0xf7/0x130 [ 436.859613] ? do_sys_open+0x3ac/0x700 [ 436.863524] ? security_file_ioctl+0x94/0xc0 [ 436.868647] ksys_ioctl+0xa9/0xd0 [ 436.872124] __x64_sys_ioctl+0x73/0xb0 [ 436.876032] do_syscall_64+0x1b9/0x820 [ 436.879939] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 436.885336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.890304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.895169] ? trace_hardirqs_on_caller+0x310/0x310 [ 436.900211] ? prepare_exit_to_usermode+0x291/0x3b0 [ 436.905250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.910139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.915342] RIP: 0033:0x4573e7 [ 436.918550] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 436.937462] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 436.945317] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 436.952601] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 436.959880] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 436.967160] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 436.974446] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 437.001058] overlayfs: filesystem on './file0' not supported as upperdir 20:56:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000"], 0x18) 20:56:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0xe4, r1, 0x104, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x46}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x24}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7ff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000000000}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0xac0b62decb47eb45}, 0x10) r2 = socket(0x1e, 0x5, 0x0) connect$llc(r2, &(0x7f0000000180)={0x1e, 0x303}, 0x10) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000280)=0x1) [ 437.008241] audit: type=1804 audit(1538859362.863:205): pid=19614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir615531740/syzkaller.0FZLtU/385/bus" dev="sda1" ino=16561 res=1 [ 437.046636] audit: type=1804 audit(1538859362.863:206): pid=19614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir615531740/syzkaller.0FZLtU/385/bus" dev="sda1" ino=16561 res=1 [ 437.073521] audit: type=1804 audit(1538859362.863:207): pid=19615 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir615531740/syzkaller.0FZLtU/385/bus" dev="sda1" ino=16561 res=1 [ 437.100421] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:03 executing program 4 (fault-call:3 fault-nth:17): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 437.157314] loop3: p1 20:56:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x2, 0x2000000088) bind(r1, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000200)='X', 0x1, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x824c0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000340)=""/4096) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f00000002c0)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x8) 20:56:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000040000000000000000000000000"], 0x18) 20:56:03 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000014c0)=0xe8) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000008c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x3c, 0x0, @in6={0xa, 0x0, 0x1}}}, 0xa0) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000340)="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", 0x4c9, 0xfffffffffffffffd) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x6) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0x1000) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000100)=@req={0x1, 0x4, 0x0, 0xd6}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x5) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f}}, 0x20) getgroups(0x0, &(0x7f0000001a80)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r2 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdf3, 0x0) close(r0) accept4(r2, &(0x7f00000000c0)=@ethernet={0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x800) close(0xffffffffffffff9c) [ 437.247691] loop0: p1 [ 437.286770] FAULT_INJECTION: forcing a failure. [ 437.286770] name failslab, interval 1, probability 0, space 0, times 0 20:56:03 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3f000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 437.336130] CPU: 1 PID: 19636 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 437.343549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.343555] Call Trace: [ 437.343583] dump_stack+0x1c4/0x2b4 [ 437.343606] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.343627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.343650] should_fail.cold.4+0xa/0x17 [ 437.343674] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.379146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:56:03 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f00000014c0)=0xe8) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000008c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000300), 0x0, 0xffffffffffffffff, 0x3c, 0x0, @in6={0xa, 0x0, 0x1}}}, 0xa0) r1 = add_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000340)="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", 0x4c9, 0xfffffffffffffffd) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x6) keyctl$read(0xb, r1, &(0x7f0000005340)=""/4096, 0x1000) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000100)=@req={0x1, 0x4, 0x0, 0xd6}, 0x10) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x5) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000040)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f}}, 0x20) getgroups(0x0, &(0x7f0000001a80)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) r2 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffdf3, 0x0) close(r0) accept4(r2, &(0x7f00000000c0)=@ethernet={0x0, @broadcast}, &(0x7f0000000140)=0x80, 0x800) close(0xffffffffffffff9c) [ 437.379168] ? wake_up_klogd+0x11a/0x180 [ 437.388804] ? console_device+0xc0/0xc0 [ 437.388820] ? vprintk_emit+0x322/0x930 [ 437.388836] ? __down_trylock_console_sem+0x155/0x200 [ 437.388859] ? vprintk_emit+0x268/0x930 [ 437.405998] ? wake_up_klogd+0x180/0x180 [ 437.406018] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 20:56:03 executing program 4 (fault-call:3 fault-nth:18): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 437.406033] ? kernfs_link_sibling+0x1d2/0x3b0 [ 437.406055] ? fs_reclaim_acquire+0x20/0x20 [ 437.406072] ? lock_downgrade+0x900/0x900 [ 437.406093] ? ___might_sleep+0x1ed/0x300 [ 437.406110] ? arch_local_save_flags+0x40/0x40 [ 437.406130] ? vprintk_default+0x28/0x30 [ 437.406151] __should_failslab+0x124/0x180 [ 437.406167] should_failslab+0x9/0x14 [ 437.406183] kmem_cache_alloc_trace+0x2d7/0x750 [ 437.406210] kobject_uevent_env+0x2f3/0x101e [ 437.406222] ? kasan_check_write+0x14/0x20 20:56:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x200) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000900)={0x0, 0x7, 0x30}, 0xc) write$binfmt_misc(r1, &(0x7f0000000240)={'syz1'}, 0x34000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140), 0x20) write$binfmt_script(r1, &(0x7f0000000040)={'#! ', './file0'}, 0xb) write$binfmt_elf32(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) [ 437.406248] kobject_uevent+0x1f/0x24 [ 437.406294] lo_ioctl+0x138e/0x1d80 [ 437.406320] ? lo_rw_aio_complete+0x470/0x470 [ 437.406338] blkdev_ioctl+0x9ac/0x2010 [ 437.406356] ? blkpg_ioctl+0xc10/0xc10 [ 437.406369] ? lock_downgrade+0x900/0x900 [ 437.406391] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 437.406414] ? save_stack+0x43/0xd0 [ 437.406426] ? __kasan_slab_free+0x102/0x150 [ 437.406447] ? __fget+0x4d1/0x740 [ 437.406469] ? ksys_dup3+0x680/0x680 [ 437.406486] ? kasan_check_write+0x14/0x20 [ 437.406510] block_ioctl+0xee/0x130 [ 437.406525] ? blkdev_fallocate+0x400/0x400 [ 437.406541] do_vfs_ioctl+0x1de/0x1720 [ 437.406558] ? trace_hardirqs_on+0xbd/0x310 [ 437.406576] ? ioctl_preallocate+0x300/0x300 [ 437.406592] ? __fget_light+0x2e9/0x430 [ 437.406608] ? fget_raw+0x20/0x20 [ 437.406623] ? putname+0xf2/0x130 [ 437.406639] ? kmem_cache_free+0x21a/0x290 [ 437.406655] ? putname+0xf7/0x130 [ 437.406673] ? do_sys_open+0x3ac/0x700 [ 437.406694] ? security_file_ioctl+0x94/0xc0 [ 437.406714] ksys_ioctl+0xa9/0xd0 [ 437.406734] __x64_sys_ioctl+0x73/0xb0 [ 437.406752] do_syscall_64+0x1b9/0x820 [ 437.406768] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 437.406793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.406813] ? trace_hardirqs_on_caller+0x310/0x310 [ 437.406830] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 437.406846] ? recalc_sigpending_tsk+0x180/0x180 [ 437.406860] ? kasan_check_write+0x14/0x20 [ 437.406883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.406906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.406918] RIP: 0033:0x4573e7 [ 437.406934] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.406943] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 437.406960] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 437.406970] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 437.406979] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:56:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000004000000000000000000000000000000000"], 0x18) [ 437.406989] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 437.406998] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 437.446931] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 437.456734] loop3: p1 [ 437.738771] loop0: p1 20:56:03 executing program 1: r0 = memfd_create(&(0x7f0000000280)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x1) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000300)={0x7, {{0xa, 0x4e23, 0x7, @mcast2, 0x3}}}, 0x88) accept4$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14, 0x100080000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000001800000025000000000000009500000055000000"], &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0xc3, &(0x7f0000000180)=""/195, 0x0, 0x0, [], r1}, 0x48) [ 437.848697] FAULT_INJECTION: forcing a failure. [ 437.848697] name failslab, interval 1, probability 0, space 0, times 0 [ 437.895542] CPU: 1 PID: 19672 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 437.902957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.912328] Call Trace: [ 437.914950] dump_stack+0x1c4/0x2b4 [ 437.918612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.923838] should_fail.cold.4+0xa/0x17 [ 437.927931] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.933066] ? perf_trace_lock+0x14d/0x7a0 [ 437.937353] ? lock_release+0x970/0x970 [ 437.941351] ? arch_local_save_flags+0x40/0x40 [ 437.945957] ? zap_class+0x640/0x640 [ 437.949697] ? check_preemption_disabled+0x48/0x200 [ 437.954753] ? kernfs_activate+0x8e/0x2c0 [ 437.958936] ? zap_class+0x640/0x640 [ 437.962679] ? fs_reclaim_acquire+0x20/0x20 [ 437.967028] ? lock_downgrade+0x900/0x900 [ 437.971203] ? __mutex_lock+0x85e/0x1700 [ 437.975323] ? ___might_sleep+0x1ed/0x300 [ 437.979510] ? arch_local_save_flags+0x40/0x40 [ 437.984208] ? kernfs_activate+0x21a/0x2c0 [ 437.988485] __should_failslab+0x124/0x180 [ 437.992746] should_failslab+0x9/0x14 [ 437.996572] kmem_cache_alloc+0x2be/0x730 [ 438.000742] ? lock_downgrade+0x900/0x900 [ 438.004910] ? do_raw_spin_lock+0xc1/0x200 [ 438.009168] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 438.014210] __kernfs_new_node+0x127/0x8d0 [ 438.018473] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 438.023250] ? kasan_check_write+0x14/0x20 [ 438.027542] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 438.032496] ? wait_for_completion+0x8a0/0x8a0 [ 438.037106] ? wait_for_completion+0x8a0/0x8a0 [ 438.041710] ? kasan_check_write+0x14/0x20 [ 438.045966] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 438.050920] ? mutex_unlock+0xd/0x10 [ 438.054653] ? kernfs_activate+0x21a/0x2c0 [ 438.058911] ? kernfs_walk_and_get_ns+0x340/0x340 [ 438.063774] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 438.069342] ? kernfs_link_sibling+0x1d2/0x3b0 [ 438.073952] kernfs_new_node+0x95/0x120 [ 438.077953] __kernfs_create_file+0x5a/0x340 [ 438.082395] sysfs_add_file_mode_ns+0x222/0x530 [ 438.087181] internal_create_group+0x3df/0xd80 [ 438.091802] ? remove_files.isra.1+0x190/0x190 20:56:03 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 438.096409] ? up_write+0x7b/0x220 [ 438.099970] ? up_read+0x110/0x110 [ 438.103540] ? down_read+0x1d0/0x1d0 [ 438.107305] ? kasan_check_write+0x14/0x20 [ 438.111570] sysfs_create_group+0x1f/0x30 [ 438.115747] lo_ioctl+0x1310/0x1d80 [ 438.119401] ? lo_rw_aio_complete+0x470/0x470 [ 438.123918] blkdev_ioctl+0x9ac/0x2010 [ 438.127830] ? blkpg_ioctl+0xc10/0xc10 [ 438.131829] ? lock_downgrade+0x900/0x900 [ 438.136003] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 438.141836] ? save_stack+0x43/0xd0 [ 438.145482] ? __kasan_slab_free+0x102/0x150 [ 438.149914] ? __fget+0x4d1/0x740 [ 438.153391] ? ksys_dup3+0x680/0x680 [ 438.157126] ? kasan_check_write+0x14/0x20 [ 438.161384] block_ioctl+0xee/0x130 [ 438.165036] ? blkdev_fallocate+0x400/0x400 [ 438.169379] do_vfs_ioctl+0x1de/0x1720 [ 438.173303] ? trace_hardirqs_on+0xbd/0x310 [ 438.177637] ? ioctl_preallocate+0x300/0x300 [ 438.182069] ? __fget_light+0x2e9/0x430 [ 438.184783] loop3: p1 [ 438.186063] ? fget_raw+0x20/0x20 [ 438.186078] ? putname+0xf2/0x130 20:56:04 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="eb3c906d6b660800666174000400010a0200027400f8", 0x16}], 0x0, &(0x7f0000000140)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='lo\x00'}, 0x30) prlimit64(r0, 0xb, &(0x7f0000000180)={0x6, 0x1}, &(0x7f00000001c0)) [ 438.186095] ? kmem_cache_free+0x21a/0x290 [ 438.186109] ? putname+0xf7/0x130 [ 438.186126] ? do_sys_open+0x3ac/0x700 [ 438.186146] ? security_file_ioctl+0x94/0xc0 [ 438.192107] ksys_ioctl+0xa9/0xd0 [ 438.199796] __x64_sys_ioctl+0x73/0xb0 [ 438.199815] do_syscall_64+0x1b9/0x820 [ 438.199831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.199850] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.207214] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.207231] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.207246] ? recalc_sigpending_tsk+0x180/0x180 [ 438.207260] ? kasan_check_write+0x14/0x20 [ 438.207308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.215176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.215188] RIP: 0033:0x4573e7 [ 438.215207] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.222971] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:56:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000240)=""/137, &(0x7f0000000300)=0x89) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0x800000000000000) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400), 0x0) sendmmsg$alg(r1, &(0x7f0000002c80)=[{0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) sendmmsg$alg(r1, &(0x7f0000002840)=[{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000100)="a4", 0x1}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000005d00)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000400)=""/223, 0xdf}], 0x1, &(0x7f0000000500)=""/198, 0xc6}}], 0x1, 0x0, &(0x7f0000005ec0)) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000180), 0x4) 20:56:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001100000000000000000000000000000000"], 0x18) [ 438.222987] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 438.222995] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 438.223003] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 438.223016] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 438.233321] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 438.338090] FAT-fs (loop5): bogus number of reserved sectors 20:56:04 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2700, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x10000000, @perf_config_ext, 0xfffffffffffffffd, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x4) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0xa0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f00000002c0), r1, 0x1}}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x0, 0x1, 0x1, &(0x7f00000001c0)=[0x0, 0x0], 0x2}, 0x20) [ 438.349861] FAT-fs (loop5): Can't find a valid FAT filesystem [ 438.367184] loop0: p1 [ 438.412434] FAT-fs (loop5): bogus number of reserved sectors [ 438.420224] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000005000000000000000000000000"], 0x18) 20:56:04 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bf0000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) mmap(&(0x7f0000941000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) mremap(&(0x7f000079c000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000080)={{0x1, 0x1}, {0x100000000}, 0x5, 0x3, 0x9}) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000100), 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x43, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x2, 0x45c9, 0x5, 0x7]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002000)=""/4096) [ 438.457307] loop0: p1 [ 438.459852] FAT-fs (loop5): Can't find a valid FAT filesystem 20:56:04 executing program 4 (fault-call:3 fault-nth:19): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001b40)="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", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfcfd, &(0x7f0000000180), 0x0, &(0x7f0000000700), 0x365}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) [ 438.518205] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 438.526622] loop3: p1 20:56:04 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffa0008000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 438.607145] FAULT_INJECTION: forcing a failure. [ 438.607145] name failslab, interval 1, probability 0, space 0, times 0 [ 438.629525] CPU: 0 PID: 19750 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 438.636918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.646317] Call Trace: [ 438.648932] dump_stack+0x1c4/0x2b4 [ 438.652603] ? dump_stack_print_info.cold.2+0x52/0x52 [ 438.657823] ? is_bpf_text_address+0xd3/0x170 [ 438.662351] should_fail.cold.4+0xa/0x17 [ 438.666426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.671545] ? save_stack+0xa9/0xd0 [ 438.675183] ? save_stack+0x43/0xd0 [ 438.678807] ? kasan_kmalloc+0xc7/0xe0 [ 438.682694] ? kmem_cache_alloc_trace+0x152/0x750 [ 438.687545] ? kobject_uevent_env+0x2f3/0x101e [ 438.692189] ? kobject_uevent+0x1f/0x24 [ 438.696174] ? lo_ioctl+0x138e/0x1d80 [ 438.699985] ? blkdev_ioctl+0x9ac/0x2010 [ 438.704053] ? block_ioctl+0xee/0x130 [ 438.707876] ? do_vfs_ioctl+0x1de/0x1720 [ 438.711939] ? ksys_ioctl+0xa9/0xd0 [ 438.715628] ? __x64_sys_ioctl+0x73/0xb0 [ 438.719699] ? do_syscall_64+0x1b9/0x820 [ 438.723771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.729139] ? fs_reclaim_acquire+0x20/0x20 [ 438.733659] ? lock_downgrade+0x900/0x900 [ 438.737823] ? ___might_sleep+0x1ed/0x300 [ 438.741990] ? arch_local_save_flags+0x40/0x40 [ 438.746576] ? kasan_check_read+0x11/0x20 [ 438.750889] ? do_raw_spin_unlock+0xa7/0x2f0 [ 438.755330] __should_failslab+0x124/0x180 [ 438.759563] should_failslab+0x9/0x14 [ 438.763364] __kmalloc+0x2d4/0x760 [ 438.766918] ? kobject_get_path+0xc2/0x1b0 [ 438.771159] ? kmem_cache_alloc_trace+0x31f/0x750 [ 438.776021] kobject_get_path+0xc2/0x1b0 [ 438.780097] kobject_uevent_env+0x314/0x101e [ 438.784591] ? kasan_check_write+0x14/0x20 [ 438.788877] kobject_uevent+0x1f/0x24 [ 438.792675] lo_ioctl+0x138e/0x1d80 [ 438.796322] ? lo_rw_aio_complete+0x470/0x470 [ 438.800972] blkdev_ioctl+0x9ac/0x2010 [ 438.804873] ? blkpg_ioctl+0xc10/0xc10 [ 438.808758] ? lock_downgrade+0x900/0x900 [ 438.812907] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 438.818986] ? save_stack+0x43/0xd0 [ 438.822621] ? __kasan_slab_free+0x102/0x150 [ 438.827029] ? __fget+0x4d1/0x740 [ 438.830480] ? ksys_dup3+0x680/0x680 [ 438.834330] ? kasan_check_write+0x14/0x20 [ 438.838628] block_ioctl+0xee/0x130 [ 438.842302] ? blkdev_fallocate+0x400/0x400 [ 438.846686] do_vfs_ioctl+0x1de/0x1720 [ 438.850574] ? trace_hardirqs_on+0xbd/0x310 [ 438.854902] ? ioctl_preallocate+0x300/0x300 [ 438.859670] ? __fget_light+0x2e9/0x430 [ 438.863640] ? fget_raw+0x20/0x20 [ 438.867090] ? putname+0xf2/0x130 [ 438.870540] ? kmem_cache_free+0x21a/0x290 [ 438.874770] ? putname+0xf7/0x130 [ 438.878225] ? do_sys_open+0x3ac/0x700 [ 438.882126] ? security_file_ioctl+0x94/0xc0 [ 438.886534] ksys_ioctl+0xa9/0xd0 [ 438.889996] __x64_sys_ioctl+0x73/0xb0 [ 438.893962] do_syscall_64+0x1b9/0x820 [ 438.897866] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.903230] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.908159] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.913171] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.918186] ? recalc_sigpending_tsk+0x180/0x180 [ 438.922950] ? kasan_check_write+0x14/0x20 [ 438.927195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.932052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.937250] RIP: 0033:0x4573e7 20:56:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000200000000000000000000000000"], 0x18) [ 438.940470] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.959365] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.967116] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 438.974390] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 438.981662] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 438.988928] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 438.996205] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 20:56:04 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xd07c, 0x10000) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r1, 0x800455d1, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x0) mount(&(0x7f0000000040)=@sr0='/dev/sr0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x81002b, &(0x7f0000000300)="1674b680f82bf2b8d5be21ef9013d3273fa6a306c90c5e079468fbd36373ba6721c652cb5ab4ffffc765d8e31af39fac3579c7bcd746f3c1ae53ec1a620935635f36cc374e11040f44a737646d49c5ff76ae08645401850b289d75543a10034b063e0a4e8796f96e9875d480d57a3e7c6f583f6e31a60000000000000000000000000000") [ 439.006829] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:04 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:04 executing program 1: clone(0x200, &(0x7f0000b6b000), &(0x7f0000744000), &(0x7f0000fef000), &(0x7f0000000080)) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000ee6ff8)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000000500)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') sendto(r0, &(0x7f0000000040)="b3487b7efffa6c34ea6bc49b81c0528b3ae2f99bf3072656a935cc48a8d1c4507c87bf676c208a7170c8fc8841d73fc6a7077522bd16eeba2f8b09cbdedff16d01ba59efefcebff707cf8f19d6bbd68bb9e2e8238f333676b4d19d70836eb6b2e2d5a47ff46825bf6ab6af73ede9fc15b294b16b9ac52433f59518b91813c8e8eb7c70f826d8ac680e09c9ddfb226d2fb15120cedc26f38bf357bf33ba3bd30c017ebeccb3d5ce0de72af230", 0xac, 0x404c840, &(0x7f00000001c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x80) pread64(r0, &(0x7f0000000140), 0x0, 0x0) lseek(r0, 0x0, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000180)={0x7}, 0x7) open$dir(&(0x7f0000296ff8)='./file0\x00', 0x27e, 0x0) 20:56:04 executing program 4 (fault-call:3 fault-nth:20): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 439.106134] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_team\x00', 0x0}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x2, 0x0, [], [{0x4, 0xf3, 0x5, 0xfffffffffffffffb, 0x1, 0x2}, {0x7, 0x4467, 0x57, 0x4, 0x4, 0x6}], [[], []]}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xfffffffffffffda3, &(0x7f0000000200)={&(0x7f0000000180)=@bridge_delneigh={0x28, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@NDA_LLADDR={0xc, 0x2, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 439.204887] FAULT_INJECTION: forcing a failure. [ 439.204887] name failslab, interval 1, probability 0, space 0, times 0 [ 439.224596] CPU: 0 PID: 19779 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 439.231990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.231996] Call Trace: [ 439.232023] dump_stack+0x1c4/0x2b4 [ 439.232046] ? dump_stack_print_info.cold.2+0x52/0x52 [ 439.232069] ? is_bpf_text_address+0xd3/0x170 [ 439.232092] should_fail.cold.4+0xa/0x17 [ 439.232112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.232133] ? save_stack+0xa9/0xd0 [ 439.232148] ? save_stack+0x43/0xd0 [ 439.232159] ? kasan_kmalloc+0xc7/0xe0 [ 439.232175] ? kmem_cache_alloc_trace+0x152/0x750 [ 439.232192] ? kobject_uevent_env+0x2f3/0x101e [ 439.232205] ? kobject_uevent+0x1f/0x24 [ 439.232223] ? lo_ioctl+0x138e/0x1d80 [ 439.232240] ? blkdev_ioctl+0x9ac/0x2010 [ 439.232253] ? block_ioctl+0xee/0x130 [ 439.232301] ? do_vfs_ioctl+0x1de/0x1720 [ 439.232325] ? ksys_ioctl+0xa9/0xd0 [ 439.261687] ? __x64_sys_ioctl+0x73/0xb0 [ 439.261705] ? do_syscall_64+0x1b9/0x820 [ 439.261721] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.261746] ? fs_reclaim_acquire+0x20/0x20 [ 439.274355] ? lock_downgrade+0x900/0x900 [ 439.307705] ? ___might_sleep+0x1ed/0x300 [ 439.307728] ? arch_local_save_flags+0x40/0x40 [ 439.307742] ? kasan_check_read+0x11/0x20 [ 439.307759] ? do_raw_spin_unlock+0xa7/0x2f0 [ 439.307779] __should_failslab+0x124/0x180 [ 439.355726] should_failslab+0x9/0x14 [ 439.355742] __kmalloc+0x2d4/0x760 [ 439.355760] ? kobject_get_path+0xc2/0x1b0 [ 439.355775] ? kmem_cache_alloc_trace+0x31f/0x750 [ 439.355790] kobject_get_path+0xc2/0x1b0 [ 439.355812] kobject_uevent_env+0x314/0x101e [ 439.381212] ? kasan_check_write+0x14/0x20 [ 439.381235] kobject_uevent+0x1f/0x24 [ 439.381252] lo_ioctl+0x138e/0x1d80 [ 439.381322] ? lo_rw_aio_complete+0x470/0x470 [ 439.381340] blkdev_ioctl+0x9ac/0x2010 [ 439.381357] ? blkpg_ioctl+0xc10/0xc10 [ 439.381372] ? lock_downgrade+0x900/0x900 [ 439.381393] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 439.381411] ? save_stack+0x43/0xd0 [ 439.381423] ? __kasan_slab_free+0x102/0x150 [ 439.381441] ? __fget+0x4d1/0x740 [ 439.381459] ? ksys_dup3+0x680/0x680 [ 439.381474] ? kasan_check_write+0x14/0x20 [ 439.381494] block_ioctl+0xee/0x130 [ 439.381508] ? blkdev_fallocate+0x400/0x400 [ 439.381522] do_vfs_ioctl+0x1de/0x1720 [ 439.381539] ? trace_hardirqs_on+0xbd/0x310 [ 439.381555] ? ioctl_preallocate+0x300/0x300 [ 439.381570] ? __fget_light+0x2e9/0x430 [ 439.381584] ? fget_raw+0x20/0x20 [ 439.381598] ? putname+0xf2/0x130 [ 439.381614] ? kmem_cache_free+0x21a/0x290 [ 439.381628] ? putname+0xf7/0x130 [ 439.381644] ? do_sys_open+0x3ac/0x700 [ 439.381663] ? security_file_ioctl+0x94/0xc0 [ 439.381679] ksys_ioctl+0xa9/0xd0 [ 439.381697] __x64_sys_ioctl+0x73/0xb0 [ 439.381714] do_syscall_64+0x1b9/0x820 [ 439.381730] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.381747] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.381764] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.381780] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 439.381795] ? recalc_sigpending_tsk+0x180/0x180 [ 439.381808] ? kasan_check_write+0x14/0x20 [ 439.381826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.381845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.381856] RIP: 0033:0x4573e7 [ 439.381871] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:56:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000014000000000000000000000000"], 0x18) 20:56:05 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="000000004000000254e72d5d345018a35e678fdf2fd40a37d61c0c7ef4938a6daf421a7846819748fd98a87ec6994b620253b36303bbb6f158108b9ac8871a9c317d4fb65082b3b24134ae9af28cf5631f661ef5b03b67e6cdd6ba00b7beb2ad76c1c50aa5f6157b7bf8eda423c1dce16010ce7e466fe577a67af84f3c9bf02a"], 0x1}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x6) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r5 = accept(r3, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$alg(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000980)="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", 0xdf7}], 0x1, &(0x7f0000000440), 0x0, 0x20000000}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r6 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) getgid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000002240)) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000280)=""/59) fcntl$getownex(r1, 0x10, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000022c0)=0xc) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000002300)) fstat(r4, &(0x7f00000000c0)) fcntl$getown(r1, 0x9) sendmmsg(r4, &(0x7f00000002c0)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0), 0x16d}}], 0x3a6, 0x0) sendfile(r5, r2, &(0x7f0000000180), 0x10000014e) [ 439.381878] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.563549] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 439.563559] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 439.563568] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 439.563576] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 20:56:05 executing program 4 (fault-call:3 fault-nth:21): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:05 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 439.563585] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 439.580672] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:05 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffeb, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000016000000000000000000000000"], 0x18) [ 439.608583] loop3: p1 [ 439.787560] loop3: p1 [ 439.794433] FAULT_INJECTION: forcing a failure. [ 439.794433] name failslab, interval 1, probability 0, space 0, times 0 [ 439.811258] dccp_close: ABORT with 56302 bytes unread [ 439.824055] CPU: 1 PID: 19835 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 20:56:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) mount(&(0x7f0000000180)=@sr0='/dev/sr0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='pstore\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000002c0)=0x1, r2, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @local}, r2}}, 0x48) [ 439.831714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.841090] Call Trace: [ 439.843713] dump_stack+0x1c4/0x2b4 [ 439.847395] ? dump_stack_print_info.cold.2+0x52/0x52 [ 439.852608] ? lo_ioctl+0xe6/0x1d80 [ 439.856295] should_fail.cold.4+0xa/0x17 [ 439.860386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.860408] ? blkpg_ioctl+0xc10/0xc10 [ 439.869417] ? lock_downgrade+0x900/0x900 [ 439.873602] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 439.879606] ? save_stack+0x43/0xd0 [ 439.883253] ? __kasan_slab_free+0x102/0x150 20:56:05 executing program 1: ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000300)=""/111, &(0x7f0000000100)=0x6f) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000380)={0x87, @local, 0x4e24, 0x2, 'wlc\x00', 0x18, 0x8, 0x7a}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001780)}, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0xc0000000000002, &(0x7f0000000140)=0x75, 0x4) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) renameat2(r0, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x5) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f00000003c0)=0x20) recvmsg(r2, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x395b}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4, 0x5d00000000000005}, 0x100) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000440)={{r3, r4/1000+10000}, {0x77359400}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f00000003c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in6, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000006740)=0xe8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000240)=0xf, 0x4) [ 439.887833] ? __fget+0x4d1/0x740 [ 439.891340] ? fs_reclaim_acquire+0x20/0x20 [ 439.895689] ? lock_downgrade+0x900/0x900 [ 439.899868] ? ___might_sleep+0x1ed/0x300 [ 439.904214] ? arch_local_save_flags+0x40/0x40 [ 439.908905] ? block_ioctl+0xee/0x130 [ 439.912738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.918339] __should_failslab+0x124/0x180 [ 439.922601] should_failslab+0x9/0x14 [ 439.926432] kmem_cache_alloc+0x2be/0x730 [ 439.930612] ? fget_raw+0x20/0x20 [ 439.934095] getname_flags+0xd0/0x5a0 [ 439.938041] do_mkdirat+0xc5/0x310 [ 439.941670] ? __ia32_sys_mknod+0xb0/0xb0 [ 439.945837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.951227] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 439.956778] ? ksys_ioctl+0x81/0xd0 [ 439.960441] __x64_sys_mkdir+0x5c/0x80 [ 439.964358] do_syscall_64+0x1b9/0x820 [ 439.968364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.973770] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.978736] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.983775] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 439.986400] loop0: p1 [ 439.988834] ? recalc_sigpending_tsk+0x180/0x180 [ 439.996095] ? kasan_check_write+0x14/0x20 [ 439.996115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.996136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.996147] RIP: 0033:0x4569b7 [ 439.996163] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.996176] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 [ 440.033070] ORIG_RAX: 0000000000000053 [ 440.033079] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004569b7 [ 440.033088] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 440.033097] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 440.033106] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 440.033115] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 440.050634] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 440.068203] IPVS: set_ctl: invalid protocol: 135 172.20.20.170:20004 20:56:06 executing program 4 (fault-call:3 fault-nth:22): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:06 executing program 5: mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000240)) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) utimes(&(0x7f0000000100)='./control/file0\x00', &(0x7f00000001c0)) unlink(&(0x7f00000000c0)='./control/file0\x00') pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x6}}, 0xfffffffffffffda1) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r3, 0xc50}}, 0x10) 20:56:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000002000000000000000000000000"], 0x18) [ 440.240584] FAULT_INJECTION: forcing a failure. [ 440.240584] name failslab, interval 1, probability 0, space 0, times 0 [ 440.258743] loop3: p1 [ 440.269534] CPU: 1 PID: 19864 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 440.277019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.286489] Call Trace: 20:56:06 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xa0008000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 440.289112] dump_stack+0x1c4/0x2b4 [ 440.292783] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.298010] ? lock_downgrade+0x900/0x900 [ 440.302221] should_fail.cold.4+0xa/0x17 [ 440.306333] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.311454] ? rcu_bh_qs+0xc0/0xc0 [ 440.311469] ? unwind_dump+0x190/0x190 [ 440.311492] ? is_bpf_text_address+0xd3/0x170 [ 440.311512] ? __kernel_text_address+0xd/0x40 [ 440.323681] ? unwind_get_return_address+0x61/0xa0 [ 440.323700] ? __save_stack_trace+0x8d/0xf0 [ 440.323725] ? fs_reclaim_acquire+0x20/0x20 [ 440.323744] ? lock_downgrade+0x900/0x900 [ 440.346334] ? ___might_sleep+0x1ed/0x300 [ 440.350506] ? kobject_uevent+0x1f/0x24 [ 440.354533] ? arch_local_save_flags+0x40/0x40 [ 440.359142] ? do_vfs_ioctl+0x1de/0x1720 [ 440.363221] ? ksys_ioctl+0xa9/0xd0 [ 440.363236] ? __x64_sys_ioctl+0x73/0xb0 [ 440.363253] ? do_syscall_64+0x1b9/0x820 [ 440.363298] ? fs_reclaim_acquire+0x20/0x20 [ 440.363320] __should_failslab+0x124/0x180 [ 440.371019] should_failslab+0x9/0x14 [ 440.371036] kmem_cache_alloc+0x2be/0x730 [ 440.371059] skb_clone+0x1bb/0x500 [ 440.371074] ? skb_split+0x11e0/0x11e0 [ 440.371094] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 440.404700] ? netlink_trim+0x1b4/0x380 [ 440.408702] ? netlink_skb_destructor+0x210/0x210 [ 440.413579] netlink_broadcast_filtered+0x110f/0x1680 [ 440.418805] ? __netlink_sendskb+0xd0/0xd0 [ 440.423065] ? pointer+0x990/0x990 [ 440.426624] ? device_get_devnode+0x2d0/0x2d0 [ 440.431144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.436698] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 440.442166] ? refcount_add_not_zero_checked+0x330/0x330 [ 440.447640] ? netlink_has_listeners+0x2cb/0x4a0 [ 440.452417] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 440.457755] netlink_broadcast+0x3a/0x50 [ 440.461852] kobject_uevent_env+0xa83/0x101e [ 440.466352] ? kasan_check_write+0x14/0x20 [ 440.470700] kobject_uevent+0x1f/0x24 [ 440.474517] lo_ioctl+0x138e/0x1d80 [ 440.478182] ? lo_rw_aio_complete+0x470/0x470 [ 440.483062] blkdev_ioctl+0x9ac/0x2010 [ 440.486971] ? blkpg_ioctl+0xc10/0xc10 [ 440.490874] ? lock_downgrade+0x900/0x900 [ 440.495044] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 440.500872] ? save_stack+0x43/0xd0 [ 440.504512] ? __kasan_slab_free+0x102/0x150 [ 440.508941] ? __fget+0x4d1/0x740 [ 440.512416] ? ksys_dup3+0x680/0x680 [ 440.516147] ? kasan_check_write+0x14/0x20 [ 440.520407] block_ioctl+0xee/0x130 [ 440.524052] ? blkdev_fallocate+0x400/0x400 [ 440.528479] do_vfs_ioctl+0x1de/0x1720 [ 440.532385] ? trace_hardirqs_on+0xbd/0x310 [ 440.536728] ? ioctl_preallocate+0x300/0x300 [ 440.541158] ? __fget_light+0x2e9/0x430 [ 440.545240] ? fget_raw+0x20/0x20 [ 440.548735] ? putname+0xf2/0x130 [ 440.552319] ? kmem_cache_free+0x21a/0x290 [ 440.556648] ? putname+0xf7/0x130 [ 440.560124] ? do_sys_open+0x3ac/0x700 [ 440.564034] ? security_file_ioctl+0x94/0xc0 [ 440.568465] ksys_ioctl+0xa9/0xd0 [ 440.571944] __x64_sys_ioctl+0x73/0xb0 [ 440.575857] do_syscall_64+0x1b9/0x820 [ 440.579769] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 440.585161] ? syscall_return_slowpath+0x5e0/0x5e0 [ 440.590117] ? trace_hardirqs_on_caller+0x310/0x310 [ 440.595157] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 440.600188] ? recalc_sigpending_tsk+0x180/0x180 [ 440.605043] ? kasan_check_write+0x14/0x20 [ 440.609321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.614187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.619387] RIP: 0033:0x4573e7 [ 440.622595] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.641512] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.649240] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 440.656544] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 440.663826] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 440.671108] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 440.678561] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 20:56:06 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0ffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:06 executing program 4 (fault-call:3 fault-nth:23): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 440.695436] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000015000000000000000000000000"], 0x18) [ 440.787441] loop0: p1 [ 440.823488] IPVS: set_ctl: invalid protocol: 135 172.20.20.170:20004 [ 440.858118] FAULT_INJECTION: forcing a failure. [ 440.858118] name failslab, interval 1, probability 0, space 0, times 0 [ 440.876866] loop3: p1 [ 440.880141] loop0: p1 [ 440.893079] CPU: 0 PID: 19899 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 440.900603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.909972] Call Trace: [ 440.912596] dump_stack+0x1c4/0x2b4 [ 440.916262] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.921526] should_fail.cold.4+0xa/0x17 [ 440.925615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.930746] ? rcu_bh_qs+0xc0/0xc0 [ 440.934326] ? unwind_dump+0x190/0x190 [ 440.938245] ? is_bpf_text_address+0xd3/0x170 [ 440.942818] ? check_preemption_disabled+0x48/0x200 [ 440.947887] ? debug_smp_processor_id+0x1c/0x20 [ 440.952587] ? zap_class+0x640/0x640 [ 440.956496] ? fs_reclaim_acquire+0x20/0x20 [ 440.960847] ? lock_downgrade+0x900/0x900 [ 440.965023] ? ___might_sleep+0x1ed/0x300 [ 440.969192] ? kobject_uevent+0x1f/0x24 [ 440.973195] ? arch_local_save_flags+0x40/0x40 [ 440.977800] ? do_vfs_ioctl+0x1de/0x1720 [ 440.981884] ? ksys_ioctl+0xa9/0xd0 [ 440.985616] ? __x64_sys_ioctl+0x73/0xb0 [ 440.989699] ? fs_reclaim_acquire+0x20/0x20 [ 440.994045] __should_failslab+0x124/0x180 [ 440.998325] should_failslab+0x9/0x14 [ 441.002159] kmem_cache_alloc+0x2be/0x730 [ 441.006340] skb_clone+0x1bb/0x500 [ 441.009904] ? skb_split+0x11e0/0x11e0 [ 441.013813] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 441.018853] ? netlink_trim+0x1b4/0x380 [ 441.022855] ? netlink_skb_destructor+0x210/0x210 [ 441.027735] netlink_broadcast_filtered+0x110f/0x1680 [ 441.032956] ? __netlink_sendskb+0xd0/0xd0 [ 441.037340] ? pointer+0x990/0x990 [ 441.040909] ? device_get_devnode+0x2d0/0x2d0 [ 441.045430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.050989] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 441.056470] ? refcount_add_not_zero_checked+0x330/0x330 [ 441.061947] ? netlink_has_listeners+0x2cb/0x4a0 [ 441.066730] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 441.071778] netlink_broadcast+0x3a/0x50 [ 441.075869] kobject_uevent_env+0xa83/0x101e [ 441.080331] ? kasan_check_write+0x14/0x20 [ 441.084599] kobject_uevent+0x1f/0x24 [ 441.088426] lo_ioctl+0x138e/0x1d80 [ 441.092081] ? lo_rw_aio_complete+0x470/0x470 [ 441.096603] blkdev_ioctl+0x9ac/0x2010 [ 441.100517] ? blkpg_ioctl+0xc10/0xc10 [ 441.104428] ? lock_downgrade+0x900/0x900 [ 441.108605] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 441.114437] ? save_stack+0x43/0xd0 [ 441.118082] ? __kasan_slab_free+0x102/0x150 [ 441.122520] ? __fget+0x4d1/0x740 [ 441.126003] ? ksys_dup3+0x680/0x680 [ 441.129744] ? kasan_check_write+0x14/0x20 [ 441.134132] block_ioctl+0xee/0x130 [ 441.137789] ? blkdev_fallocate+0x400/0x400 [ 441.142138] do_vfs_ioctl+0x1de/0x1720 [ 441.146051] ? trace_hardirqs_on+0xbd/0x310 [ 441.150399] ? ioctl_preallocate+0x300/0x300 [ 441.154830] ? __fget_light+0x2e9/0x430 [ 441.158826] ? fget_raw+0x20/0x20 [ 441.162328] ? putname+0xf2/0x130 [ 441.165804] ? kmem_cache_free+0x21a/0x290 [ 441.170062] ? putname+0xf7/0x130 [ 441.173543] ? do_sys_open+0x3ac/0x700 [ 441.177460] ? security_file_ioctl+0x94/0xc0 [ 441.181895] ksys_ioctl+0xa9/0xd0 [ 441.185372] __x64_sys_ioctl+0x73/0xb0 [ 441.189315] do_syscall_64+0x1b9/0x820 [ 441.193226] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 441.198640] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.203597] ? trace_hardirqs_on_caller+0x310/0x310 [ 441.208656] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 441.213783] ? recalc_sigpending_tsk+0x180/0x180 [ 441.218560] ? kasan_check_write+0x14/0x20 [ 441.222825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.227698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.232910] RIP: 0033:0x4573e7 [ 441.236123] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.255047] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.262946] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004573e7 [ 441.270232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 20:56:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x0, r3}) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r3}) [ 441.277657] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 441.285190] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 441.292551] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 441.309551] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000012000000000000000000000000"], 0x18) 20:56:07 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2700000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:07 executing program 4 (fault-call:3 fault-nth:24): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)="6d656d6f72792e6576656e747300c9546a4ece56a1bdcdd1e7a44f77842350690c3bd400fd2c32f92bb074fd20dde310cc9612294925038ae7df9be7d8bba1749f300e", 0x26e1, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x180, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000080)="eb", 0x1}], 0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000040), 0xfd71) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0xffffffff000}) 20:56:07 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2700000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 441.486683] FAULT_INJECTION: forcing a failure. [ 441.486683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 441.498228] loop0: p1 [ 441.498860] CPU: 1 PID: 19935 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 441.508807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.508815] Call Trace: [ 441.508842] dump_stack+0x1c4/0x2b4 [ 441.508868] ? dump_stack_print_info.cold.2+0x52/0x52 [ 441.508889] ? trace_hardirqs_off+0xb8/0x310 [ 441.508914] should_fail.cold.4+0xa/0x17 [ 441.508940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.543317] ? kobject_uevent_env+0xf76/0x101e [ 441.547922] ? wait_for_completion+0x8a0/0x8a0 [ 441.552525] ? __kasan_slab_free+0x119/0x150 [ 441.556959] ? mark_held_locks+0x130/0x130 [ 441.561408] ? kobject_uevent_env+0x100d/0x101e [ 441.566091] ? kasan_check_write+0x14/0x20 [ 441.570360] ? mutex_unlock+0xd/0x10 [ 441.574239] ? lo_ioctl+0xe6/0x1d80 [ 441.577921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.583474] ? should_fail+0x22d/0xd01 [ 441.587381] ? blkdev_ioctl+0x15d/0x2010 [ 441.591462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.596582] ? blkpg_ioctl+0xc10/0xc10 [ 441.600487] ? lock_downgrade+0x900/0x900 [ 441.604663] __alloc_pages_nodemask+0x34b/0xde0 [ 441.609358] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 441.614392] ? save_stack+0x43/0xd0 [ 441.618032] ? __kasan_slab_free+0x102/0x150 [ 441.622461] ? __fget+0x4d1/0x740 [ 441.626001] ? fs_reclaim_acquire+0x20/0x20 [ 441.630347] ? lock_downgrade+0x900/0x900 [ 441.634518] ? ___might_sleep+0x1ed/0x300 [ 441.638691] ? trace_hardirqs_off+0xb8/0x310 [ 441.643124] cache_grow_begin+0x91/0x8c0 [ 441.647203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 441.652766] kmem_cache_alloc+0x665/0x730 [ 441.656940] ? fget_raw+0x20/0x20 [ 441.660419] getname_flags+0xd0/0x5a0 [ 441.664241] do_mkdirat+0xc5/0x310 [ 441.667831] ? __ia32_sys_mknod+0xb0/0xb0 [ 441.671998] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.677445] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 441.682915] ? ksys_ioctl+0x81/0xd0 [ 441.686563] __x64_sys_mkdir+0x5c/0x80 [ 441.690581] do_syscall_64+0x1b9/0x820 [ 441.694487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 441.699868] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.704956] ? trace_hardirqs_on_caller+0x310/0x310 [ 441.709991] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 441.715023] ? recalc_sigpending_tsk+0x180/0x180 [ 441.719799] ? kasan_check_write+0x14/0x20 [ 441.724056] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.728932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.734171] RIP: 0033:0x4569b7 [ 441.737382] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.756643] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 441.764469] RAX: ffffffffffffffda RBX: 0000000020000810 RCX: 00000000004569b7 [ 441.771749] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 441.779030] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 20:56:07 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000580)='/dev/dmmidi#\x00', 0x1, 0x40001) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f00000001c0)={r2, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) accept4$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, &(0x7f0000000440)=0x1c, 0x80000) listen(r3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @multicast2}}}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000001b00)=ANY=[@ANYBLOB="ba000000d313db0ae638bad0326f687e1edd0cbc6918169be348671b3b7172464401fbaddf65487b5565c6a596e4e4ab8c491cf1a02e06525af2d70080384f66e590d160b20a39c89d61ef291c9e245627c75d05432d234e17e06ed336076a4be61d7209e7c9749ae5e68c0e692265241eeb5fe8af929bf13ff9c36e1f4334080e5f"], &(0x7f0000000600)=0x1) getresgid(&(0x7f0000000400), &(0x7f0000001cc0), &(0x7f0000001bc0)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100)=0x4, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) sendto$inet6(r4, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000002000000, 0x0, 0x801000cf00000000, 0x0, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r5, 0x401104000000016) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x9, @scatter={0x5, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/94, 0x5e}, {&(0x7f0000000780)=""/233, 0xe9}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/23, 0x17}, {&(0x7f0000001880)=""/190, 0xbe}]}, &(0x7f0000001a00), &(0x7f0000001a40)=""/54, 0x2, 0x0, 0x3, &(0x7f0000001a80)}) 20:56:07 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x80, 0x200400) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x5, 0x98, 0x28}}, 0x30) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000000), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e20, 0xffff, @remote, 0xdb}}}, &(0x7f0000000240)=0x84) [ 441.786337] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 441.793705] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 20:56:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001400000000000000000000000000000000"], 0x18) [ 441.858583] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 441.883016] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 20:56:07 executing program 4 (fault-call:3 fault-nth:25): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 441.928968] loop3: p1 20:56:07 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x400, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000001c0)={0x1, [0x0]}) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x21ac00000, 0x400) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4010641a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[0x600]}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000100)=@nat={'%at\x00', 0x19, 0x1, 0x1a8, [0x200005c0, 0x0, 0x0, 0x200005f0, 0x20000620], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x220) 20:56:07 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f0000000400), 0x2d6, &(0x7f0000000100)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x4000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x3, [0x1ff, 0x7, 0x4]}, &(0x7f00000000c0)=0xa) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=""/145, 0x91}, 0x0) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1, &(0x7f0000001c80)}, 0x0) [ 442.012943] x_tables: eb_tables: snat target: only valid in nat table, not %at [ 442.026877] FAULT_INJECTION: forcing a failure. [ 442.026877] name failslab, interval 1, probability 0, space 0, times 0 [ 442.056813] loop3: p1 [ 442.059867] loop0: p1 [ 442.065805] CPU: 1 PID: 19962 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 442.073193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.082681] Call Trace: [ 442.085318] dump_stack+0x1c4/0x2b4 [ 442.088999] ? dump_stack_print_info.cold.2+0x52/0x52 [ 442.094353] should_fail.cold.4+0xa/0x17 [ 442.098437] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 442.103559] ? zap_class+0x640/0x640 [ 442.107316] ? kasan_check_write+0x14/0x20 [ 442.111570] ? zap_class+0x640/0x640 [ 442.115323] ? handle_mm_fault+0x42a/0xc70 [ 442.119583] ? zap_class+0x640/0x640 [ 442.123341] ? fs_reclaim_acquire+0x20/0x20 [ 442.127686] ? lock_downgrade+0x900/0x900 [ 442.131986] ? ___might_sleep+0x1ed/0x300 [ 442.136146] ? arch_local_save_flags+0x40/0x40 [ 442.140749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 442.146320] __should_failslab+0x124/0x180 [ 442.150569] should_failslab+0x9/0x14 [ 442.154387] __kmalloc_track_caller+0x2d0/0x750 [ 442.159071] ? strncpy_from_user+0x510/0x510 [ 442.163493] ? __do_page_fault+0x4a6/0xed0 [ 442.167740] ? strndup_user+0x77/0xd0 [ 442.171551] memdup_user+0x2c/0xa0 [ 442.175108] strndup_user+0x77/0xd0 [ 442.178750] ksys_mount+0x3c/0x140 [ 442.182392] __x64_sys_mount+0xbe/0x150 [ 442.186390] do_syscall_64+0x1b9/0x820 [ 442.190318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 442.195797] ? syscall_return_slowpath+0x5e0/0x5e0 [ 442.200745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.205611] ? trace_hardirqs_on_caller+0x310/0x310 [ 442.210648] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 442.215682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.221231] ? prepare_exit_to_usermode+0x291/0x3b0 [ 442.226287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.231153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.236355] RIP: 0033:0x459fea 20:56:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$sndmidi(&(0x7f0000000300)='/dev/snd/midiC#D#\x00', 0x7, 0x0) ioctl$KVM_GET_REGS(0xffffffffffffffff, 0x8090ae81, &(0x7f0000000940)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xe, 0x24, &(0x7f0000000640)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000071260000000000006706000002000000bf25000000000000620500000e0000007365000000000000bf540000000000000704000004faff003d4301000000000095000000000000005d54090000000000bf250000000000000f65000000000000070500000e000000bf5400000000000007040000040000003d4301e229cdb90095000000000000006154000000000000bf25000000000000070500000e0000b70b2c03c653e5001f650000000f65008000000000bf5400000000000007040000040000003d3201000000000095000000000000004d54000000000000b7000000000000009500e3dc000000003eeecf98f0dd040c56e31e01dd9d98032e867f88084acba73852d33e1490a4a8dc9381ac236fc6ab24340b5d31d85253f1af5f2bb72441c7cb00000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x2, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100000001, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0xb54, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x85c}, 0x0, 0x3, 0xffffffffffffffff, 0x3) accept$alg(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x20000001, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x84800) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f00000002c0)={{&(0x7f0000000240)=""/41, 0x29}, &(0x7f0000000280)}, 0x20) r3 = accept4(r0, 0x0, &(0x7f0000000080)=0xfffffe1f, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) pipe(&(0x7f0000000340)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000480)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps\x00') sendfile(r3, r4, &(0x7f0000000000), 0x7ffff000) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000380)=@assoc_value, &(0x7f00000003c0)=0x8) 20:56:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000100000000000000000000000000000000"], 0x18) [ 442.239558] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 442.258647] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.266372] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea [ 442.273650] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 [ 442.280931] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 442.288506] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 442.295784] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:08 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3f00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:08 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:08 executing program 4 (fault-call:3 fault-nth:26): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000500000000000000000000000000000000"], 0x18) [ 442.558393] FAULT_INJECTION: forcing a failure. [ 442.558393] name failslab, interval 1, probability 0, space 0, times 0 [ 442.602022] CPU: 1 PID: 19985 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 442.609442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.609449] Call Trace: [ 442.609475] dump_stack+0x1c4/0x2b4 [ 442.609499] ? dump_stack_print_info.cold.2+0x52/0x52 [ 442.609529] should_fail.cold.4+0xa/0x17 [ 442.634412] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 442.634430] ? zap_class+0x640/0x640 [ 442.634449] ? save_stack+0xa9/0xd0 [ 442.646955] ? save_stack+0x43/0xd0 [ 442.646968] ? kasan_kmalloc+0xc7/0xe0 [ 442.646990] ? __kmalloc_track_caller+0x14a/0x750 [ 442.659544] ? memdup_user+0x2c/0xa0 [ 442.659562] ? strndup_user+0x77/0xd0 [ 442.667137] ? ksys_mount+0x3c/0x140 [ 442.667155] ? do_syscall_64+0x1b9/0x820 [ 442.667172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.667192] ? zap_class+0x640/0x640 [ 442.667212] ? handle_mm_fault+0x42a/0xc70 [ 442.667229] ? zap_class+0x640/0x640 [ 442.667246] ? fs_reclaim_acquire+0x20/0x20 [ 442.667289] ? lock_downgrade+0x900/0x900 [ 442.667311] ? ___might_sleep+0x1ed/0x300 [ 442.667329] ? arch_local_save_flags+0x40/0x40 [ 442.667345] ? lock_release+0x970/0x970 [ 442.667361] ? arch_local_save_flags+0x40/0x40 [ 442.667383] __should_failslab+0x124/0x180 [ 442.667399] should_failslab+0x9/0x14 [ 442.667415] __kmalloc_track_caller+0x2d0/0x750 [ 442.667436] ? strncpy_from_user+0x510/0x510 [ 442.667453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.667467] ? strndup_user+0x77/0xd0 [ 442.667483] memdup_user+0x2c/0xa0 [ 442.667498] strndup_user+0x77/0xd0 [ 442.667513] ksys_mount+0x73/0x140 [ 442.667530] __x64_sys_mount+0xbe/0x150 [ 442.667549] do_syscall_64+0x1b9/0x820 [ 442.667565] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 442.667583] ? syscall_return_slowpath+0x5e0/0x5e0 [ 442.667598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.667616] ? trace_hardirqs_on_caller+0x310/0x310 [ 442.667633] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 442.667649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.667666] ? prepare_exit_to_usermode+0x291/0x3b0 [ 442.667687] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.667708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.667720] RIP: 0033:0x459fea 20:56:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000300000000000000000000000000000000"], 0x18) [ 442.667737] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 442.667745] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 442.667762] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea [ 442.667772] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 [ 442.667782] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 442.667798] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 20:56:08 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 442.667807] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 442.691172] loop0: p1 [ 442.692678] loop3: p1 20:56:08 executing program 4 (fault-call:3 fault-nth:27): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 443.017173] loop0: p1 [ 443.056928] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 443.064797] loop3: p1 [ 443.081751] FAULT_INJECTION: forcing a failure. [ 443.081751] name failslab, interval 1, probability 0, space 0, times 0 [ 443.109868] CPU: 1 PID: 20012 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 443.117305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.126682] Call Trace: [ 443.129317] dump_stack+0x1c4/0x2b4 [ 443.129351] ? dump_stack_print_info.cold.2+0x52/0x52 [ 443.138302] should_fail.cold.4+0xa/0x17 [ 443.142414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.147545] ? is_bpf_text_address+0xac/0x170 [ 443.152064] ? lock_downgrade+0x900/0x900 [ 443.156243] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 443.162093] ? kasan_check_read+0x11/0x20 [ 443.166483] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 443.171780] ? rcu_bh_qs+0xc0/0xc0 [ 443.175352] ? unwind_dump+0x190/0x190 [ 443.179299] ? fs_reclaim_acquire+0x20/0x20 [ 443.183648] ? lock_downgrade+0x900/0x900 [ 443.187939] ? ___might_sleep+0x1ed/0x300 [ 443.192228] ? arch_local_save_flags+0x40/0x40 [ 443.197045] __should_failslab+0x124/0x180 [ 443.201334] should_failslab+0x9/0x14 [ 443.205160] kmem_cache_alloc+0x2be/0x730 [ 443.209435] ? lock_acquire+0x1ed/0x520 [ 443.213438] getname_flags+0xd0/0x5a0 [ 443.217293] user_path_at_empty+0x2d/0x50 [ 443.221468] do_mount+0x177/0x31f0 [ 443.225033] ? ___might_sleep+0x1ed/0x300 [ 443.229322] ? copy_mount_string+0x40/0x40 [ 443.233582] ? copy_mount_options+0x5f/0x380 [ 443.238091] ? kasan_unpoison_shadow+0x35/0x50 [ 443.242873] ? kasan_kmalloc+0xc7/0xe0 [ 443.246798] ? kmem_cache_alloc_trace+0x31f/0x750 [ 443.251792] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.257352] ? _copy_from_user+0xdf/0x150 [ 443.261531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.267087] ? copy_mount_options+0x288/0x380 [ 443.271606] ksys_mount+0x12d/0x140 [ 443.275257] __x64_sys_mount+0xbe/0x150 [ 443.279315] do_syscall_64+0x1b9/0x820 [ 443.283350] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 443.288738] ? syscall_return_slowpath+0x5e0/0x5e0 [ 443.293701] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.298571] ? trace_hardirqs_on_caller+0x310/0x310 [ 443.303615] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 443.308657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.314218] ? prepare_exit_to_usermode+0x291/0x3b0 [ 443.319261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.324166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.329373] RIP: 0033:0x459fea [ 443.332590] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.351597] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 20:56:09 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460011000000000000000000000000000000000000"], 0x18) [ 443.359343] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea [ 443.366631] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 [ 443.373919] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 443.381457] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 443.388742] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001400000000000000000000000000000000"], 0x18) [ 443.471900] loop0: p1 20:56:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x1, 0x10}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000000c0)="5cc1b2d7a5c9fc19a7940597428dd1956276211103b77e1ee33fc2d2c8c1a405a0a66b3d2bbbcdaaabfc2805ebc2", &(0x7f0000000100)="dff1ada7a9eb93a2ba1c20126edd405da531090251259267f2e78151e7281e2e3db04e51853dedf9c73f8cdda15a3f3da3942404bec09f727fc1388178b048ebc05381ee60d04716c7c98fb7a01c68a112ac11537ef37ccb5c5e504f553ec59a2d2195d6"}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1d) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x37e}}) 20:56:09 executing program 4 (fault-call:3 fault-nth:28): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461200000000000000000000000000000000000000"], 0x18) 20:56:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 443.507460] loop3: p1 [ 443.516736] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 443.567074] FAULT_INJECTION: forcing a failure. [ 443.567074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.573001] print_req_error: 168 callbacks suppressed [ 443.573010] print_req_error: I/O error, dev loop0, sector 1 [ 443.578917] CPU: 0 PID: 20031 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 443.578928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.578934] Call Trace: [ 443.578961] dump_stack+0x1c4/0x2b4 [ 443.578985] ? dump_stack_print_info.cold.2+0x52/0x52 [ 443.579011] should_fail.cold.4+0xa/0x17 [ 443.579035] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.584650] print_req_error: I/O error, dev loop0, sector 1 [ 443.589951] ? debug_smp_processor_id+0x1c/0x20 [ 443.589968] ? perf_trace_lock+0x14d/0x7a0 [ 443.589990] ? mark_held_locks+0x130/0x130 [ 443.590005] ? zap_class+0x640/0x640 [ 443.590025] ? zap_class+0x640/0x640 [ 443.590046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.597573] buffer_io_error: 166 callbacks suppressed [ 443.597582] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 443.606852] ? check_preemption_disabled+0x48/0x200 [ 443.606873] ? debug_smp_processor_id+0x1c/0x20 [ 443.606888] ? perf_trace_lock+0x14d/0x7a0 [ 443.606904] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 443.606921] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.606935] ? should_fail+0x22d/0xd01 [ 443.606949] ? zap_class+0x640/0x640 [ 443.606970] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.609674] print_req_error: I/O error, dev loop0, sector 2 20:56:09 executing program 1: mremap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000007000/0x2000)=nil) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000000080000000, 0x80a00) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000001ffb)) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x4, 0x1]) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x2040, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400140, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r2) [ 443.613302] ? is_bpf_text_address+0xac/0x170 [ 443.613325] __alloc_pages_nodemask+0x34b/0xde0 [ 443.613349] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 443.618597] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 443.622614] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 443.622631] ? rcu_bh_qs+0xc0/0xc0 [ 443.622645] ? unwind_dump+0x190/0x190 [ 443.622672] ? fs_reclaim_acquire+0x20/0x20 [ 443.627953] print_req_error: I/O error, dev loop0, sector 3 [ 443.633487] ? lock_downgrade+0x900/0x900 [ 443.633509] ? ___might_sleep+0x1ed/0x300 [ 443.633528] ? trace_hardirqs_off+0xb8/0x310 [ 443.633549] cache_grow_begin+0x91/0x8c0 [ 443.638300] Buffer I/O error on dev loop0p1, logical block 2, async page read [ 443.642453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.642476] kmem_cache_alloc+0x665/0x730 [ 443.642498] getname_flags+0xd0/0x5a0 [ 443.647047] print_req_error: I/O error, dev loop0, sector 4 [ 443.650610] user_path_at_empty+0x2d/0x50 [ 443.650627] do_mount+0x177/0x31f0 [ 443.650647] ? ___might_sleep+0x1ed/0x300 [ 443.654403] Buffer I/O error on dev loop0p1, logical block 3, async page read [ 443.659903] ? copy_mount_string+0x40/0x40 [ 443.659917] ? copy_mount_options+0x5f/0x380 [ 443.659934] ? kasan_unpoison_shadow+0x35/0x50 [ 443.659949] ? kasan_kmalloc+0xc7/0xe0 [ 443.659970] ? kmem_cache_alloc_trace+0x31f/0x750 [ 443.659989] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.665341] print_req_error: I/O error, dev loop0, sector 5 [ 443.672450] ? _copy_from_user+0xdf/0x150 [ 443.672470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.672483] ? copy_mount_options+0x288/0x380 [ 443.672502] ksys_mount+0x12d/0x140 [ 443.672518] __x64_sys_mount+0xbe/0x150 [ 443.672540] do_syscall_64+0x1b9/0x820 [ 443.677615] Buffer I/O error on dev loop0p1, logical block 4, async page read [ 443.682224] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 443.682243] ? syscall_return_slowpath+0x5e0/0x5e0 [ 443.682258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.682306] ? trace_hardirqs_on_caller+0x310/0x310 [ 443.686674] print_req_error: I/O error, dev loop0, sector 6 [ 443.691557] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 443.691574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.691590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 443.691615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.697221] Buffer I/O error on dev loop0p1, logical block 5, async page read [ 443.701044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.701057] RIP: 0033:0x459fea 20:56:09 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xd56, 0x8000) write$P9_RRENAME(r0, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x6612, &(0x7f0000000040)) [ 443.701073] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 443.701087] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 [ 443.711143] print_req_error: I/O error, dev loop0, sector 7 [ 443.715684] ORIG_RAX: 00000000000000a5 [ 443.715695] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea [ 443.715705] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 [ 443.715714] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 443.715723] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 443.715733] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 443.771072] rtc_cmos 00:00: Alarms can be up to one day in the future [ 443.775376] Buffer I/O error on dev loop0p1, logical block 6, async page read [ 443.785868] print_req_error: I/O error, dev loop0, sector 8 [ 443.799821] Buffer I/O error on dev loop0p1, logical block 7, async page read [ 443.810598] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 443.813980] print_req_error: I/O error, dev loop0, sector 1 [ 443.824989] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 443.825437] Buffer I/O error on dev loop0p1, logical block 1, async page read 20:56:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000ffffffff000000000000000000000000"], 0x18) 20:56:10 executing program 4 (fault-call:3 fault-nth:29): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:10 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x27, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x100, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x361, 0x10400003) [ 444.178876] loop3: p1 20:56:10 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000b5e6bdbed0770cf084fe43b7ef984c3e0000a73d11108f872400"], 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADDIR(r1, &(0x7f0000000600)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYPTR, @ANYBLOB="4b38f14433ffea158dcba3ad472cc6b2e6823ec8054363b34bfc4d52c097ca00b150f2385eb8978cb4d92c239223ce6a8659d026de919262d35bf58491e1f79ef7420832e3e738dbd1fedec749f14398fd8968dd96b8de3f07d961e576e256b28f", @ANYRES32=r1, @ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES16=r0, @ANYBLOB="56e604b7e14eda5eb85e9401ce18ea91f0fee5c07cfb840ec7f2363b7bc67f181e287797f367080988fa3a2e737d55154212b8efb22046ae58298018818364b5b0a75c63436ac73410fe2c8ade244602b59bfe0609e033886fa1670c510154b76d64dec7af30", @ANYPTR64, @ANYRES32=r2, @ANYRES16=r1, @ANYRESDEC=r1, @ANYRESHEX=r2, @ANYBLOB="a6469c01242a1649b70cf665bb892a3e31466a07f4807d3aee105326677f602c039f8faa35f8bbb24ec667b960e7db85340e6f4e4ebcaa9865f919f332068091c2d6494fe8292cc8e5a1593f3ab3c1f5ecff89924fae4c641ccacea3e3c7c88b67b6f77301e454bfb9d4883a5e33069c6ef0f07840b22dccbba41a7916299e95371c7ecd1cc6f644bfd649b5875aa04ef663c4afdafd9973d54d43c4fb70bb16131fb157ad64b8c089c61ca1f04cf3ae04e626c2a81e09ebd82c5847fab630a325c216377136558096300fc578b85b7ba5abe9764c36028e858271a7778361836977d7"], @ANYRESOCT=r2, @ANYRES16, @ANYRESHEX=r1]], 0x8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)=@random={'user.', '#lo\'\x00'}) [ 444.244829] FAULT_INJECTION: forcing a failure. [ 444.244829] name failslab, interval 1, probability 0, space 0, times 0 [ 444.277579] loop0: p1 [ 444.280214] CPU: 1 PID: 20065 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 20:56:10 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x400080000005452, &(0x7f0000000000)='X') r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dfffd946ff20c0020200a0007000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') socket$inet6(0xa, 0x80006, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x100000000, @local, 0x3ff}, @in6={0xa, 0x4e23, 0x6, @local, 0x2}, @in6={0xa, 0x4e23, 0x100, @ipv4={[], [], @broadcast}, 0x5}, @in={0x2, 0x4e22}, @in6={0xa, 0x4e23, 0x3a8a, @local, 0x3}, @in={0x2, 0x4e23, @broadcast}], 0x90) [ 444.287632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.287638] Call Trace: [ 444.287666] dump_stack+0x1c4/0x2b4 [ 444.287688] ? dump_stack_print_info.cold.2+0x52/0x52 [ 444.287716] should_fail.cold.4+0xa/0x17 [ 444.287737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 444.287756] ? is_bpf_text_address+0xac/0x170 [ 444.287774] ? lock_downgrade+0x900/0x900 [ 444.287808] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 444.287831] ? kasan_check_read+0x11/0x20 [ 444.332327] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 444.332343] ? rcu_bh_qs+0xc0/0xc0 [ 444.332361] ? unwind_dump+0x190/0x190 [ 444.349627] ? zap_class+0x640/0x640 [ 444.353367] ? fs_reclaim_acquire+0x20/0x20 [ 444.353384] ? lock_downgrade+0x900/0x900 [ 444.353403] ? ___might_sleep+0x1ed/0x300 [ 444.353422] ? arch_local_save_flags+0x40/0x40 [ 444.370814] __should_failslab+0x124/0x180 [ 444.375073] should_failslab+0x9/0x14 [ 444.378898] kmem_cache_alloc+0x2be/0x730 [ 444.383073] ? zap_class+0x640/0x640 [ 444.386843] getname_flags+0xd0/0x5a0 [ 444.390667] user_path_at_empty+0x2d/0x50 [ 444.394837] do_mount+0x177/0x31f0 [ 444.398398] ? kasan_check_read+0x11/0x20 [ 444.402567] ? do_raw_spin_unlock+0xa7/0x2f0 [ 444.407086] ? copy_mount_string+0x40/0x40 [ 444.411342] ? kasan_check_write+0x14/0x20 [ 444.415595] ? copy_mount_options+0x5f/0x380 [ 444.420025] ? kasan_unpoison_shadow+0x35/0x50 [ 444.424627] ? kasan_kmalloc+0xc7/0xe0 [ 444.428628] ? kmem_cache_alloc_trace+0x31f/0x750 [ 444.433499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 444.439151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.444714] ? copy_mount_options+0x288/0x380 [ 444.449235] ksys_mount+0x12d/0x140 [ 444.452918] __x64_sys_mount+0xbe/0x150 [ 444.456921] do_syscall_64+0x1b9/0x820 [ 444.460833] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 444.466219] ? syscall_return_slowpath+0x5e0/0x5e0 [ 444.471338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.476205] ? trace_hardirqs_on_caller+0x310/0x310 [ 444.481243] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 444.486328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.491895] ? prepare_exit_to_usermode+0x291/0x3b0 [ 444.496941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.501895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.507105] RIP: 0033:0x459fea [ 444.510327] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 444.510336] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 444.510357] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea 20:56:10 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfeffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 444.544465] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 [ 444.551753] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 444.559048] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 444.566336] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000020000000000000000000000000000000000"], 0x18) 20:56:10 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xa, 0xe, 0xe9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x10) getsockopt$inet_int(r2, 0x0, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x8000) ioctl$sock_netdev_private(r3, 0x89fa, &(0x7f0000000280)="c8c7beadfd6e8a0593bffdb2a598c0804fcc323ab970d35c") ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x81, 0x6, [0x2, 0x3, 0x7f00000000000000, 0x5d, 0x800, 0x3]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000340)={r4, 0x80000000}, &(0x7f0000000380)=0x8) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x1c) ioctl$sock_proto_private(r0, 0x541b, &(0x7f00000001c0)="5ec2f0f6d2fe07cec51377f056cfe77e7f6db92ea3785ed6696187c3e01a322e3633cec05267dfa698566540a7f5174f4fef") [ 444.600229] netlink: 'syz-executor1': attribute type 1 has an invalid length. 20:56:10 executing program 4 (fault-call:3 fault-nth:30): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0x3, 0xc003, 0x61, 0x14}, 0x22) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="42bfa3396d757852ab1a57a3e248143cca74cdb43ea93651386f4fe6983a238d01c58368a1c0707c547ecded3dc98d8aa9d18bfd932ec9d3100262f888b3e19d6d5e98169c77a1bf1f1137bb7032bf178089661758fdee5cbe70fd29353f61907d9faba77f26262d1e68e436717efc4127ecc1c0f67c735dea1a80c4b0905748d714715e7deaf7cedc210668292d54a08e856fb00872802aa3533fe6bbb37253b2626e22d78a77fe3d756da09e99db427818a32dbcf0b05c93f64301b3c3a78098c490ab61dee9b1dee4f16e01578fb0c5e6362a05a63430378fee12ebc7d3f8991369c3f5f797fd04c6f2bcb712e73a28d04b56239a6ee144907d45dd7171fc") getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) 20:56:10 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfeffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc8000080}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x150, r4, 0x208, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x496bcbea}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1d5834f3}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x78}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xcf}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xb9}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x62}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x400c000}, 0x20040000) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0xff}, 0x0, @in6=@dev}}, 0xe8) dup3(r1, r2, 0x0) [ 444.753039] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 444.763389] loop3: p1 [ 444.792451] FAULT_INJECTION: forcing a failure. 20:56:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000011000000000000000000000000"], 0x18) [ 444.792451] name failslab, interval 1, probability 0, space 0, times 0 [ 444.807890] loop0: p1 [ 444.833683] CPU: 1 PID: 20097 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 444.841209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.850585] Call Trace: [ 444.853202] dump_stack+0x1c4/0x2b4 [ 444.856860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 444.862650] should_fail.cold.4+0xa/0x17 [ 444.866740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 444.871875] ? save_stack+0xa9/0xd0 [ 444.875528] ? save_stack+0x43/0xd0 [ 444.879180] ? kmem_cache_alloc_trace+0x152/0x750 [ 444.884044] ? kobject_uevent_env+0x2f3/0x101e [ 444.888652] ? kobject_uevent+0x1f/0x24 [ 444.892655] ? loop_clr_fd+0x607/0xd00 [ 444.896567] ? lo_ioctl+0x875/0x1d80 [ 444.900546] ? blkdev_ioctl+0x9ac/0x2010 [ 444.904637] ? block_ioctl+0xee/0x130 [ 444.908464] ? ksys_ioctl+0xa9/0xd0 [ 444.912114] ? __x64_sys_ioctl+0x73/0xb0 [ 444.916207] ? do_syscall_64+0x1b9/0x820 [ 444.920313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.920339] ? zap_class+0x640/0x640 [ 444.929435] ? fs_reclaim_acquire+0x20/0x20 [ 444.933778] ? lock_downgrade+0x900/0x900 [ 444.933806] ? ___might_sleep+0x1ed/0x300 [ 444.933825] ? lock_downgrade+0x900/0x900 [ 444.946316] ? arch_local_save_flags+0x40/0x40 20:56:10 executing program 1: r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0xf82}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(r1, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) sendto$inet(r1, &(0x7f0000000180)="9b", 0x1, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd603ef6fa00140000ff010000000000000000000000000001ff020000000000000000000000000001000000005dc38491af8837a1e5cc74000000000000002389fbcdfcdce9de4909b5f096df61f129142ebf82ba71d8cf722f1a4ddd15012a4015ee4e8d46044ea2e82c91a9fa7b3a656d9aca8fd0226ee548b60b55dd7bd77ec4679e14928dd949d3ff97448316b50b799ec0ebeac6f21c118d8910c02c0297e274cc455929f3aa18b4cd92660db71220aeb2af3ce7c4dea89cc2310b1b372b05d74a", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], &(0x7f0000000580)={0x0, 0x3, [0x0, 0xe5f]}) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000080)=@bridge_delneigh={0x1c, 0x1d, 0x5}, 0x1c}}, 0x0) 20:56:10 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000140), 0x4) set_mempolicy(0x3, &(0x7f0000000100)=0x5718fe8f, 0x4f) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000000)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) [ 444.950937] __should_failslab+0x124/0x180 [ 444.955195] should_failslab+0x9/0x14 [ 444.959024] __kmalloc+0x2d4/0x760 [ 444.962591] ? kobject_get_path+0xc2/0x1b0 [ 444.966849] ? kmem_cache_alloc_trace+0x31f/0x750 [ 444.971717] kobject_get_path+0xc2/0x1b0 [ 444.975815] kobject_uevent_env+0x314/0x101e [ 444.980261] kobject_uevent+0x1f/0x24 [ 444.984119] loop_clr_fd+0x607/0xd00 [ 444.987867] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 444.993855] ? zap_class+0x640/0x640 [ 444.993879] lo_ioctl+0x875/0x1d80 20:56:10 executing program 5: r0 = socket(0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1, 0x4599}, 0x8) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000380), &(0x7f0000000880)=0x4) write(0xffffffffffffffff, &(0x7f00000000c0)='"\x00\x00\x00^\x00\a!\x00O', 0xa) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@privport='privport'}], [{@smackfstransmute={'smackfstransmute'}}]}}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rtc0\x00', 0x20040, 0x0) execveat(r3, &(0x7f0000000540)='./file0\x00', &(0x7f0000000600)=[&(0x7f0000000580)='afid', &(0x7f00000005c0)='em0\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='trans=unix,', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='trans=unix,', &(0x7f0000000700)='afid'], 0x1000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x200000000000805, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x200000, 0x0) write$uinput_user_dev(r5, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r5, 0x40045564, 0x0) ioctl$UI_SET_RELBIT(r5, 0x40045566, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000bc0)=0xc) ioctl$UI_DEV_SETUP(r5, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@mcast2, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a00)=0xe8) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) socket$inet6(0xa, 0x0, 0x0) r6 = memfd_create(&(0x7f0000000080)='.\x00', 0x0) dup2(0xffffffffffffffff, r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r6, &(0x7f0000000040), 0x0) [ 444.993901] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 445.006968] ? lo_rw_aio_complete+0x470/0x470 [ 445.011491] blkdev_ioctl+0x9ac/0x2010 [ 445.015402] ? blkpg_ioctl+0xc10/0xc10 [ 445.019324] ? lock_downgrade+0x900/0x900 [ 445.019347] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 445.019367] ? __kernel_text_address+0xd/0x40 [ 445.029338] ? unwind_get_return_address+0x61/0xa0 [ 445.029358] ? __save_stack_trace+0x8d/0xf0 [ 445.029380] ? __fget+0x4d1/0x740 [ 445.046619] ? ksys_dup3+0x680/0x680 [ 445.050359] ? kasan_slab_free+0xe/0x10 [ 445.054356] ? ksys_mount+0xa3/0x140 [ 445.058090] ? __x64_sys_mount+0xbe/0x150 [ 445.062261] ? do_syscall_64+0x1b9/0x820 [ 445.062306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.062330] block_ioctl+0xee/0x130 [ 445.062348] ? blkdev_fallocate+0x400/0x400 [ 445.071800] do_vfs_ioctl+0x1de/0x1720 [ 445.071816] ? kasan_check_write+0x14/0x20 [ 445.071835] ? ioctl_preallocate+0x300/0x300 [ 445.071852] ? __fget_light+0x2e9/0x430 [ 445.071870] ? fget_raw+0x20/0x20 [ 445.087972] ? trace_hardirqs_on+0xbd/0x310 [ 445.087988] ? ksys_mount+0xa3/0x140 [ 445.088005] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 445.088023] ? __kasan_slab_free+0x119/0x150 [ 445.104337] ? security_file_ioctl+0x94/0xc0 [ 445.104358] ksys_ioctl+0xa9/0xd0 [ 445.104377] __x64_sys_ioctl+0x73/0xb0 [ 445.104396] do_syscall_64+0x1b9/0x820 [ 445.104419] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 445.122591] ? syscall_return_slowpath+0x5e0/0x5e0 [ 445.122607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.122626] ? trace_hardirqs_on_caller+0x310/0x310 20:56:11 executing program 4 (fault-call:3 fault-nth:31): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 445.122643] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 445.122662] ? prepare_exit_to_usermode+0x291/0x3b0 [ 445.139422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.139448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.139459] RIP: 0033:0x4573e7 [ 445.139478] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.149050] input: syz1 as /devices/virtual/input/input22 [ 445.149251] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.149293] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 [ 445.149302] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 445.149312] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 445.149321] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 445.149330] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 445.237737] loop3: p1 [ 445.290759] input: syz1 as /devices/virtual/input/input23 [ 445.308532] FAULT_INJECTION: forcing a failure. [ 445.308532] name failslab, interval 1, probability 0, space 0, times 0 [ 445.309828] loop0: p1 [ 445.329384] CPU: 1 PID: 20133 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 445.336929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.346327] Call Trace: [ 445.349216] dump_stack+0x1c4/0x2b4 [ 445.352960] ? dump_stack_print_info.cold.2+0x52/0x52 [ 445.358252] should_fail.cold.4+0xa/0x17 [ 445.362463] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 445.367596] ? debug_smp_processor_id+0x1c/0x20 [ 445.372307] ? perf_trace_lock+0x14d/0x7a0 [ 445.376563] ? debug_smp_processor_id+0x1c/0x20 [ 445.381348] ? perf_trace_lock+0x14d/0x7a0 [ 445.385605] ? zap_class+0x640/0x640 [ 445.389337] ? zap_class+0x640/0x640 [ 445.393072] ? rcu_is_watching+0x30/0x30 [ 445.397145] ? zap_class+0x640/0x640 [ 445.400879] ? __dentry_kill+0x51f/0x7a0 [ 445.405102] ? zap_class+0x640/0x640 [ 445.408834] ? fs_reclaim_acquire+0x20/0x20 [ 445.413172] ? lock_downgrade+0x900/0x900 [ 445.417342] ? ___might_sleep+0x1ed/0x300 [ 445.421511] ? arch_local_save_flags+0x40/0x40 [ 445.426113] ? zap_class+0x640/0x640 [ 445.429910] __should_failslab+0x124/0x180 [ 445.434160] should_failslab+0x9/0x14 [ 445.438063] __kmalloc_track_caller+0x2d0/0x750 [ 445.442745] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 445.447415] ? kasan_check_write+0x14/0x20 [ 445.451670] ? do_raw_spin_lock+0xc1/0x200 [ 445.455922] ? ext4_remount+0x117/0x2640 [ 445.460004] kstrdup+0x39/0x70 [ 445.463215] ext4_remount+0x117/0x2640 [ 445.467125] ? is_subdir+0x4a0/0x4a0 [ 445.470853] ? list_lru_walk_node+0x20d/0x280 [ 445.475372] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 445.481065] ? ext4_register_li_request+0x9b0/0x9b0 [ 445.486100] ? shrink_dentry_list+0x800/0x800 [ 445.490610] ? do_mount+0xbcc/0x31f0 [ 445.494348] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 445.499903] ? apparmor_capable+0x355/0x6c0 [ 445.504373] do_remount_sb+0x350/0x7b0 [ 445.508304] ? ext4_register_li_request+0x9b0/0x9b0 [ 445.513346] ? user_get_super+0x250/0x250 [ 445.517691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.523242] ? security_capable+0x99/0xc0 [ 445.527430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.532984] ? ns_capable_common+0x13f/0x170 [ 445.537414] do_mount+0x1513/0x31f0 [ 445.541244] ? kasan_check_read+0x11/0x20 [ 445.545434] ? copy_mount_string+0x40/0x40 [ 445.549683] ? kasan_check_write+0x14/0x20 [ 445.553933] ? kasan_unpoison_shadow+0x35/0x50 [ 445.558531] ? kasan_kmalloc+0xc7/0xe0 [ 445.562572] ? kmem_cache_alloc_trace+0x31f/0x750 [ 445.567490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 445.573046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.578597] ? copy_mount_options+0x288/0x380 [ 445.583120] ksys_mount+0x12d/0x140 [ 445.586835] __x64_sys_mount+0xbe/0x150 [ 445.590920] do_syscall_64+0x1b9/0x820 [ 445.595027] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 445.600408] ? syscall_return_slowpath+0x5e0/0x5e0 [ 445.605350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.610211] ? trace_hardirqs_on_caller+0x310/0x310 [ 445.615241] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 445.620319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.625871] ? prepare_exit_to_usermode+0x291/0x3b0 [ 445.630905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.635768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.640974] RIP: 0033:0x459fea [ 445.644184] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 445.663329] RSP: 002b:00007f7189a15a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 445.671055] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 0000000000459fea [ 445.678454] RDX: 00007f7189a15ad0 RSI: 0000000020000140 RDI: 00007f7189a15af0 20:56:11 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x27) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000004000000000000000000000000"], 0x18) 20:56:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x10101, 0x0) chmod(&(0x7f0000000480)='./file0\x00', 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f0000000140)=ANY=[]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x400000000f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x22102, 0x0) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000740)={0x0, 0x8000}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000007c0)={r2, 0xa9}, 0x8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000800)={0x360, 0x6f2abe09, 0x2, 0x3f, 0x7, 0x71e, 0x100000001, 0x40, 0x2, 0x8, 0x0, 0x3ff8000000}) getgroups(0x2, &(0x7f0000000600)=[0xee01, 0xee00]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0, 0x0}, &(0x7f0000000680)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000006c0)={{}, {0x1, 0x2}, [], {0x4, 0x6}, [{0x8, 0x4, r3}, {0x8, 0x1, r4}, {0x8, 0x2, r5}, {0x8, 0x4, r6}, {0x8, 0x7, r7}], {0x10, 0xffffffffffffffff}, {0x20, 0x4}}, 0x4c, 0x0) ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000040)={0xffffffffffff48f4, 0x1}) ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) [ 445.685738] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 445.693019] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 445.700323] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:11 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0ffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:11 executing program 4 (fault-call:3 fault-nth:32): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:11 executing program 5: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x9, 0x400001) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000440)) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) recvmsg(r1, &(0x7f0000002a00)={&(0x7f00000003c0)=@xdp, 0x80, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1, &(0x7f0000002900)=""/213, 0xd5}, 0x0) capset(&(0x7f0000000240)={0x20071026}, &(0x7f0000000280)={0x3, 0x1, 0x7, 0x2, 0x7}) r4 = dup3(0xffffffffffffffff, r0, 0xc4dba75f1d8a8602) ioctl$UI_SET_SWBIT(r4, 0x4004556d, 0x6) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000000)=0x2) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) getgroups(0x3, &(0x7f0000001100)=[0xee01, 0xee00, 0x0]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000011c0)={{{@in=@remote, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000012c0)=0xe8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r2, 0x0, 0x6, &(0x7f00000000c0)='vcan0\x00', 0xffffffffffffffff}, 0x30) getpgid(r5) stat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000a8f4dd5a1f083f897727e1ab1ea975ef6005d582f18e9f4ae4ae0a3b68b173c75c56c4f7d7512b88040ca87e6cf52a687e8183a13f4601202d4bb7f7a7889d9433f1971cba285c3080190d000001009c270063404f381947fbcd15c7a2fb193cfc42e10ce7fc72f7e64cfab7b760da78ebfd7b1540de5f3f93b244e826f4a28add2357e7476ce3589b43da68f85bfe58c81eaaba800c13b4584964a32b1efee2c94ce4705b1d6ca48146a0274501baa8bbed821d65ccf7f82851093ca2df7eca7487022e7033628bcc2d62e4d040926ad03338ddc01f191555a148eca6e4428ea8ee75232cc33c8ba58e1a25f977"], 0x7e) 20:56:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46001e000000000000000000000000000000000000"], 0x18) [ 445.867204] loop3: p1 [ 445.894491] loop0: p1 [ 445.902224] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 445.937307] FAULT_INJECTION: forcing a failure. [ 445.937307] name failslab, interval 1, probability 0, space 0, times 0 [ 445.949199] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 445.964635] CPU: 1 PID: 20156 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 445.972056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.981616] Call Trace: [ 445.984340] dump_stack+0x1c4/0x2b4 [ 445.988004] ? dump_stack_print_info.cold.2+0x52/0x52 [ 445.993232] should_fail.cold.4+0xa/0x17 [ 445.997350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 446.002478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.008291] ? wake_up_klogd+0x11a/0x180 [ 446.012378] ? console_device+0xc0/0xc0 [ 446.016420] ? vprintk_emit+0x322/0x930 [ 446.020419] ? __down_trylock_console_sem+0x155/0x200 [ 446.025647] ? wake_up_klogd+0x180/0x180 [ 446.029734] ? do_raw_spin_lock+0xc1/0x200 [ 446.034008] ? zap_class+0x640/0x640 [ 446.037748] ? fs_reclaim_acquire+0x20/0x20 [ 446.042092] ? lock_downgrade+0x900/0x900 [ 446.046296] ? ___might_sleep+0x1ed/0x300 [ 446.050480] ? arch_local_save_flags+0x40/0x40 [ 446.055090] ? vprintk_default+0x28/0x30 [ 446.059181] __should_failslab+0x124/0x180 [ 446.063438] should_failslab+0x9/0x14 [ 446.067308] kmem_cache_alloc_trace+0x2d7/0x750 [ 446.072053] kobject_uevent_env+0x2f3/0x101e [ 446.076683] kobject_uevent+0x1f/0x24 [ 446.080505] loop_clr_fd+0x607/0xd00 [ 446.080527] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 446.080543] ? zap_class+0x640/0x640 [ 446.080563] lo_ioctl+0x875/0x1d80 [ 446.097391] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 446.103220] ? lo_rw_aio_complete+0x470/0x470 [ 446.107741] blkdev_ioctl+0x9ac/0x2010 [ 446.111653] ? blkpg_ioctl+0xc10/0xc10 [ 446.115564] ? lock_downgrade+0x900/0x900 [ 446.119741] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 446.125558] ? __kernel_text_address+0xd/0x40 [ 446.130072] ? unwind_get_return_address+0x61/0xa0 [ 446.135025] ? __save_stack_trace+0x8d/0xf0 [ 446.139372] ? __fget+0x4d1/0x740 [ 446.142847] ? ksys_dup3+0x680/0x680 [ 446.146637] ? kasan_slab_free+0xe/0x10 [ 446.150625] ? ksys_mount+0xa3/0x140 [ 446.154348] ? __x64_sys_mount+0xbe/0x150 [ 446.158517] ? do_syscall_64+0x1b9/0x820 [ 446.162594] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.167984] block_ioctl+0xee/0x130 [ 446.171626] ? blkdev_fallocate+0x400/0x400 [ 446.175960] do_vfs_ioctl+0x1de/0x1720 [ 446.179906] ? kasan_check_write+0x14/0x20 [ 446.184160] ? ioctl_preallocate+0x300/0x300 [ 446.188582] ? __fget_light+0x2e9/0x430 [ 446.192568] ? fget_raw+0x20/0x20 [ 446.196034] ? trace_hardirqs_on+0xbd/0x310 [ 446.200359] ? ksys_mount+0xa3/0x140 [ 446.204075] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 446.209537] ? __kasan_slab_free+0x119/0x150 [ 446.213958] ? security_file_ioctl+0x94/0xc0 [ 446.218380] ksys_ioctl+0xa9/0xd0 [ 446.221849] __x64_sys_ioctl+0x73/0xb0 [ 446.225746] do_syscall_64+0x1b9/0x820 [ 446.229639] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 446.235010] ? syscall_return_slowpath+0x5e0/0x5e0 [ 446.239941] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.244796] ? trace_hardirqs_on_caller+0x310/0x310 [ 446.249822] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 446.254846] ? prepare_exit_to_usermode+0x291/0x3b0 [ 446.259872] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.264729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.269935] RIP: 0033:0x4573e7 [ 446.273135] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.292036] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.299757] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 [ 446.307031] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 446.314301] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 446.321570] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 446.328844] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:12 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x1}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0x4000, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000380)={0x14, 0x13, 0x2, {0x7c, 0x4, 0x3}}, 0x14) fsetxattr$security_selinux(r1, &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:power_device_t:s0\x00', 0x24, 0x2) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0x0, 0xff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) truncate(&(0x7f0000000300)='./bus\x00', 0xa00) getsockname$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) r4 = getpid() ptrace(0x11, r4) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r5, 0x401104000000016) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e21, @loopback}, 0x10) 20:56:12 executing program 4 (fault-call:3 fault-nth:33): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 446.367044] loop3: p1 20:56:12 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffa0008000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460014000000000000000000000000000000000000"], 0x18) [ 446.472149] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 446.492465] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 446.516126] audit: type=1804 audit(1538859372.383:208): pid=20183 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir823616888/syzkaller.BgEhPl/352/bus" dev="sda1" ino=16566 res=1 [ 446.566604] FAULT_INJECTION: forcing a failure. [ 446.566604] name failslab, interval 1, probability 0, space 0, times 0 [ 446.566607] loop3: p1 [ 446.602026] CPU: 0 PID: 20175 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 446.609525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.619131] Call Trace: [ 446.621752] dump_stack+0x1c4/0x2b4 [ 446.625500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 446.630721] should_fail.cold.4+0xa/0x17 [ 446.630743] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 446.630761] ? __save_stack_trace+0x8d/0xf0 [ 446.630790] ? save_stack+0x43/0xd0 [ 446.630809] ? kasan_kmalloc+0xc7/0xe0 [ 446.644474] ? kasan_slab_alloc+0x12/0x20 [ 446.644490] ? kmem_cache_alloc_node+0x144/0x730 [ 446.644508] ? alloc_uevent_skb+0x84/0x1da 20:56:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000003f000000000000000000000000"], 0x18) 20:56:12 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 446.644521] ? kobject_uevent_env+0xa52/0x101e [ 446.644535] ? kobject_uevent+0x1f/0x24 [ 446.644555] ? loop_clr_fd+0x607/0xd00 [ 446.652081] ? lo_ioctl+0x875/0x1d80 [ 446.652097] ? blkdev_ioctl+0x9ac/0x2010 [ 446.652115] ? zap_class+0x640/0x640 [ 446.652133] ? fs_reclaim_acquire+0x20/0x20 [ 446.652149] ? lock_downgrade+0x900/0x900 [ 446.652169] ? ___might_sleep+0x1ed/0x300 [ 446.702117] ? arch_local_save_flags+0x40/0x40 [ 446.702134] ? kmem_cache_alloc_node+0x5ac/0x730 [ 446.702156] __should_failslab+0x124/0x180 [ 446.702170] should_failslab+0x9/0x14 [ 446.702186] kmem_cache_alloc_node_trace+0x270/0x740 [ 446.702199] ? kasan_unpoison_shadow+0x35/0x50 [ 446.702212] ? kasan_kmalloc+0xc7/0xe0 [ 446.702234] __kmalloc_node_track_caller+0x33/0x70 [ 446.702256] __kmalloc_reserve.isra.39+0x41/0xe0 [ 446.743636] __alloc_skb+0x155/0x770 [ 446.743655] ? skb_scrub_packet+0x490/0x490 [ 446.751734] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 446.751748] ? pointer+0x990/0x990 [ 446.751766] ? device_get_devnode+0x2d0/0x2d0 [ 446.751786] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 446.751814] ? netlink_has_listeners+0x2cb/0x4a0 [ 446.776103] ? netlink_tap_init_net+0x3d0/0x3d0 [ 446.776123] alloc_uevent_skb+0x84/0x1da [ 446.776147] kobject_uevent_env+0xa52/0x101e [ 446.789420] kobject_uevent+0x1f/0x24 [ 446.789438] loop_clr_fd+0x607/0xd00 [ 446.789458] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 446.789481] lo_ioctl+0x875/0x1d80 [ 446.789505] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 446.812128] ? lo_rw_aio_complete+0x470/0x470 [ 446.812149] blkdev_ioctl+0x9ac/0x2010 [ 446.812166] ? blkpg_ioctl+0xc10/0xc10 [ 446.812181] ? lock_downgrade+0x900/0x900 [ 446.812203] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 446.812220] ? __kernel_text_address+0xd/0x40 [ 446.812242] ? unwind_get_return_address+0x61/0xa0 [ 446.843923] ? __save_stack_trace+0x8d/0xf0 [ 446.843946] ? __fget+0x4d1/0x740 [ 446.843967] ? ksys_dup3+0x680/0x680 [ 446.843980] ? kasan_slab_free+0xe/0x10 [ 446.843991] ? ksys_mount+0xa3/0x140 [ 446.844002] ? __x64_sys_mount+0xbe/0x150 [ 446.844017] ? do_syscall_64+0x1b9/0x820 [ 446.844033] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.844061] block_ioctl+0xee/0x130 [ 446.881068] ? blkdev_fallocate+0x400/0x400 [ 446.881086] do_vfs_ioctl+0x1de/0x1720 [ 446.881100] ? kasan_check_write+0x14/0x20 [ 446.881119] ? ioctl_preallocate+0x300/0x300 [ 446.881135] ? __fget_light+0x2e9/0x430 [ 446.881151] ? fget_raw+0x20/0x20 [ 446.881171] ? trace_hardirqs_on+0xbd/0x310 [ 446.881185] ? ksys_mount+0xa3/0x140 [ 446.881201] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 446.881218] ? __kasan_slab_free+0x119/0x150 [ 446.881238] ? security_file_ioctl+0x94/0xc0 [ 446.881257] ksys_ioctl+0xa9/0xd0 [ 446.881310] __x64_sys_ioctl+0x73/0xb0 [ 446.881327] do_syscall_64+0x1b9/0x820 [ 446.881343] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 446.881363] ? syscall_return_slowpath+0x5e0/0x5e0 [ 446.950764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.950787] ? trace_hardirqs_on_caller+0x310/0x310 [ 446.950802] ? prepare_exit_to_usermode+0x3b0/0x3b0 20:56:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00') getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f00000000c0)="058fcc99b7fbb864c2c5e6303e25a8d180ac19bf3a48957295c3ef9afb3535af3b48f71f52808131fd8c67601159e77cc2c699313e9ee407fe8a155726666b2060253a22a400685ce3b835b5a0efdb35810441ffe2a27249447f8d8a3774b0740c5f57585e75a2f3bf261539873d5ce4ee1e45d55f6e6cd2537eb98741791cc29b43ca9cdbd7f8829b6733c08695b57064bc1e8e48e93c949b38d475b597bf759fc541d68ab2b45992ab97fe98754a91d50c65eb246f4e240461f8d8571076209b74ee5b09f9eb84"}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) fanotify_mark(r0, 0x8c, 0x21, r0, &(0x7f0000000200)='./file0\x00') mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x8010, r0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xd) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001300)={r0, &(0x7f0000000240)="986a8ca3d9fc33dc66a70d67d702526d6374fdd12a92724cdee7afc490f5e9d32667de3b893c2f3e4a100f458a4641d78e2079979639a04a3f494525f4d2ed41bad70b8ea89404748c59e765b063f63523e0a675fbc531c850f0296f6de36ad77ba8c413c347029ae48820a02b9ded4a1604819cf8cfa07bd9d71d1c0f3235d7aa1a4a1a86ab0ec7069e9b3a9135ae5fa891b5eb11c4ab69dd7989ac171a0f6cf3c620da902446d0d25691010701ec4e8ad0", &(0x7f0000000300)=""/4096}, 0x18) unlinkat(r0, &(0x7f0000001340)='./file0\x00', 0x200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001480)={r0, 0x10, &(0x7f0000001440)={&(0x7f00000013c0)=""/118, 0x76, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001500)={r0, 0x10, &(0x7f00000014c0)={&(0x7f0000001380)=""/63, 0x3f, r1}}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001540)=@assoc_value={0x0, 0x5}, &(0x7f0000001580)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000015c0)={r2, 0x10001, 0x8}, 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000001680)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000001600)={0x1, 0x70, 0xffffffff, 0x0, 0x5, 0x100000001, 0x0, 0xae, 0x4b024, 0x4, 0x7, 0x20, 0x0, 0x8, 0x400000004000000, 0x0, 0x11c300, 0x10000, 0x5, 0x8, 0x80000001, 0x8, 0x4, 0x8001, 0x1, 0x8, 0x9, 0x1, 0x9, 0x10000, 0x100000000, 0x200, 0x4000000000000000, 0x2, 0x7ff, 0x7, 0x0, 0x6, 0x0, 0x5, 0x4, @perf_config_ext={0x4, 0x1}, 0x8000, 0x100000001, 0x2, 0x6, 0xffffffffffffff80, 0x4, 0x5}, r3, 0xa, r0, 0xa) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000016c0)={0x24b, 0x8001, 0x8, 0x1, 0x71fa180d, 0x0, 0xc9, 0x4, r2}, 0x20) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000001700)=0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001740)=@assoc_value={r2, 0x2}, &(0x7f0000001780)=0x8) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000001800)={0x34, 0x0, &(0x7f00000017c0)}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001840)={r2, 0x40}, &(0x7f0000001880)=0x8) setsockopt$sock_int(r4, 0x1, 0x2a, &(0x7f00000018c0)=0x9, 0x4) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000001900)={0x3, 0x401, 0x1ff, 0xf6, 0x800, 0x6, 0x100000000, 0x3, 0x20, 0x8000, 0x3}, 0xb) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001940), 0x4) pipe(&(0x7f0000001980)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000019c0)=""/131, &(0x7f0000001a80)=0x83) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000001ac0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000001b00)) write$FUSE_INIT(r0, &(0x7f0000001b40)={0x50, 0xffffffffffffffda, 0x8, {0x7, 0x1b, 0x2d516781, 0x104200, 0x1, 0x7fffffff, 0x3cea24e2, 0x9}}, 0x50) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000001bc0)={r2, 0x100000001}, &(0x7f0000001c00)=0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001c80)={'syzkaller0\x00', &(0x7f0000001c40)=@ethtool_ts_info={0x41, 0xcb, 0x8000, 0x8, [0xff, 0x0, 0x9], 0x6, [0x10000, 0xffffffff, 0x7]}}) [ 446.950817] ? prepare_exit_to_usermode+0x291/0x3b0 [ 446.950837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.950859] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.981046] RIP: 0033:0x4573e7 20:56:12 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xebffffff00000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 446.981065] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:56:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r3 = syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000080)={0x2}) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x401}) ioctl$DRM_IOCTL_GEM_CLOSE(r4, 0x40086409, &(0x7f0000000140)={r5}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40040, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x1, 0x4) r7 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') recvmmsg(r6, &(0x7f0000002d40)=[{{&(0x7f0000001500)=@ipx, 0x80, &(0x7f0000001640)=[{&(0x7f0000001580)=""/173, 0xad}], 0x1, &(0x7f0000001680)=""/117, 0x75, 0x7ff}, 0x1ff}, {{&(0x7f0000001700)=@xdp, 0x80, &(0x7f0000001880)=[{&(0x7f0000001780)=""/122, 0x7a}, {&(0x7f0000001800)=""/14, 0xe}, {&(0x7f0000001840)}], 0x3, &(0x7f00000018c0)=""/30, 0x1e, 0x10001}, 0x8001}, {{&(0x7f0000001900)=@hci, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000001980)=""/79, 0x4f}, {&(0x7f0000001a00)=""/33, 0x21}, {&(0x7f0000001a40)=""/118, 0x76}, {&(0x7f0000001ac0)=""/4096, 0x1000}], 0x4, 0x0, 0x0, 0x2}, 0x40}, {{&(0x7f0000002b00)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002b80)=""/79, 0x4f}, {&(0x7f0000002c00)=""/9, 0x9}], 0x2, &(0x7f0000002c80)=""/169, 0xa9, 0xff}, 0xfffffffffffffe01}], 0x4, 0x2121, &(0x7f0000002e40)) getsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000003000)={@empty, @local, 0x0}, &(0x7f0000003040)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000003b00)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003c00)=0xe8) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000003c40)={0x0, @local, @local}, &(0x7f0000003c80)=0xc) getpeername$packet(r6, &(0x7f0000005f40)={0x11, 0x0, 0x0}, &(0x7f0000005f80)=0x14) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000005fc0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000060c0)=0xe8) accept$packet(r4, &(0x7f0000006100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006140)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000006180)={'dummy0\x00', 0x0}) recvmsg$kcm(r6, &(0x7f0000006880)={&(0x7f00000061c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006780)=[{&(0x7f0000006240)=""/118, 0x76}, {&(0x7f00000062c0)=""/41, 0x29}, {&(0x7f0000006300)=""/188, 0xbc}, {&(0x7f00000063c0)=""/4, 0x4}, {&(0x7f0000006400)=""/39, 0x27}, {&(0x7f0000006440)=""/143, 0x8f}, {&(0x7f0000006500)=""/252, 0xfc}, {&(0x7f0000006600)=""/44, 0x2c}, {&(0x7f0000006640)=""/233, 0xe9}, {&(0x7f0000006740)=""/25, 0x19}], 0xa, &(0x7f0000006840)=""/9, 0x9, 0x1a}, 0x0) accept$packet(r6, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006900)=0x14) getpeername(r4, &(0x7f0000006940)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000069c0)=0x80) getsockname$packet(r4, &(0x7f0000006a00)={0x11, 0x0, 0x0}, &(0x7f0000006a40)=0x14) getsockname$packet(r4, &(0x7f0000006bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006c00)=0x14) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000006d00)={@dev, 0x0}, &(0x7f0000006d40)=0x14) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f0000007f40)={@local, 0x0}, &(0x7f0000007f80)=0x14) accept$packet(r4, &(0x7f0000008140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000081c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000082c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000008400)={'team0\x00', 0x0}) getsockname$packet(r6, &(0x7f0000008440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008480)=0x14) recvmmsg(r6, &(0x7f000000ce00)=[{{0x0, 0x0, &(0x7f0000008ac0)=[{&(0x7f00000086c0)=""/200, 0xc8}, {&(0x7f00000087c0)=""/205, 0xcd}, {&(0x7f00000088c0)=""/150, 0x96}, {&(0x7f0000008980)=""/114, 0x72}, {&(0x7f0000008a00)=""/51, 0x33}, {&(0x7f0000008a40)=""/23, 0x17}, {&(0x7f0000008a80)=""/31, 0x1f}], 0x7, 0x0, 0x0, 0x6}, 0x7ff}, {{&(0x7f0000008b40)=@hci, 0x80, &(0x7f0000008f40)=[{&(0x7f0000008bc0)=""/12, 0xc}, {&(0x7f0000008c00)=""/229, 0xe5}, {&(0x7f0000008d00)=""/58, 0x3a}, {&(0x7f0000008d40)=""/237, 0xed}, {&(0x7f0000008e40)=""/18, 0x12}, {&(0x7f0000008e80)=""/26, 0x1a}, {&(0x7f0000008ec0)=""/92, 0x5c}], 0x7, &(0x7f0000008fc0)=""/198, 0xc6, 0x5}}, {{&(0x7f00000090c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000095c0)=[{&(0x7f0000009140)=""/158, 0x9e}, {&(0x7f0000009200)=""/120, 0x78}, {&(0x7f0000009280)=""/88, 0x58}, {&(0x7f0000009300)=""/222, 0xde}, {&(0x7f0000009400)=""/82, 0x52}, {&(0x7f0000009480)=""/50, 0x32}, {&(0x7f00000094c0)=""/52, 0x34}, {&(0x7f0000009500)=""/171, 0xab}], 0x8, &(0x7f0000009640)=""/39, 0x27, 0x200}, 0x5}, {{&(0x7f0000009680)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f000000bbc0)=[{&(0x7f0000009700)=""/4096, 0x1000}, {&(0x7f000000a700)=""/36, 0x24}, {&(0x7f000000a740)=""/219, 0xdb}, {&(0x7f000000a840)}, {&(0x7f000000a880)=""/3, 0x3}, {&(0x7f000000a8c0)=""/163, 0xa3}, {&(0x7f000000a980)=""/146, 0x92}, {&(0x7f000000aa40)=""/187, 0xbb}, {&(0x7f000000ab00)=""/4096, 0x1000}, {&(0x7f000000bb00)=""/161, 0xa1}], 0xa, &(0x7f000000bc80)=""/42, 0x2a, 0x3}, 0x10000000000}, {{&(0x7f000000bcc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f000000cd40)=[{&(0x7f000000bd40)=""/4096, 0x1000}], 0x1, &(0x7f000000cd80)=""/102, 0x66}, 0x9}], 0x5, 0x100, &(0x7f000000cf40)={0x77359400}) getsockname$packet(r4, &(0x7f000000cf80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000cfc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r6, &(0x7f000000d9c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f000000d980)={&(0x7f000000d000)=ANY=[@ANYBLOB='t\t\x00\x00', @ANYRES16=r7, @ANYBLOB="000429bd7000fedbdf250200000008000100", @ANYRES32=r8, @ANYBLOB="6401020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000200000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000008000008000600", @ANYRES32=r10, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r11, @ANYBLOB="c0000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000200000008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004001402000008000600", @ANYRES32=r13, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000008000100", @ANYRES32=r14, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000100008008000100", @ANYRES32=r15, @ANYBLOB="680102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r17, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400976a000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006d636173745f72656a6f696e5fb26e74657276616c00000000000000000000000800030003000000080004000000000008000100", @ANYRES32=r18, @ANYBLOB="bc00020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000101000008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000008000300030000000800040001000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000100000008000600", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r21, @ANYBLOB="c80002004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c00040000000600010001003f00005e04000000b68d3f0856c1000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400fcffffff40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000000080007000000000008000100", @ANYRES32=r22, @ANYBLOB="1802020040000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000010038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004008100000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000200000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004001f00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400f7ffffff08000600", @ANYRES32=r23, @ANYBLOB="7c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c00040003000509ffffffff10027f04090e000006005308050000000900ffff03000000ff0f097f0800000007000307070000000000065c000000000700ff08ffffffff330080030080000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000001000008000100", @ANYRES32=r24, @ANYBLOB="bc01020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400feffffff3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r25, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400a004000008000600", @ANYRES32=r26, @ANYBLOB="84000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000540004000001818b08000000c70a080102000000030002ff370e0000ff016509030000000700040001000000ff07ff0700000000000800010700000005000105c00200000700082000000000040008e30500000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004006f00000008000600", @ANYRES32=r27, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r28], 0x974}}, 0x40) dup3(r2, r1, 0x0) 20:56:12 executing program 4 (fault-call:3 fault-nth:34): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 446.981073] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.981088] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 [ 446.981096] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 446.981105] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 446.981113] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 446.981121] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:13 executing program 5: add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) clone(0x2102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)="d13ff3d776", 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x800, 0x901) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000100)=0x1) 20:56:13 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000340)={{0x100000000, 0x2, 0x400, 0x9}, 'syz0\x00', 0x12}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x800, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="32000000cc3f16d872a5603ee8bd01d7e8bca39ceb18d344eae69670be681331157ea27a5e42d363282705b01a82aac7918f7252338ab186ccae603e161a76fadcdd827951c3f35b8ec731c24a88ec8a4d80f5359ddf250bb053c701ad"], &(0x7f00000000c0)=0x3a) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r3, 0x1}, &(0x7f0000000280)=0x8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) 20:56:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000001f000000000000000000000000"], 0x18) [ 447.083520] audit: type=1804 audit(1538859372.953:209): pid=20199 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir823616888/syzkaller.BgEhPl/352/bus" dev="sda1" ino=16566 res=1 [ 447.092368] audit: type=1804 audit(1538859372.963:210): pid=20173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir823616888/syzkaller.BgEhPl/352/bus" dev="sda1" ino=16566 res=1 [ 447.106826] loop3: p1 [ 447.249653] loop0: p1 20:56:13 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 447.318660] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:13 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) fcntl$getown(r0, 0x9) [ 447.366660] loop0: p1 [ 447.386171] FAULT_INJECTION: forcing a failure. [ 447.386171] name failslab, interval 1, probability 0, space 0, times 0 [ 447.407490] CPU: 1 PID: 20226 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 447.414886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.424257] Call Trace: [ 447.426904] dump_stack+0x1c4/0x2b4 [ 447.430555] ? dump_stack_print_info.cold.2+0x52/0x52 [ 447.435870] should_fail.cold.4+0xa/0x17 [ 447.439958] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 447.445170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.450735] ? wake_up_klogd+0x11a/0x180 [ 447.455222] ? console_device+0xc0/0xc0 [ 447.459220] ? vprintk_emit+0x322/0x930 [ 447.463213] ? __down_trylock_console_sem+0x155/0x200 [ 447.468532] ? vprintk_emit+0x268/0x930 [ 447.472531] ? wake_up_klogd+0x180/0x180 [ 447.476613] ? do_raw_spin_lock+0xc1/0x200 [ 447.480932] ? fs_reclaim_acquire+0x20/0x20 [ 447.485297] ? lock_downgrade+0x900/0x900 [ 447.489473] ? ___might_sleep+0x1ed/0x300 [ 447.493796] ? arch_local_save_flags+0x40/0x40 [ 447.498542] ? vprintk_default+0x28/0x30 [ 447.502624] __should_failslab+0x124/0x180 [ 447.506877] should_failslab+0x9/0x14 [ 447.510778] kmem_cache_alloc_trace+0x2d7/0x750 [ 447.515485] kobject_uevent_env+0x2f3/0x101e [ 447.519924] kobject_uevent+0x1f/0x24 [ 447.523745] loop_clr_fd+0x607/0xd00 [ 447.527582] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 447.533136] ? zap_class+0x640/0x640 [ 447.536881] lo_ioctl+0x875/0x1d80 [ 447.540444] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 447.546291] ? lo_rw_aio_complete+0x470/0x470 [ 447.550837] blkdev_ioctl+0x9ac/0x2010 [ 447.554749] ? blkpg_ioctl+0xc10/0xc10 [ 447.558658] ? lock_downgrade+0x900/0x900 [ 447.562891] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 447.568853] ? __kernel_text_address+0xd/0x40 [ 447.573373] ? unwind_get_return_address+0x61/0xa0 [ 447.578336] ? __save_stack_trace+0x8d/0xf0 [ 447.582699] ? __fget+0x4d1/0x740 [ 447.586177] ? ksys_dup3+0x680/0x680 [ 447.589910] ? kasan_slab_free+0xe/0x10 [ 447.593919] ? ksys_mount+0xa3/0x140 [ 447.597650] ? __x64_sys_mount+0xbe/0x150 [ 447.601900] ? do_syscall_64+0x1b9/0x820 [ 447.605987] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.611382] block_ioctl+0xee/0x130 [ 447.615034] ? blkdev_fallocate+0x400/0x400 [ 447.619461] do_vfs_ioctl+0x1de/0x1720 [ 447.623366] ? kasan_check_write+0x14/0x20 [ 447.627626] ? ioctl_preallocate+0x300/0x300 [ 447.632055] ? __fget_light+0x2e9/0x430 [ 447.636050] ? fget_raw+0x20/0x20 [ 447.639527] ? trace_hardirqs_on+0xbd/0x310 [ 447.643866] ? ksys_mount+0xa3/0x140 [ 447.647602] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 447.653073] ? __kasan_slab_free+0x119/0x150 [ 447.657504] ? security_file_ioctl+0x94/0xc0 [ 447.661946] ksys_ioctl+0xa9/0xd0 [ 447.665429] __x64_sys_ioctl+0x73/0xb0 [ 447.669352] do_syscall_64+0x1b9/0x820 [ 447.673257] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 447.678757] ? syscall_return_slowpath+0x5e0/0x5e0 [ 447.683706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.688658] ? trace_hardirqs_on_caller+0x310/0x310 [ 447.693696] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 447.698734] ? prepare_exit_to_usermode+0x291/0x3b0 [ 447.703773] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.708653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.713859] RIP: 0033:0x4573e7 [ 447.717159] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.736395] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.744200] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 [ 447.751500] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 447.758813] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 20:56:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000400000000000000000000000000000000"], 0x18) 20:56:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x400, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x0, 0x8, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x2011, r0, 0x0) [ 447.766098] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 447.773532] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 447.789421] loop3: p1 20:56:13 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfeffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:13 executing program 4 (fault-call:3 fault-nth:35): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:13 executing program 5: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) clone(0x0, &(0x7f00000001c0), &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040)) keyctl$get_security(0x6, r0, &(0x7f00000001c0)=""/49, 0x31) 20:56:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1810946b61e21cd52bed74c30000000000cf11e483387e566060a4"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000d300000000028000007a1e00ffffffff006301"], &(0x7f0000000000)="47504c00bd304702525f484f89db96dd6ca64da40ff023122e60f6", 0x0, 0xce, &(0x7f0000001b80)=""/206}, 0x17e) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x0, 0x44}]}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10) sendmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="d817b6f60a4106185ee4381d43d43f81ff830de676753efedcdbff84e6afa17e7d9e9f9297d81a8fcfa17fe02e044e1cd64f7fef550440c299c8eb159a79270fa9d2091d11cb5101682e4640739852af941ad8711da15d920befb653c892089bd0379c15b533", 0x66}], 0x1, &(0x7f0000000400)=[{0x80, 0x10f, 0x5, "2e7ea9c495986411f40dd1163a388ffa8fd9b0f9d60dcada951914d4ae4a29dd2f6f95af207a11460f844ae96a9bd04b3b2f57c29607e3db49a24cca16303a6c65ea5833842f58354aafb11ae99b3ba1ba27d6200ae28cf0a52cf1cb449abafe7a390d13da53eabd6d5464cc"}, {0x98, 0x11f, 0x8, "b758ab397cafb9446b544c7f8a1baf2e614ff7f62f2f2c3624d81e5092e4ec1fcbb587557010dce5cd4c05da6e2f7cd92dc1120b0fb4fd2cc8a0ef7d10ba13d3ce05f4af4d66aab906e84eba021f1e0aee928a5c8132632bb6f3ac18f31b09cfefdac906d08955e63752105d6dd14777fd55b267d8cb2bfd80eda0556c87fa2c467c00"}, {0x20, 0x103, 0x9, "41dfbd8ddb45a51700b3588340e3b416"}], 0x138, 0x20000001}, 0x7fff}, {{&(0x7f0000000540)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f0000001700)=[{&(0x7f00000005c0)="ded57a135313684e8d94c7631c65eac2a87ba1bf7c971e45f4ab04a1659f7db159c758571f85b91ade6d78e81b20c5768680e57c94c5bed6695f2af8d86ceb55b8637e950882c8aa7b02e052f0ca4011beeb451f76e29f788234b217f67effababf3cf23ecd2fe9745b16515d1126033c8", 0x71}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="096399f81c91293558d44de81c8c92b375dde1b9694a393eff275b93898d3e0a7e6c1603c0d705fa96d9de80e201d32eeed7cd4015f87e", 0x37}, {&(0x7f0000001680)="ce49d0e031c0ea6c41fc3c48a0d0f22cd30a76a15641ed9ff28c1ca52763e961e9aa1e5638827549021fc76c9ef935197d569359d41b81fa75452f65df44b0e2678af5a56ff81e64fd41b1d3206bc7980ef980de3e19659ddbc656b616b32c034810a4dcbfe2106f80850f1ec586cefe7276e91a32f545", 0x77}], 0x4, 0x0, 0x0, 0x20000010}, 0xe00000000000}], 0x2, 0x4004014) 20:56:13 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:13 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfeffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001200000000000000000000000000000000"], 0x18) [ 448.015320] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'\x00', 0x600}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fcntl$setflags(r2, 0x2, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000001c0)={0x79, 0x800}) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x1ff, 0x0, &(0x7f000002c000/0xf000)=nil}) [ 448.076762] FAULT_INJECTION: forcing a failure. [ 448.076762] name failslab, interval 1, probability 0, space 0, times 0 [ 448.076847] loop3: p1 [ 448.094686] CPU: 0 PID: 20262 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 448.102074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.111541] Call Trace: [ 448.111565] dump_stack+0x1c4/0x2b4 [ 448.111585] ? dump_stack_print_info.cold.2+0x52/0x52 [ 448.111609] should_fail.cold.4+0xa/0x17 [ 448.111627] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 448.111649] ? lock_release+0x970/0x970 [ 448.136363] ? arch_local_save_flags+0x40/0x40 [ 448.141101] ? fs_reclaim_acquire+0x20/0x20 [ 448.145442] ? lock_downgrade+0x900/0x900 [ 448.149607] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.155254] ? ___might_sleep+0x1ed/0x300 [ 448.159457] ? put_dec+0x3b/0xf0 [ 448.162845] ? arch_local_save_flags+0x40/0x40 [ 448.167443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.173000] ? number+0x972/0xca0 [ 448.176482] __should_failslab+0x124/0x180 [ 448.180737] should_failslab+0x9/0x14 [ 448.184558] kmem_cache_alloc_node+0x26e/0x730 [ 448.189152] ? set_precision+0xe0/0xe0 [ 448.193071] __alloc_skb+0x119/0x770 [ 448.196807] ? skb_scrub_packet+0x490/0x490 [ 448.201148] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 448.206959] ? pointer+0x990/0x990 [ 448.210523] ? device_get_devnode+0x2d0/0x2d0 [ 448.215050] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 448.220159] ? netlink_has_listeners+0x2cb/0x4a0 [ 448.224939] ? netlink_tap_init_net+0x3d0/0x3d0 [ 448.229634] alloc_uevent_skb+0x84/0x1da [ 448.233717] kobject_uevent_env+0xa52/0x101e [ 448.238153] kobject_uevent+0x1f/0x24 [ 448.241973] loop_clr_fd+0x607/0xd00 [ 448.245715] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 448.251310] lo_ioctl+0x875/0x1d80 [ 448.254875] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 448.260789] ? lo_rw_aio_complete+0x470/0x470 [ 448.265399] blkdev_ioctl+0x9ac/0x2010 [ 448.269394] ? blkpg_ioctl+0xc10/0xc10 [ 448.273335] ? lock_downgrade+0x900/0x900 [ 448.277530] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 448.283348] ? __kernel_text_address+0xd/0x40 [ 448.287866] ? unwind_get_return_address+0x61/0xa0 [ 448.292816] ? __save_stack_trace+0x8d/0xf0 [ 448.297167] ? __fget+0x4d1/0x740 [ 448.300737] ? ksys_dup3+0x680/0x680 [ 448.304464] ? kasan_slab_free+0xe/0x10 [ 448.309237] ? ksys_mount+0xa3/0x140 [ 448.312995] ? __x64_sys_mount+0xbe/0x150 [ 448.317157] ? do_syscall_64+0x1b9/0x820 [ 448.321235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.326656] block_ioctl+0xee/0x130 [ 448.330331] ? blkdev_fallocate+0x400/0x400 [ 448.334671] do_vfs_ioctl+0x1de/0x1720 [ 448.338575] ? kasan_check_write+0x14/0x20 [ 448.342831] ? ioctl_preallocate+0x300/0x300 [ 448.347257] ? __fget_light+0x2e9/0x430 [ 448.351314] ? fget_raw+0x20/0x20 [ 448.354792] ? trace_hardirqs_on+0xbd/0x310 [ 448.359130] ? ksys_mount+0xa3/0x140 [ 448.362863] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 448.368426] ? __kasan_slab_free+0x119/0x150 [ 448.372859] ? security_file_ioctl+0x94/0xc0 [ 448.377320] ksys_ioctl+0xa9/0xd0 [ 448.380803] __x64_sys_ioctl+0x73/0xb0 [ 448.384718] do_syscall_64+0x1b9/0x820 [ 448.388629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 448.394018] ? syscall_return_slowpath+0x5e0/0x5e0 [ 448.398963] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.403825] ? trace_hardirqs_on_caller+0x310/0x310 [ 448.408860] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 448.413896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 448.418935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.423808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.429010] RIP: 0033:0x4573e7 [ 448.433004] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.452183] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 448.460245] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 [ 448.467559] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 448.474842] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 448.482128] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 448.489411] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:14 executing program 4 (fault-call:3 fault-nth:36): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="bf160000000085100000050000001d00000000000000bf610000000000008510000002000000bf0100000000000095004000000000001501000000c4ada6b6000000000000009500000000000000"], &(0x7f0000000140)="71086518266b77f5d9d05fe947e232a2d78e0e46dc7b32f67f3dd53b755cc699b9b85c015fa75ad008c4c9af88ef21db883a5ccb82e81d0b2f386cb31e742b92b4c745e893d147d84bc535301aeaea7264ae7172a1455ef0dcc6ca230e6754f410e9f6646cf7f9305f6a852f800dc541d833f86988580a78af600724e14d74094b8dc3d1171e4cd6c7b5ed25f52f8dc7544f88cca48e49caf84e32cd970eb1f592530c47291ace77da548dd76bdf122071c6ff034c1f96bfbb2148bc6697ab36947fa49c29ea5d8a434ac1b0fb6c08820d262c59da370784b1197debe39fa535"}, 0x48) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) close(r1) [ 448.536874] loop0: p1 [ 448.565410] QAT: Invalid ioctl 20:56:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460300000000000000000000000000000000000000"], 0x18) [ 448.585654] QAT: Invalid ioctl [ 448.600714] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 448.615413] QAT: Invalid ioctl [ 448.626629] loop3: p1 20:56:14 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:14 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 448.655426] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 448.690125] loop0: p1 [ 448.694922] QAT: Invalid ioctl [ 448.736244] FAULT_INJECTION: forcing a failure. [ 448.736244] name failslab, interval 1, probability 0, space 0, times 0 [ 448.755403] CPU: 1 PID: 20293 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 [ 448.762878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.762884] Call Trace: [ 448.762917] dump_stack+0x1c4/0x2b4 [ 448.774890] ? dump_stack_print_info.cold.2+0x52/0x52 [ 448.783710] should_fail.cold.4+0xa/0x17 [ 448.787806] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 448.792932] ? __save_stack_trace+0x8d/0xf0 [ 448.797320] ? save_stack+0xa9/0xd0 [ 448.800972] ? save_stack+0x43/0xd0 [ 448.804623] ? kasan_kmalloc+0xc7/0xe0 [ 448.808533] ? kasan_slab_alloc+0x12/0x20 [ 448.812699] ? kmem_cache_alloc_node+0x144/0x730 [ 448.817469] ? __alloc_skb+0x119/0x770 [ 448.821369] ? alloc_uevent_skb+0x84/0x1da [ 448.825621] ? kobject_uevent_env+0xa52/0x101e [ 448.830378] ? kobject_uevent+0x1f/0x24 [ 448.834434] ? loop_clr_fd+0x607/0xd00 [ 448.838339] ? lo_ioctl+0x875/0x1d80 [ 448.842086] ? blkdev_ioctl+0x9ac/0x2010 [ 448.846439] ? block_ioctl+0xee/0x130 [ 448.850256] ? do_vfs_ioctl+0x1de/0x1720 [ 448.854368] ? fs_reclaim_acquire+0x20/0x20 [ 448.859311] ? lock_downgrade+0x900/0x900 [ 448.864586] ? ___might_sleep+0x1ed/0x300 [ 448.868748] ? arch_local_save_flags+0x40/0x40 [ 448.873348] ? lock_downgrade+0x900/0x900 [ 448.877590] __should_failslab+0x124/0x180 [ 448.881849] should_failslab+0x9/0x14 [ 448.885670] kmem_cache_alloc_node_trace+0x270/0x740 [ 448.890791] ? kasan_unpoison_shadow+0x35/0x50 [ 448.895635] ? kasan_kmalloc+0xc7/0xe0 [ 448.899783] __kmalloc_node_track_caller+0x33/0x70 [ 448.904736] __kmalloc_reserve.isra.39+0x41/0xe0 [ 448.909634] __alloc_skb+0x155/0x770 [ 448.913458] ? skb_scrub_packet+0x490/0x490 [ 448.917806] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 448.923617] ? pointer+0x990/0x990 [ 448.927182] ? device_get_devnode+0x2d0/0x2d0 [ 448.931723] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 448.936922] ? netlink_has_listeners+0x2cb/0x4a0 [ 448.941783] ? netlink_tap_init_net+0x3d0/0x3d0 [ 448.946574] alloc_uevent_skb+0x84/0x1da [ 448.950664] kobject_uevent_env+0xa52/0x101e [ 448.955340] kobject_uevent+0x1f/0x24 [ 448.959430] loop_clr_fd+0x607/0xd00 [ 448.963161] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 448.968718] ? zap_class+0x640/0x640 [ 448.972458] lo_ioctl+0x875/0x1d80 [ 448.976021] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 448.981864] ? lo_rw_aio_complete+0x470/0x470 [ 448.986376] blkdev_ioctl+0x9ac/0x2010 [ 448.990378] ? blkpg_ioctl+0xc10/0xc10 [ 448.994312] ? lock_downgrade+0x900/0x900 [ 448.998492] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 449.004339] ? __kernel_text_address+0xd/0x40 [ 449.008857] ? unwind_get_return_address+0x61/0xa0 [ 449.013819] ? __save_stack_trace+0x8d/0xf0 [ 449.018167] ? __fget+0x4d1/0x740 [ 449.021702] ? ksys_dup3+0x680/0x680 [ 449.025489] ? kasan_slab_free+0xe/0x10 [ 449.029542] ? ksys_mount+0xa3/0x140 [ 449.033418] ? __x64_sys_mount+0xbe/0x150 [ 449.037582] ? do_syscall_64+0x1b9/0x820 [ 449.041661] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.047048] block_ioctl+0xee/0x130 [ 449.050770] ? blkdev_fallocate+0x400/0x400 [ 449.055358] do_vfs_ioctl+0x1de/0x1720 [ 449.059293] ? kasan_check_write+0x14/0x20 [ 449.063650] ? ioctl_preallocate+0x300/0x300 [ 449.068085] ? __fget_light+0x2e9/0x430 [ 449.072081] ? fget_raw+0x20/0x20 [ 449.075566] ? trace_hardirqs_on+0xbd/0x310 [ 449.079967] ? ksys_mount+0xa3/0x140 [ 449.083713] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 449.089244] ? __kasan_slab_free+0x119/0x150 [ 449.093699] ? security_file_ioctl+0x94/0xc0 [ 449.098125] ksys_ioctl+0xa9/0xd0 [ 449.101595] __x64_sys_ioctl+0x73/0xb0 [ 449.105586] do_syscall_64+0x1b9/0x820 [ 449.109487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 449.114869] ? syscall_return_slowpath+0x5e0/0x5e0 [ 449.119876] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.124834] ? trace_hardirqs_on_caller+0x310/0x310 [ 449.129885] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 449.134922] ? prepare_exit_to_usermode+0x291/0x3b0 [ 449.139957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.144845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.150049] RIP: 0033:0x4573e7 [ 449.153256] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.172199] RSP: 002b:00007f7189a15a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 449.180326] RAX: ffffffffffffffda RBX: 00007f7189a15b30 RCX: 00000000004573e7 20:56:15 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffeb, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:15 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0xfffffffffffffffe, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"00ac720000000000ec973f820f7c4000", 0x400000102}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x118) close(r0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x4010, r1, 0x54) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x10000, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000280)={@empty, 0x49, r3}) [ 449.187610] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 449.195064] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 [ 449.202349] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 449.209628] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 20:56:15 executing program 4 (fault-call:3 fault-nth:37): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 449.296709] loop3: p1 [ 449.300913] loop5: p1 20:56:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001600000000000000000000000000000000"], 0x18) [ 449.337409] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 449.357447] loop0: p1 [ 449.386497] FAULT_INJECTION: forcing a failure. [ 449.386497] name failslab, interval 1, probability 0, space 0, times 0 [ 449.387586] loop3: p1 [ 449.414522] can: notifier: receive list not found for dev tap0 [ 449.423222] CPU: 1 PID: 20324 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #270 20:56:15 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 449.430650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.430658] Call Trace: [ 449.430687] dump_stack+0x1c4/0x2b4 [ 449.430715] ? dump_stack_print_info.cold.2+0x52/0x52 [ 449.446334] should_fail.cold.4+0xa/0x17 [ 449.446355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 449.446370] ? kasan_check_write+0x14/0x20 [ 449.446386] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 449.446409] ? wait_for_completion+0x8a0/0x8a0 [ 449.460928] ? kthread_queue_work+0x270/0x270 [ 449.460946] ? parse_args.cold.15+0x1b3/0x1b3 [ 449.460966] ? zap_class+0x640/0x640 [ 449.474741] ? fs_reclaim_acquire+0x20/0x20 [ 449.474760] ? lock_downgrade+0x900/0x900 [ 449.474781] ? ___might_sleep+0x1ed/0x300 [ 449.474805] ? arch_local_save_flags+0x40/0x40 [ 449.483837] ? zap_class+0x640/0x640 [ 449.483856] ? mark_held_locks+0x130/0x130 [ 449.483876] __should_failslab+0x124/0x180 [ 449.483894] should_failslab+0x9/0x14 [ 449.491949] __kmalloc+0x2d4/0x760 [ 449.491969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 449.491986] ? fsnotify_first_mark+0x1c5/0x350 [ 449.492007] ? inotify_handle_event+0x1ff/0x5c0 [ 449.500465] inotify_handle_event+0x1ff/0x5c0 [ 449.500488] fsnotify+0x87f/0x12f0 [ 449.500515] ? fsnotify_first_mark+0x350/0x350 [ 449.552380] ? arch_local_save_flags+0x40/0x40 [ 449.556989] ? fsnotify+0x12f0/0x12f0 [ 449.560833] __fput+0x62d/0xa30 [ 449.564301] ? __fput+0x62d/0xa30 [ 449.567793] ? get_max_files+0x20/0x20 [ 449.571866] ? trace_hardirqs_on+0xbd/0x310 [ 449.576208] ? kasan_check_read+0x11/0x20 [ 449.580386] ? task_work_run+0x1af/0x2a0 [ 449.584477] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 449.589955] ? kasan_check_write+0x14/0x20 [ 449.594215] ? do_raw_spin_lock+0xc1/0x200 [ 449.598477] ____fput+0x15/0x20 [ 449.601840] task_work_run+0x1e8/0x2a0 [ 449.605905] ? task_work_cancel+0x240/0x240 [ 449.610304] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 449.615782] ? copy_fd_bitmaps+0x210/0x210 [ 449.620059] exit_to_usermode_loop+0x318/0x380 [ 449.624670] ? syscall_slow_exit_work+0x520/0x520 [ 449.629551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.629572] do_syscall_64+0x6be/0x820 [ 449.629589] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 449.629609] ? syscall_return_slowpath+0x5e0/0x5e0 [ 449.639040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.639059] ? trace_hardirqs_on_caller+0x310/0x310 [ 449.639076] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 449.639094] ? prepare_exit_to_usermode+0x291/0x3b0 [ 449.639114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.639135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.659335] RIP: 0033:0x411051 [ 449.659351] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 449.659359] RSP: 002b:00007f7189a15a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 449.659376] RAX: 0000000000000000 RBX: 00007f7189a15b30 RCX: 0000000000411051 [ 449.659385] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 449.659395] RBP: 0000000020000140 R08: 00007f7189a15b30 R09: 00007f7189a15ad0 20:56:15 executing program 4 (fault-call:3 fault-nth:38): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 449.659403] R10: 0000000000100020 R11: 0000000000000293 R12: 0000000000000004 [ 449.659411] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 449.748405] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 449.763101] print_req_error: 168 callbacks suppressed [ 449.763110] print_req_error: I/O error, dev loop0, sector 1 [ 449.774662] print_req_error: I/O error, dev loop0, sector 1 [ 449.776763] loop5: p1 [ 449.780881] buffer_io_error: 166 callbacks suppressed 20:56:15 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x27000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461600000000000000000000000000000000000000"], 0x18) 20:56:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') sendmsg$netlink(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000800)={0x10, 0x2e, 0x1}, 0x10}], 0x1}, 0x0) [ 449.780891] Buffer I/O error on dev loop0p1, logical block 0, async page read [ 449.795324] print_req_error: I/O error, dev loop0, sector 2 [ 449.801660] Buffer I/O error on dev loop0p1, logical block 1, async page read [ 449.809712] print_req_error: I/O error, dev loop0, sector 3 [ 449.816362] Buffer I/O error on dev loop0p1, logical block 2, async page read 20:56:15 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$P9_RREADDIR(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x7) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x0, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'GPL!cpusetmd5sumposix_acl_access-lo$mime_type!selinux^/wlan0'}}]}}) [ 449.848254] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 449.876122] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:15 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:15 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfffffe00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 449.936600] loop3: p1 [ 449.966922] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 450.000349] print_req_error: I/O error, dev loop3, sector 1 [ 450.006886] print_req_error: I/O error, dev loop3, sector 1 20:56:15 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="fa"]) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x4d80, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000240)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, &(0x7f0000000000)="0f01c8f20f35ba2000b000ee0f2336360fc76df20f2054440f20c0663504000000440f22c064f3e10a660f3a63a63c6700baf80c66b8bd08428766efbafc0cb066ee", 0x42}], 0x1, 0x0, &(0x7f0000000400), 0x100000000000000c) recvmmsg(0xffffffffffffffff, &(0x7f0000006080)=[{{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000c40)=""/64, 0x40}], 0x1, &(0x7f0000000cc0)=""/103, 0x67}, 0x401}, {{&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000002040), 0x0, &(0x7f00000020c0)=""/4096, 0x1000}}], 0x2, 0x0, &(0x7f0000006340)) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000100)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:56:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460012000000000000000000000000000000000000"], 0x18) [ 450.012867] Buffer I/O error on dev loop3p1, logical block 0, async page read [ 450.021736] print_req_error: I/O error, dev loop3, sector 2 [ 450.027730] Buffer I/O error on dev loop3p1, logical block 1, async page read [ 450.035247] print_req_error: I/O error, dev loop3, sector 3 [ 450.041366] Buffer I/O error on dev loop3p1, logical block 2, async page read [ 450.049540] print_req_error: I/O error, dev loop3, sector 4 [ 450.055629] Buffer I/O error on dev loop3p1, logical block 3, async page read [ 450.063877] print_req_error: I/O error, dev loop3, sector 5 [ 450.069954] Buffer I/O error on dev loop3p1, logical block 4, async page read [ 450.077656] Buffer I/O error on dev loop3p1, logical block 5, async page read [ 450.085159] Buffer I/O error on dev loop3p1, logical block 6, async page read [ 450.104932] loop0: p1 [ 450.116899] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 450.146797] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 450.155484] loop5: p1 20:56:16 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:16 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2700) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000240)="0c15403d8d62cb453cbdebe494759b3616d2e113c60e636a3ba99d49ce1ded53f4a104f800820e3b4615011f089493db47d517c371b93cf733f6e5a002623f88c127f6d59fb92c0e1b3ca2e965cc2d7cd88423ade93a42b7f0966e5081e9fec3c6d38ae724344a7a9ff22775de5417af1067de92427a7b56224967c847fd6a93b24599dc2df9b09731d2d51c3b4ab8f8ae9b1e9a73a442d5353bd5a54cdb347b764d62654fa04744539560212e9119a6") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fdd000/0x18000)=nil, &(0x7f0000000200)=[@text64={0x40, &(0x7f0000000180)="c744240012000000c7442402860ccbe1ff2c24b9040400000f32f20f2066c44171665c49e1b8010000000f01c1b9c50b0000b800000000ba000000800f3066460f388234c30f76dc640f07c744240009000000c7442402a8000000ff1c24", 0x5e}], 0x1, 0x0, &(0x7f0000000240), 0x0) [ 450.237916] loop0: p1 20:56:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001e00000000000000000000000000000000"], 0x18) 20:56:16 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x80, 0x0) socketpair(0x11, 0x80a, 0x81, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f00000005c0)="82780000260f017731f3d87e0b0f20e06635000020000f22e066b9800000c00f326635002000000f30640f02d766b8008000000f23d80f21f86635400000f00f23f8db13b85f078ee82e0f01cf"}], 0xaaaaaaaaaaaac60, 0x0, &(0x7f0000000100), 0x330) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000100)={0x38, "184f7e9017404782c73a283addd01246505f3b084141fa4d1b0aa1d86c666c406ad75c9ac54b5a2cb247bb730cdce4286db47775553fbea5"}) ioctl$KVM_IRQ_LINE_STATUS(0xffffffffffffffff, 0xc008ae67, &(0x7f0000000180)={0x0, 0x101}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [0x4b564d02, 0x1]}) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000640)=""/4096) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000001c0)=0xa0, 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000002c0)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={r3, 0x1, 0x6, @dev={[], 0xc}}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:56:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r1, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f0000000c40)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, &(0x7f0000000cc0)) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getdents64(r2, &(0x7f0000000100)=""/186, 0x4a9e280) 20:56:16 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 450.315643] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 450.360038] loop3: p1 20:56:16 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 450.402470] tmpfs: No value for mount option 'c' 20:56:16 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff003) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fallocate(r1, 0x0, 0x0, 0x10000101) [ 450.426983] loop0: p1 20:56:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000007fffffff000000000000000000000000"], 0x18) 20:56:16 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) getpgid(0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x208000) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x2000000000000, 0x9, 0x9ca, 0x9, 0xffffffffffff90b6, 0x3, 0xfffffffffffffff7}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000440)=""/210) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80000) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) r3 = dup(0xffffffffffffffff) mremap(&(0x7f0000aba000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000972000/0x4000)=nil) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000001c0)=0x72, 0x8) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000380)={0x1, 0x18, 0x8, 0x0, "0563fd41529fcc634bd77f190d3950c471afc115320fef84e149b38b3eb0c16f"}) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000300)={0x0, 0x1}) madvise(&(0x7f0000a62000/0x1000)=nil, 0x1000, 0x10200000008) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000040)={0x0, 0xc397}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000240)={0x2, 'teql0\x00', 0x4}, 0x18) [ 450.505938] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 450.523531] loop0: p1 20:56:16 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:16 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2700, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460016000000000000000000000000000000000000"], 0x18) [ 450.682598] loop3: p1 20:56:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000040)=0x68bdb8ba0bc6315e, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000000c0)=0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs_stats_percpu\x00') sendfile(r1, r3, &(0x7f0000000080), 0x9) [ 450.762005] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 450.796737] loop0: p1 20:56:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) [ 450.817566] loop3: p1 20:56:16 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000400", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000003f00000000000000000000000000000000"], 0x18) [ 450.848517] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:16 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 450.946194] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) [ 451.036058] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:16 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3f00000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="7fffffff00", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 451.107147] loop3: p1 20:56:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0xfffffffffffffff1) getpgid(0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x208000) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000080)={0x2000000000000, 0x9, 0x9ca, 0x9, 0xffffffffffff90b6, 0x3, 0xfffffffffffffff7}) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000440)=""/210) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x80000002, 0x8972, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80000) mlock2(&(0x7f0000b18000/0x1000)=nil, 0x1000, 0x0) r3 = dup(0xffffffffffffffff) mremap(&(0x7f0000aba000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000972000/0x4000)=nil) openat$cgroup_procs(r3, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000001c0)=0x72, 0x8) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000380)={0x1, 0x18, 0x8, 0x0, "0563fd41529fcc634bd77f190d3950c471afc115320fef84e149b38b3eb0c16f"}) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000300)={0x0, 0x1}) madvise(&(0x7f0000a62000/0x1000)=nil, 0x1000, 0x10200000008) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000040)={0x0, 0xc397}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000240)={0x2, 'teql0\x00', 0x4}, 0x18) 20:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) 20:56:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460200000000000000000000000000000000000000"], 0x18) [ 451.208005] loop3: p1 [ 451.277250] loop0: p1 20:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) 20:56:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460500000000000000000000000000000000000000"], 0x18) [ 451.303024] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) 20:56:17 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xa0008000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\a\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 451.426687] loop0: p1 20:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) [ 451.466342] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:17 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000008001000000000000000000000000"], 0x18) [ 451.547776] loop3: p1 [ 451.559121] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:17 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000180)="2e2f66692e65318c", 0x2, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000), 0x1c) lstat(&(0x7f0000000300)="2e2f66692e65318c00", &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f0000000600)="2e2f66692e65318c00", &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@ipv4={[], [], @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) lstat(&(0x7f0000000cc0)="2e2f66692e65318c00", &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000d80)="2e2f66692e65318c00", &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getegid() stat(&(0x7f0000000f00)="2e2f66692e65318c00", &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000fc0)={{}, {0x1, 0x1}, [{0x2, 0x4, r4}, {0x2, 0x4, r5}, {0x2, 0x4, r6}, {0x2, 0x4, r7}, {0x2, 0x4, r8}, {0x2, 0x3, r9}, {0x2, 0x4, r10}, {0x2, 0x6, r11}, {0x2, 0x4, r12}, {0x2, 0x7, r13}], {0x4, 0x2}, [{0x8, 0x4, r14}, {0x8, 0x6, r15}, {0x8, 0x1, r16}, {0x8, 0x1, r17}], {0x10, 0x2}, {0x20, 0x5}}, 0x94, 0x3) fanotify_mark(r1, 0x11, 0x2, r0, &(0x7f0000000380)="2e2f66692e65318c00") r18 = creat(&(0x7f0000000040)="2e2f66692e65318c00", 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r18, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x30, 0x1, @ib={0x1b, 0x9, 0x20, {"3fd3ae8bb266a5573b7de56194b047c7"}, 0x1ff, 0x4, 0xd8}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r18, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f00000000c0), r19}}, 0x18) write$evdev(r18, &(0x7f0000000680)=[{}], 0x18) dup2(r0, r1) [ 451.706479] loop0: p1 20:56:17 executing program 1: syz_emit_ethernet(0x56, &(0x7f0000000480)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "770ea9", 0x20, 0x0, 0x0, @dev, @empty, {[@hopopts={0x0, 0x1, [], [@generic={0x7}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "22c66c", 0x0, "1eaa88"}}}}}}}, &(0x7f0000000100)) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) 20:56:17 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x300) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461500000000000000000000000000000000000000"], 0x18) [ 451.790633] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:17 executing program 1: mkdir(&(0x7f0000000080)='./file2\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='ext3\x00', 0x0, &(0x7f0000000200)='\x00') ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x80000001, 0x2d9, 0x6, 0x2}) [ 451.837918] loop0: p1 [ 451.857220] loop3: p1 20:56:17 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xfb) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(r0, 0x10, 0x0, 0x6e7b) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, &(0x7f0000000080)={0xf004, &(0x7f0000000040), 0x8}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x10000000}) io_submit(r2, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0xc00, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) 20:56:17 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x27000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000000007f", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) fstat(r1, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000180)=[0xee00, 0xee01, 0xee01, 0xee01, 0xee01]) r6 = getpid() fstat(r1, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r2, 0x10, &(0x7f00000016c0)={0x0, 0x0}) stat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x400000000000001e, &(0x7f00000017c0)) r11 = getpgid(0x0) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() r14 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendto$inet(r2, &(0x7f0000001dc0)="56d0babbef2a884b9f4d4b7b2de453de5aa5f3bb8395b8ea2d56fa8db08f37e4081c6fae3ccf3582a5093235ab5f064b224c0520cd4893f892e77c9ae5e210f9fdff93506eda04b64173c69c5d2d3f7c345315f5cb98f9b002f4df354579989e00d5df305d1e02581fcd799390bf8d75e236bb0d3a518be22e0c004d1682fdeec60db0e07b7a82086fd3e1e3e1f1bf0cf6a576e39a9a522cca53c7d211689ed67fc49cd879b0b6f415c33ad13fecdc1812b32b71ec80399e9293075448335228826c285dbfbffd9bb0ad879fb85c1b950099b57021315e0fdeca6a7226ceb262096e438fa52221f1164f39be", 0xec, 0x400c804, 0x0, 0x0) r16 = getegid() sendmmsg$unix(r2, &(0x7f0000001d40)=[{&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000000200)="167f10f4e43fd88b8bac7ee8f42ede0d76ae4f92f4dfb53bae51c11c02c4a5896bd72af5369c3d3f43f81c2925a73962441eef95f91707001e47ac26d99c7f6b0bfaba70bc56573cacd4eadf4e59f9c4fcf22576705f7b1516d4ec4bde8572b306768b4929c6af524b0122cb25e816a3a183cd3fa2392ce6c2412442ee940824b48884f2631c74fe7c9395030563c1fc48c06d62c489b3dfef0d2d0bb810c5d60638bc52643c78f7e623fbef8178656ec612ab5a62bc8cc6ee9be4f148d37ebf8b89953bcaad8ab2c3bad70e8b52fa01a4564e6af221bc7eb837", 0xda}, {&(0x7f0000000300)="6c24be819a0929505ecb164d6267ea1a173e44f65a4371c62cea10228734bfe10be7008c455d7b46ac35e3d667f7f92971d95f24e179042d84a566a9010a2d5e6c3b78b1a7fe317a554c5023f0011711937e33260955600861c712ddf50095099b493925595719ccd8dfd07e657f368334965070c0bd990bde500c8101e3452485a4294570de7e8ac2084d8197f8e1bc28bbd527714066252ffb4c77713793f39170710fc40a4debacabc94403caec672d60eaa4877a6be70035fea635c6ea3f8d1174dfc8b4078bb9a3515ac1bbf7a2bda5adc1f9e095b75a0ac4cc3ae09a01ec6e551287b0a6b3", 0xe8}, {&(0x7f0000000000)="858c313d7c862672943525f3b913879ef23b45a25de2a82ba122", 0x1a}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="91f3f2e0b2043b5a8cbdfc12ed0bc24d75fed9a723ff7f4c7b56e14d7fb9e2d27b818db0752a03ac26f02f17e88747fbb28183834d900ab96e310326adb834047e8f3a705cef3e02b2fffa1b44f32cd7916d4c380c7ad3908355f30e7406223873e368f0aec7", 0x66}], 0x5, &(0x7f0000001800)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10}], 0x60, 0x4000}, {&(0x7f0000001880)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001900)="3a488be059e24da68aba5597376e191b9b09fa7f87044357d111bbc15681c22efa703dac22bbc61198cd25f10cd2e930db3b2cca22aa526b85e807ba03b82989b3cc76329e89b185e1d14ae67908aaaef2d2c4af", 0x54}, {&(0x7f0000001980)="63c79451813c15aa3ef2a72c8c642c054053ad46a936d4dfdd6897395e5606e9b3c9d94555364fa01975768ab72df34ceaf354fc4a32546c595b1bf2db62254e9bdd1a5d202d9ee87e7978d1e43753a3f72167d6124ca0feab7b978ee7cb76421a66df2fb95c905eecdd19af7a4e5cb658181d74ea0a580aed837c4f6ba7b97a37f926bed02af0fd0c89057d669ef7fdfb12b383a2279a34ff5929eaa768e48c08fdaa53d15f5a70f3b06cd2834b01819a8b12cef14ec28aeebda8717bc0ebecb3670aee53afba3c739b47507f97", 0xce}], 0x2, &(0x7f0000001c40)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x20, 0x1, 0x1, [r2, r1, r0]}, @rights={0x38, 0x1, 0x1, [r2, r1, r2, r0, r2, r0, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r2, r1, r0, r1]}, @rights={0x30, 0x1, 0x1, [r2, r1, r2, r1, r1, r1, r2]}], 0x100, 0x4}], 0x2, 0x20000044) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) close(r1) 20:56:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c467fffffff00000000000000000000000000000000"], 0x18) [ 451.920204] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem [ 451.937298] EXT4-fs (nullb0): VFS: Can't find ext4 filesystem 20:56:17 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffeb) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:17 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f00000003c0)='configfs\x00', 0x0, &(0x7f0000000400)) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)) r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x0, 0x0) r1 = geteuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2200020, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'lo'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0ppp1/\\)/mime_type^'}}]}}) 20:56:17 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 452.068083] loop0: p1 [ 452.086657] loop3: p1 20:56:18 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/rfcomm\x00') getdents(r1, &(0x7f0000000200)=""/68, 0x200004f5) 20:56:18 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46003f000000000000000000000000000000000000"], 0x18) [ 452.157443] loop3: p1 20:56:18 executing program 5: getpid() gettid() perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x100000001, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffdffffff8, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r1, &(0x7f0000000980), 0xffffff4d) close(r1) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000480)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000340)=0x8, &(0x7f0000000380)=0x2) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) 20:56:18 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\a\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:18 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r0, 0x11, 0xb, &(0x7f00000000c0), &(0x7f0000000080)=0x2) fstat(r0, &(0x7f0000000000)) 20:56:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 452.286612] loop0: p1 20:56:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f0000002680)={0x14, 0x2a, 0xffffff1f, 0x0, 0x0, {0x1001}}, 0x14}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 20:56:18 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460003000000000000000000000000000000000000"], 0x18) [ 452.446753] loop3: p1 20:56:18 executing program 1: r0 = memfd_create(&(0x7f0000000000)="a200", 0x3) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x3}, 0x28, 0x1) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x2}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24}}, 0x17, 0xffffffffffff7fff, 0xfffffffffffffe3d, 0x256e, 0x10}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYBLOB="660000000a893acd0e0c496a92d424e8d0f9a09ddd601979eb7a81afddf201e9f814ed28aec7c87c2878b2fc71e47d6400fcb6957efd5933a7026d8483bf292aa2da0a3403e790714b1d2909ee1c247829d1562cdfcc783e859804a5b0ccf7d4e7799fe8c4ab78a4e32132de160cfba44af2df41d4ac7e5f395fb5c852c84179491880e9bbd1b115e90a1657f1540fdfa11f64fe1cf6"], &(0x7f0000000340)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0x3b, &(0x7f0000000180)=""/206}, 0x48) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000780)={0x80000000, 0xfff, 0x3, {0x0, 0x1c9c380}, 0x6, 0x9}) socket$kcm(0x2, 0xfffffffffffffffc, 0x2) r3 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x4, 0x2324442c, 0x4, 0x10001, 0x0, 0x2, 0x20800, 0xd, 0x3, 0x1, 0x7fff, 0x7fffffff, 0x3, 0x1, 0x2, 0xcc2b, 0x65, 0x7, 0xffff, 0x401, 0x2, 0x2d2b, 0x101, 0x3ab5, 0x3, 0x1ff, 0x8c, 0x9, 0xf7d9, 0x1, 0xfffffffffffffffe, 0x7699, 0x1f, 0x9, 0x1f, 0x6, 0x0, 0x1, 0x3, @perf_bp={&(0x7f0000000340), 0x1}, 0xb4, 0x2, 0xf09c, 0x4, 0x9, 0x0, 0x5}, r3, 0xb, r2, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xf, 0xc0000000000000, 0xb03, 0x2, 0x10, r4, 0x7f}, 0x2c) socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) gettid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x113, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x1, @empty, 0x5}, @in6={0xa, 0x4e23, 0x46e, @mcast2, 0x1}}}, 0x118) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000500)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') getsockopt$llc_int(r6, 0x10c, 0x5, &(0x7f00000002c0), &(0x7f0000000700)=0x4) bind$unix(r1, &(0x7f0000000100)=@abs={0x1}, 0x6e) 20:56:18 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="ffffff8c00", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 452.528873] loop0: p1 20:56:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461400000000000000000000000000000000000000"], 0x18) 20:56:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:18 executing program 1: r0 = memfd_create(&(0x7f0000000000)="a200", 0x3) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x3}, 0x28, 0x1) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x2}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e24}}, 0x17, 0xffffffffffff7fff, 0xfffffffffffffe3d, 0x256e, 0x10}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYBLOB="660000000a893acd0e0c496a92d424e8d0f9a09ddd601979eb7a81afddf201e9f814ed28aec7c87c2878b2fc71e47d6400fcb6957efd5933a7026d8483bf292aa2da0a3403e790714b1d2909ee1c247829d1562cdfcc783e859804a5b0ccf7d4e7799fe8c4ab78a4e32132de160cfba44af2df41d4ac7e5f395fb5c852c84179491880e9bbd1b115e90a1657f1540fdfa11f64fe1cf6"], &(0x7f0000000340)=0x1) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0x3b, &(0x7f0000000180)=""/206}, 0x48) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000780)={0x80000000, 0xfff, 0x3, {0x0, 0x1c9c380}, 0x6, 0x9}) socket$kcm(0x2, 0xfffffffffffffffc, 0x2) r3 = gettid() perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0x4, 0x2324442c, 0x4, 0x10001, 0x0, 0x2, 0x20800, 0xd, 0x3, 0x1, 0x7fff, 0x7fffffff, 0x3, 0x1, 0x2, 0xcc2b, 0x65, 0x7, 0xffff, 0x401, 0x2, 0x2d2b, 0x101, 0x3ab5, 0x3, 0x1ff, 0x8c, 0x9, 0xf7d9, 0x1, 0xfffffffffffffffe, 0x7699, 0x1f, 0x9, 0x1f, 0x6, 0x0, 0x1, 0x3, @perf_bp={&(0x7f0000000340), 0x1}, 0xb4, 0x2, 0xf09c, 0x4, 0x9, 0x0, 0x5}, r3, 0xb, r2, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xf, 0xc0000000000000, 0xb03, 0x2, 0x10, r4, 0x7f}, 0x2c) socket$kcm(0xa, 0x3, 0x11) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) gettid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x113, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r5, 0x3, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x1, @empty, 0x5}, @in6={0xa, 0x4e23, 0x46e, @mcast2, 0x1}}}, 0x118) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, &(0x7f0000000500)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0, 0x1}, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') getsockopt$llc_int(r6, 0x10c, 0x5, &(0x7f00000002c0), &(0x7f0000000700)=0x4) bind$unix(r1, &(0x7f0000000100)=@abs={0x1}, 0x6e) [ 452.646655] loop0: p1 [ 452.766865] loop3: p1 [ 452.806541] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 452.906090] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 452.968122] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:18 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:18 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x10, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:18 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000100)=""/170) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0x14, {0x8000, 0x5, 0x100000001, 0x8, 0x5, 0xff}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r4, 0x0) getpgrp(0x0) getpgrp(0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x100) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200000, 0x0) getegid() gettid() mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000009, 0x10, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x7095, 0xffffffffffffff25) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000200)={0x401, 0x9, 0x1}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0xc, &(0x7f00000044c0)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="02"], 0x1}], 0x1, &(0x7f00000029c0)}, 0x7fd) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)=0xffffffffffffffff) write$binfmt_misc(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="73797a31403c0532adf1e53de21ae8388c2fe2818e3d4535d3b3bb5b53b7bec1b9e533b9659e65e7a16f8e9ebf4795f3f44073e5413108e9eb670900e038d1bbefdd75b50382a4"], 0x47) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_GET_XSAVE(r6, 0x9000aea4, &(0x7f0000000680)) prctl$setfpexc(0xc, 0x50001) r7 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x2) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f00000001c0)={@multicast1, @rand_addr, @multicast2}, &(0x7f0000000200)=0xc) ioctl$UI_DEV_DESTROY(r7, 0x5502) 20:56:18 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000780), 0x3b028fb06411ad30, &(0x7f0000000880)={&(0x7f0000000080)=ANY=[@ANYRESOCT], 0x1}}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x10000000000000bc) io_setup(0x3ff, &(0x7f0000000100)=0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000140)=0x7ff, &(0x7f00000001c0)=0x4) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000000)) io_submit(r3, 0x0, &(0x7f00000002c0)) accept4(r0, &(0x7f0000000200)=@ethernet={0x0, @broadcast}, &(0x7f0000000280)=0x80, 0x80800) r4 = fcntl$getown(r1, 0x9) ptrace$peek(0x1, r4, &(0x7f00000000c0)) 20:56:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000200000000000000000000000000000000"], 0x18) 20:56:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000a0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 453.186439] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 453.195250] loop0: p1 [ 453.237449] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:19 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00 \x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460005000000000000000000000000000000000000"], 0x18) 20:56:19 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair(0x5, 0x5, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_BUFS(r2, 0xc0206416, &(0x7f0000000140)={0x58c9, 0xfffffffffffffffd, 0x5, 0x75e, 0x2, 0x2}) close(r1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 453.286679] loop3: p1 20:56:19 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 453.386168] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46001f000000000000000000000000000000000000"], 0x18) 20:56:19 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000100)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={&(0x7f0000000140), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x28, 0x1, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) [ 453.489449] loop3: p1 20:56:19 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 453.527193] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:19 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="8cffffff00", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:19 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0xffffffffffffff1a}], 0x1, 0x2000000000000) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') preadv(r1, &(0x7f0000000480), 0x2000000000000136, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r2, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c0000002200010000000008000c00", @ANYRES32=0x0], 0x2}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2d, &(0x7f0000000040)={@remote, @remote, @rand_addr}, &(0x7f00000000c0)=0xc) [ 453.616494] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 453.677039] syz-executor5 (20693) used greatest stack depth: 8896 bytes left 20:56:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000001300)={{0x1, 0x0, 0x1a18f861, 0x0, 0x8000}, 0xd1, 0x7fffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000200)={0x6, 0x80000004, 0x7, 0x100000001, 0x16}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r3, 0xc1205531, &(0x7f00000000c0)={0x1000000000000001, 0x6, 0x4, 0x0, [], [], [], 0x0, 0x0, 0x2000, 0x8, "dc9b840fded6c64225253143694906ed"}) write$UHID_INPUT(r2, &(0x7f00000002c0)={0x8, "988e25521d55a86b0c369734d137978eb2ec953adbc49ed5c3cc73d1c7633cbfbff97a39c67cafdb9ed6e8871b494b4b4c3779f370633f3e54b194135c2afb1d7e99359980d9b229ba23e2cbd6571b855ecbac2a9d15e11135edd9930df090f96949d85e74c7f2dcb89c4dbc35ee35c97163fa2837fcf78f71095bb23b85e6570786e61ed193e41dc94307754b1820e4f77f57138fca923da8f2073a243607ab87f96ac536062c8a270a898816663cd1f85564191de67e6fd8d0205c13229dee08c877389909cd42d6bfcb7e908f8b8a69b7c6bfee42cdb44b44b975d32a9ed7ba6450ea42219476612fc363ea736f0f9f520b8458b790377c1f5e68ce8eeb5849cb565e2800cc2cf0049b50f9ab03113fc6556616511ded6aa96d2f2d54a55c41ae808d042012c1f9637b9416b2d085dde936dbb1ba3ef33819cfdd29e19f00798b1cbab9f8e8202a79e1e9e04cb4d4c4bcfeab7e37e336727f1ec455357b076fb3d06c483a45c0ab8ac6644d7f9245a1060f7aa2ee8bec036e3d70b295f39438118c6dc5c292119412c92a29966b6b68ab66cbf493aebdc77ccae000ba36a40e5ae244bac32f6ed0eba0bcc2dd5e5736ca638fdfa6595c9878681b231b8d45a06e45a59da07ba3a31d582fcd14e9652fd906b1ea0e9e0545df5573e088a4bdc7ec0e1561690091bf1346fa4f997135d6eb913de5039648c0893309a03d62db9cf62bf527433f179492e3bcce8515b652af7fc9f17a778e59dfb56e3f8b6669350ee7eb2c15e74273779abab1b3ce4af04b279bd88a24e1a1b750e279bfa00bf9d14826bbfe325d07eb9ca89bc7808103866ed05bb240d177f4767c1154654c63e90f1c0026a2ef6d0ab4effbedc42df404edab31e60f098d1e5c8ec78a3f523f1c40d5f751c92ac2ebf559bafee140cbb104fcd10401e7c22826255424b3ea049e45e7a5a6bd68e0a947a0381c40946fbb857f599bd5655caa7fadac52d7c8a00f28d857d18312f8e5349d0a59e5fea99a967ca29430edadfed093b5b36bf0eb15f8d845cf2c68494c55a18c016c9c3d1e009ee0f3a6a983c74d6b305745f82f41b0c843128dbd5249114a70dc0f5a31010f48dca6b318e7b5eef6de6b731d7ec9e718d3bebd4d4e245e46fecb15d021fbced52efaca33862ced6ee54f8a88af41366abc6d018511651b3a56e8ce3f5d0455a0de4b35ae7d66546a36871fca4d59e596d127df30d512446f271465a513b850266d1e140c99da39e144a14a06dc7492f2cb43a7086c08b37241980f1c3b75f8f28f3544024392c81f3a59fe5acbe86cbef5b9242c60a412067208f978a70349c31e88dc30e7fe6e9dd6b323af474028cdb99f5b81f0230ecc2d3f9779cfaf89cac6e2bd87803656e733fded1d1035085c3f35a6c4ff7629f92a201ed49c52e1ec6cf38cf3e4132d555cc2a57bf61f62ba621062769423830f488eae7cc393d0906e9d6e2535ba643465fd22afc876a6ade8574a563540e4bb0bc7d1a2f6857bd22772c4022da3983ecea389ddbd30112f3e2f8b8946cd263c0857846174407f1c6d53b6c10e456fbb77b8c46b3689fa7de31e62ca40602223ef4c3d727acd23d61148b638108a8184fb8d7e9bb3faa47d3c546087843495ea9513ec3b5203106a7cef2449c0bceb2c31e2a309ee849cb3f0c2934beedf3a64e6bbdb01e13ab8c770358a9c21d620235ad8545d62b61f49e9c1784a3a9bee6a8a9be017b435eb59b4c8a9e99f4cb1d6576c91d7950f85801c900c8073768f11e5143db9ce1532d960401c69ed259c7e1ede0b2372e13a87932a5b6c9d2bb466719c5615367c9fbc563775be2113d0306220564f8cec6b2761f2af670b6a576e8e4bfccb495ff249411844f75505d4996e77b8bdb8ef5dc0a253da0d4f8244243f3b3fc6fbbdcef223e5d80f51943856944e4fb3a22508c32efa10090a1f8fdf988713f56c46d1d62497364a7f2f57008f6369bb3c62e6f795cf96045d6ed17f4f115e9f9782d0d2770688e7b371a27b391f9b9b7d886ecdd87d7536aedcf742150022010e43247aff257010b2424a71eb0686295bc6d08aef506660ae66464838c07d6815b2dd8c67fdce1125747d320bd5a1bc8c4627b79c5cd115f153bef36e6789cd4d8d0115b6609350133b95ca6be46f09a13bd32793856d7c0dff2b0e861856b226bba4590f705a436b0cc98a19954c9e555f49595cb2b865e130e0fe6ffa9925ff15b6310a1f7a309d62518b6c7c680c0152bb317ee7dd446d7efffeba8d4c54109adbc9b32e47be217dd7a1e6e5b636e65e783002855c6c32d5a381e543ca134673b577609d2046c46e54f5ddba37db6b13f3ba2e6eed6b8a63eb63c760066041b7350d695ad1c3a8f5ad9f23d8ee1bd0a9b10f010390ceb4daaeaad2be800fdcfca4db208e3e837b1d976ffad96c598a08c1089862efb171d4663abd297800f67e9de2d2a58876eb30ea42d6b65c3162ba3019e1c8855245bb5e1245f810f3c09cb1a4a7c1a591d2dd80f0d511707752e941f1d74aac812f4da07c8647e650435a02435d1d218e532e2386e7db75b96945058e1b88ba95df59765425faac01d341b8fd22059b58b29306376a01d12e358496d3c216a0eda72d73379faa353721332c1c729a50cb6a09fc1edcc6b0be354a216ff30f9ae5ead5e3493d3dfbedb2861ace6877447d80030505a13c9256ffb29b176a0f042bb01cdde340d985813a5e5c35d3726542715efd59db801ebf4f9f77d76144672045ed19ecdb639fead89e9bd5f4d912e162ed3142f922722334e5bfd3d6309749a30bfd30f60ecfd99f5cdfe5a0ceac6fe1c9d4f59d27e5b462dc7633b168aae5e5bcb03a543456f3b3338ca81f69af38c3e8369832e1948e7c2f698a221df8536dc91f95f0f7137fbb77634017485b5ec47abf8c820c70421714e4f294c37ed0f49a765b4664438b6b46d26c8be99adf095c8b8229c7b73947fbf95559f31b8cab7086749ff3cf1ebc379a4d335566b3293cf7df1c0eb3d772f45bbfa1df175ecb951883373378d77adaa431df4e5305f1b460fcde89db504dfbdf778021dd26ad610175ff3a61916cb6e4a537e440a28d02a7495fa9e687d3f68fdb1db1b7d3c1715db8e727d52e592b682b05a903899d1c8e00d29299864851cf9e5a504645b6066e1785c335b996ea5d1f70f6775bb8f800daeb2de93aec93160d548d3a37d3cc2d9c55a387266c98e9df8d832b52da925bd3124350269d65428dabaf38631372930857b2f1708a210a8a1861a1737105381a6f5d509d887c80fca307facc322ab47cb5fb0d66c1b4f7b6981c3a6900dfdc4d11a296a6459c60b335103cdf9b686fd17b3abb77d6f99fa117ff85ee692c615c850f6b2107fe297197dfd69601c9b87e26035ff7317538b8ddc36e6a8cee1cff5fadece21d7f68bfb99ae3325e680886f68b8aaf9205f9017c1b7a8fb9b3996c76d16997160389a6bcd7d1e7cf013a46f495e108baff1201756d7c21ddbd903a7e98e60a797b9a5c3ba08eed5f8166cb3dcd7f4b0c631f38169fcec748bc0c0f53181a346b3101c72f7522277895dc40b471ae249849c9e980b9cfac96d026081d7362d7c5e46f4b23f5a4703ff47f3636b22d29c4393a3767be909a5045b48c2bc9d6265649f4e1bab0aa457e6e362f283e36f0f9676220cb5077db96071f52a49aaf704237e7a91f42011f25b1193081689649d9d1447f1de449ffc8d100a1b30fc837a73f83c2be0f53f3b888c15254988f26986b3f41baf23e9a11c0553b8a9645760c1667cc7c5b94630403496264a3385829efecf4a9537aec8feaeb314daec5d2aa8c5b53f498a826004028386045ef26ceb150bcfc238bfa24c7e05755a76d53fc16beb4e18ccc47b7f641c76ef76f61e41dac7aaa8ea680a1bf7d4455191ecd47ebdaa059f3c67c294a310c4ab5aa87ea4fd638ab7018b02a1fdf3bea9af8811a2824e69a378d901df4890d30f2a2bc022e1075f4267e428dcdf551c9d038767a94d79588ae0347a1bf5c3a5060826c10b36965d8320c623d7f49215d117823841074b6ad05884aa7c4a375f52bc01c082c16742d4a95dcb181842c74d28e34ae1c5fef2e55485d725bda5854a4805258b2ca9c236083c4f9f1a330afa43618a21868e248b4bf71c5c63d0a3697fc062a04cd00e9b6c49542e1505b05fa497ef489a22104e5331555febc666b08269bcc4a2d73537a871252619cae48cb67f724f723e79cd3ba8dc4dd45065ab49f9fc935ce9c774ff75836d3f5a0755ad98de04ddd66148ec105e9aa4574d0dfc8b0d341ec57bbd4838030c3b6a8ddb34cc18a73f693107d57e7b16565d3d1cba2b3812c2a9a5417596b4eae2e07a617fd1b379d8b4b158314dec3f399321e481c44d999cced3456754c04aecfaf536a95ed9e127b99dafa5a84f819c0fd920b36116d4df9f5707db11e1acdcdc0e85803860077783a6ad1bbd4d131b8bbdea1fb536de853c7aebff099a226e705212acad69c4c93844dcda502332f20cb6ee695307f04383332c08f5578e418e1a5e6073f3d12adec42ead6ea465c12d2c39b4423503908c0054ee4fbe6569f6f753440cddb500cec82a66d3f9b13b3f046d8f1ff636438ddd9db6ecb4e1918d09c9f2aacb531024bf70cb3fc5c7f365a43adb3037ccc4186ba8e7b50efd4db932295b2733c2e95e1ef64fa83c058fb16edcdd91a72db30f2b69c787baf91bcbb7b3f1f9fc940e10b27205e10618f769cfe1678e139e41836dabb04b69e4138ee4b3c166330b33926e1fad39f9735ba1964fdf27f3c744b2609f3ab84a3d755aa978a8d50399233942cfd0ecf12a3dbfdb38b1406b510ec6c60e81349a2c682818b171775e7457edc75b1079158ff613866a396db8a05b26cb75930e2817c517edce7091a40f4bae639ba0a36191c590d0d66020f6c5487da37d8c7886bca8886a451d0f23faf2937154dac5657c1aef314f686987fa5ed2f4c066a66303e4463957df09318cb468192984c33918c244f6899a655b08331ec02bca1f5deaddb3b548d2ba88c1fee466beea4d04fac3a479b49307ebd6aa1e85b76764de55d0644e254c5fe1295c2cdc5702a3c59f598166f1bdee8d598dc595b1e7994e45730ebf7d8a3582f164a2dc49bc0ed60e3b608cd14ece9a51c0bf5fa647b03624dde98cdb1be7df333075ba460db5cea09ab2775393d0f7d642c88ac86685c7e41ab8114b0a64ca4405b02ef75c6d73c3cf9a0caa75bf10fb433b233ebfe0b4027afb4a3fb9134ed059f8d6711de28fc4179e48913f976673ae92a63ead92404e7dd426610ec0387e48ef1acf3ad99b9238667289fa53ddb9377d7f705e74f7d3fc6cf1edfcd23e5122a3afdf2099d965109b3492bae6f9850ff794121eec417a96dc93570d9e3675d6f74d6d8a6e751f0809ed799b07be295dff39450e98a26ee1cb07bdc160bceca57248ec9b61161994e4d1cd35428624b739ca8343c785572c535b699c7941ad8e3d3650e1bd6141ab17498abdb1f25709c04bb40ecb0c13c77d99e808729183afdfa59f5e83b5c5d64cb66a6cb30582325bef81cdc8aeea6c4266695d9074f5f6f53a80b97caecf4deaa978c92df30bc7736bdf32c6418752a45dce00b8ba448da15ad068a9541fa4114b2957bcea9382ca8801295820052ec106e176333089bcf162871baecc8dfe490cd7b16a2137451efdac03c4f5f3ba5127e3f158c835a6fed89fe973f4edf772c73b5ba5729977fe1942ed48a1ae8cfe69b5345ee", 0x1000}, 0x1006) 20:56:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000001e000000000000000000000000"], 0x18) 20:56:19 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:19 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:19 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00000000ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:19 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$vnet(r0, &(0x7f0000006ec0)={0x1, {&(0x7f0000006dc0), 0x0, &(0x7f0000006e00)=""/157}}, 0x68) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0xfffffffffffffffe) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x7f) mlock2(&(0x7f0000ff4000/0xb000)=nil, 0xb000, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) socket(0x1b, 0xa, 0x2) [ 453.966520] loop3: p1 [ 453.978637] loop0: p1 20:56:19 executing program 5: r0 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ftruncate(r0, 0x1f) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x1e, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x20000000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x10f, 0x80, &(0x7f0000000000)="00210300", 0x4) 20:56:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000001000000000000000000000000"], 0x18) [ 454.058617] loop3: p1 20:56:19 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000200", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 454.096550] loop0: p1 20:56:20 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:20 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x280000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0x8, &(0x7f0000000080)='-ppp1}:\x00', 0xffffffffffffffff}, 0x30) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000100)={[], 0x2, 0x2, 0x8, 0x7, 0x8, r3}) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000600)={&(0x7f0000000000)=""/17, 0x304000, 0x1000}, 0x11) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)={0x8, {{0x2, 0x4e23, @loopback}}, 0x1, 0x6, [{{0x2, 0x4e21, @local}}, {{0x2, 0x4e22, @local}}, {{0x2, 0x4e22, @multicast1}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e23, @multicast2}}, {{0x2, 0x4e21, @local}}]}, 0x390) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f00000005c0)) 20:56:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460015000000000000000000000000000000000000"], 0x18) 20:56:20 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 454.317128] loop0: p1 [ 454.336518] loop3: p1 20:56:20 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 454.357294] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460040000000000000000000000000000000000000"], 0x18) 20:56:20 executing program 5: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000000)={0x800, 0x9}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0xe) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) setsockopt$inet_buf(r2, 0x0, 0x2b, &(0x7f00000000c0)="deb12227e1a366e8afbf1a7554072939b7991f6a9baea745bb73cd08da988682ff1dd98ef7b496d39178805e590b319280a57cbd2ea2c9c0a81c78e1f3e1eba6aa98ca6164654a48ebf9b591a16c92276f8dede5e65d2650d1e0f623b376400689cc86335bbb2d0c1ef886d253f8775aa534349106b0eeb69eb94fc566d66d1bccbaa9631d4cd2a81246b0a3d394e18970a5f888f55623b8a43b715dc8d349f865a60cddfa393cd44f8099a2bf4f7c7bb6baa5d6499756db4abfdfda2268c2f38f6cc29268df05f83f17b6c9cb4ff227bb8a266bbfb1af073ff4995567e153f42b565b7f2b9bf02fee742f1e", 0xec) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000001c0)) ioctl$UI_DEV_DESTROY(r1, 0x5502) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e20, @multicast2}]}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000002c0)={r3, 0xd0, "bd80f2e34a678f23dd877ba5ecda923dd5c7981ee79b73058cf88b9f4dd3caea7726889b0eff1c680d2efec8ed8f0c255a6f678783129eb0461a66e3e484132574d253a1f8d2fcee26af7dd80de1a1336c934874609676b2161d4f7f6caef88319760e86acf046e3b350006c66b6d7b7c311d44576597900670880029c1aeee8983f5f086d740137db1628ae9dcd8ff4615da2bef2bc1b5c3d4fd5f1334a049910fe6320cf9768f4cc6acfdd9913671ca0722817170daefd7c3c8b447b6139896303912fd18f4e64ccdc1b59a34d7a91"}, &(0x7f00000003c0)=0xd8) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000400)=')+\x00') ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) write$P9_RMKDIR(r1, &(0x7f0000000440)={0x14, 0x49, 0x1, {0x11, 0x1}}, 0x14) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000480)={&(0x7f0000fff000/0x1000)=nil, 0x1000}) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uinput\x00', 0x802, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x400000, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000540)={0x200, 0x8, 0x5, 0x0, 0xffffffff00000000}) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer\x00', 0x80203, 0x0) ioctl$KDGKBMETA(r5, 0x4b62, &(0x7f00000005c0)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$int_out(r4, 0x5462, &(0x7f0000000640)) r6 = timerfd_create(0x4, 0x80000) syncfs(r6) socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000680)=0xffffffffffffffff, 0x4) openat$snapshot(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000700)="183d77efe0c30bf03453b187bc0636f2", 0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000840)=0xe8) r8 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000880)={0xb8, 0xfffffffffffffffe, 0x8, [{{0x2, 0x1, 0x6, 0x81, 0x8000, 0x7fff, {0x2, 0x5, 0x7, 0x0, 0x3, 0x7f, 0x8001, 0x7, 0x8, 0x0, 0x3, r7, r8, 0x7f}}, {0x0, 0x9, 0xf, 0x8000, 'em0vmnet1$wlan0'}}]}, 0xb8) [ 454.436363] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 454.458580] EXT4-fs: 9 callbacks suppressed [ 454.458590] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 454.486586] loop3: p1 [ 454.547010] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 454.646755] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:21 executing program 1: socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x3a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0xfffffe68, 0xfa00, {0x0, &(0x7f0000000300)}}, 0x378) recvmmsg(r1, &(0x7f0000006880)=[{{&(0x7f0000000000)=@ipx, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/36, 0xf}, {&(0x7f00000017c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000600)=""/154, 0x9a}}], 0x378, 0x0, 0x0) write$FUSE_STATFS(r2, &(0x7f00000001c0)={0x60, 0xfffffffffffffff5, 0x6, {{0xffffffff00000001, 0x2852d4b1, 0x7, 0xfffffffffffff800, 0x6, 0x0, 0x3, 0xffff}}}, 0x60) connect$inet(0xffffffffffffffff, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) 20:56:21 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfffffffe, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460400000000000000000000000000000000000000"], 0x18) 20:56:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0500", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f0000000240)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r2, &(0x7f00000000c0)="1f0000000104ff00fdde45c807110000f305f0f00800018001fd00dcffdf00", 0x1f) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000200)={'team0\x00', r3}) 20:56:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 455.200410] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 455.210675] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 455.218619] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 455.229562] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 455.238760] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 20:56:21 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000003c00)) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xc31, 0x200) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x7, 0xffffffffffffff4d, 0x9, 0x800, 0x2, 0x5, 0x4, 0x6, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x5, 0x8001, 0x7fffffff, 0xfb8, 0x7}, 0x14) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000016) 20:56:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="a0008000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 455.257540] loop3: p1 [ 455.264373] loop0: p1 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461e00000000000000000000000000000000000000"], 0x18) 20:56:21 executing program 1: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000180)=0xe8) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000002c0)={@multicast1, @multicast1, r2}, 0xc) write$P9_RWALK(r1, &(0x7f0000000080)={0x16, 0x6f, 0x1, {0x1, [{}]}}, 0x16) write$P9_RGETATTR(r1, &(0x7f0000000540)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RGETATTR(r1, &(0x7f0000000640)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RLERROR(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1e0000000701001500"], 0x9) write$P9_RVERSION(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) utimes(&(0x7f0000000940)='./file0/file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x7530}}) [ 455.367024] loop3: p1 [ 455.367231] loop0: p1 20:56:21 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x80, 0x0, 0xfffffffffffffffe, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x100000001, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, r0, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) r1 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='#!'], 0x2) close(r1) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0xfc, &(0x7f0000001180), &(0x7f0000000340)=""/252}, 0x28) unlink(&(0x7f00000000c0)='./file0\x00') 20:56:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x10db}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f0000000400)=""/195}, 0x48) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffe, 0x101000) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x40100) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000040)={0x3, 0x1, 0x7fff, 0x2}) 20:56:21 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000003000000000000000000000000"], 0x18) [ 455.427325] 9pnet: p9_errstr2errno: server reported unknown error [ 455.459989] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:21 executing program 5: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x802) ioctl$int_out(r0, 0x5462, &(0x7f0000000100)) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000440)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000480)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f00000005c0)=0xe8) r2 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x4) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x200, 0x0) ioctl$KVM_GET_CLOCK(r3, 0x8030ae7c, &(0x7f0000000400)) r4 = gettid() fcntl$setownex(r2, 0xf, &(0x7f0000000380)={0x0, r4}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000340)=@req={0x100000001, 0x6, 0x100000000, 0x1}, 0x10) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000040)=0x3d) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000500)}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000140)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) ptrace$getregset(0x4204, r6, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=""/210, 0xd2}) 20:56:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00`\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:21 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000000)=0xffffffffffff8001, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x98, &(0x7f0000000040)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0xfff, @local, 0x100000000}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e22, 0xfffffffeffffffff, @empty, 0x3f}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x70}, 0x8) write$sndseq(r0, &(0x7f0000000640)=[{0x81, 0x3, 0x0, 0x0, @tick, {}, {}, @quote={{}, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x0, &(0x7f0000000080)}}}}], 0x30) [ 455.574130] binder: 20921:20923 ioctl 5462 20000100 returned -22 [ 455.582569] loop3: p1 [ 455.601568] binder: 20921:20923 ioctl 40087602 20000040 returned -22 [ 455.617229] loop0: p1 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000100000000000000000000000000"], 0x18) 20:56:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) sendmmsg$inet_sctp(r0, &(0x7f0000008d40)=[{&(0x7f0000000100)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10, &(0x7f00000003c0)=[{&(0x7f00000002c0)="8ff770798706d6b77c6b078e0fa306c6906fe70d1ba165be00717dcde3c0bf9405801cfc1ef55ed25b77cbb147bc58c4a992793c995572d0241e1501757f097785d6e8c5a5897d5d2679c810260a2ee5ca518ad03e7f3ca4101d41b87f3ca426a8cce1e49ef81f36ad9bfd6f140657358c73931f2d7bb821dacee78d363bd69f7a8a299ded59d4dc57b935dc94218b417867f83257bfe1469312646659b083fd0082185287fd30f1db442c86da2f550e8edc3e9064190b5eac731e5921a2f1c0dc138ca1d97e98fa6829d38381cc66", 0xcf}], 0x1, &(0x7f00000004c0)=[@init={0x18, 0x84, 0x0, {0x7, 0x0, 0x394bc000, 0x3000}}], 0x18, 0x4008001}, {&(0x7f0000000540)=@in6={0xa, 0x4e21, 0x1, @remote, 0x8}, 0x1c, &(0x7f0000000940)=[{&(0x7f0000000880)="6d3b7b918dbafe84402b0a7b3bcf74153f06bea852b55564ce314f37837907bfb721a7b18c73211f3788adf3e9941a57a3aa11954f95c97d3031954bbd4823c88a084540718c833f6ecf19cab66461482c56f88fd6a4cbca074a79acdb821d0ce9885347975adb5b17c08c797c419b363d543ed694e1ba5307b046cb4069255733db6f556a76c0cc62e0988c3a542e56ca761f5266c31d4d75abfe63e86bbf96", 0xa0}], 0x1, &(0x7f0000000a00)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @init={0x18, 0x84, 0x0, {0xbd, 0x0, 0x1, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x4, 0xff, 0x2}}], 0x58, 0x1}, {&(0x7f0000000ac0)=@in6={0xa, 0x4e24, 0x6, @local, 0x1}, 0x1c, &(0x7f0000000f80), 0x0, &(0x7f0000001200)=[@sndinfo={0x20, 0x84, 0x2, {0x7, 0x2, 0x100, 0xffff}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @authinfo={0x18, 0x84, 0x6, {0x4}}, @sndrcv={0x30, 0x84, 0x1, {0xbab, 0x38000000000, 0x0, 0x7, 0x800, 0x1f, 0x3f3, 0x10001}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x17}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0xb8, 0x20000001}, {&(0x7f0000001300)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000008740), 0x0, &(0x7f0000008880)=[@authinfo={0x18, 0x84, 0x6, {0x6000000}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x38}], 0x4, 0x800) writev(r0, &(0x7f0000001400)=[{&(0x7f00000013c0)='8', 0x1}], 0x1) r1 = syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x355, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x30000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0), &(0x7f0000000200)=0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0xffffffffffffffa9) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000280)={0x1, 0x2}, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000580)) 20:56:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff89, 0x3}}}}}, &(0x7f0000000040)) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x2, 0x0) lsetxattr$security_smack_entry(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)='security.SMACK64IPOUT\x00', &(0x7f0000001380)='/dev/full\x00', 0xa, 0x2) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000012c0)={0x0, 0x3de6, 0x7, 0x73, &(0x7f0000000100)=""/115, 0x1000, &(0x7f0000000200)=""/4096, 0xad, &(0x7f0000001200)=""/173}) [ 455.644983] binder: 20921:20923 ioctl 5462 20000100 returned -22 [ 455.646956] binder: 20921:20930 ioctl 40087602 20000040 returned -22 [ 455.669279] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 455.687767] loop3: p1 20:56:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00`\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 455.739295] loop0: p1 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000800100000000000000000000000000000000"], 0x18) 20:56:21 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xac, r1, 0x720, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000001}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @local}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x48001) r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0xfffffffffffffffd, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, &(0x7f0000000040), &(0x7f0000000280), 0x8) write$evdev(r2, &(0x7f0000000000), 0x0) [ 455.887760] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 455.896887] loop3: p1 20:56:21 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000500", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) dup2(r0, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000100), 0x180) sendfile(r1, r2, &(0x7f0000000240), 0x120) [ 455.996605] loop3: p1 20:56:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x6, @broadcast}, 0x2, {0x2, 0x4e22}, 'veth1\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) process_vm_writev(r1, &(0x7f0000001480)=[{&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/71, 0x47}, {&(0x7f00000000c0)}, {&(0x7f0000001300)=""/24, 0x18}, {&(0x7f0000001340)=""/118, 0x76}, {&(0x7f00000013c0)=""/174, 0xae}], 0x7, &(0x7f00000017c0)=[{&(0x7f0000001500)=""/24, 0x18}, {&(0x7f0000001540)=""/195, 0xc3}, {&(0x7f0000001640)=""/70, 0x46}, {&(0x7f00000016c0)=""/64, 0x40}, {&(0x7f0000001700)=""/156, 0x9c}], 0x5, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x8, {0x2, 0x0, @remote}}) 20:56:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001500000000000000000000000000000000"], 0x18) 20:56:21 executing program 1: mkdir(&(0x7f0000000180)='./control\x00', 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000001c0)) r1 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) futex(&(0x7f0000000000), 0x1, 0x2, &(0x7f0000000080), &(0x7f00000000c0), 0x7) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x220, 0x0, 0x1, 0x0, 0xfffffffffffffffc}) mknodat(r1, &(0x7f0000000140)='./control\x00', 0xc100, 0x0) [ 456.059645] loop0: p1 20:56:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1d783655) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newroute={0x24, 0x18, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 456.092460] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 456.147129] loop0: p1 20:56:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:22 executing program 1: r0 = socket$inet6(0xa, 0x40000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x81) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000080)={0xe9c, 0x9}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 20:56:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001f00000000000000000000000000000000"], 0x18) [ 456.187501] loop3: p1 20:56:22 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 456.277283] loop3: p1 [ 456.301145] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c468001000000000000000000000000000000000000"], 0x18) [ 456.368943] loop0: p1 20:56:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, &(0x7f00000001c0)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x48b) getdents(r1, &(0x7f00000001c0)=""/2, 0x0) fcntl$notify(r1, 0x402, 0x1) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xfb, 0x0) exit(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) getdents64(r1, &(0x7f0000000140)=""/57, 0x1a) 20:56:22 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000100", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 456.462289] loop0: p1 20:56:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000100)=0x1) writev(0xffffffffffffffff, &(0x7f0000001300), 0x0) [ 456.516710] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 456.526643] loop3: p1 20:56:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c461100000000000000000000000000000000000000"], 0x18) 20:56:22 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 456.566553] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 456.600166] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000001c0)=""/156, &(0x7f0000000280)=0x9c) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890c, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xcc, 0x0, 0x8001}) seccomp(0x1, 0x1, &(0x7f0000000180)={0x9, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x8001, 0x101, 0x80, 0x7fff}, {0x3, 0xfff, 0x7f, 0x1}, {0x2, 0x4, 0x1, 0x8}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) membarrier(0x10, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0xa1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0xc) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000400)=@nat={'nat\x00', 0x19, 0x6, 0x908, [0x200009c0, 0x0, 0x0, 0x20000c40, 0x20000f28], 0x0, &(0x7f00000003c0), &(0x7f00000009c0)=[{0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x11, 0x40, 0x0, '\x00', 'yam0\x00', 'irlan0\x00', 'ip6gre0\x00', @broadcast, [0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x70, 0x218, 0x250}, [@common=@nflog={'nflog\x00', 0x50, {{0x5, 0x3, 0x87, 0x0, 0x0, "dce9223095abdbb66f60e99610a7488a5ce4175c120d7a144b07da9ee57b410683ddffb7e4ac0961db0bbdfe37104369930dd3efe49a6174e2840c971e637245"}}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x2, 'system_u:object_r:net_conf_t:s0\x00'}}}]}, @snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x17, 0x79, 0x22f0, 'vlan0\x00', 'irlan0\x00', 'vcan0\x00', 'veth0\x00', @dev={[], 0x12}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @dev={[], 0x11}, [0xff, 0x43d7d6099cf14916, 0x0, 0x0, 0xff], 0xe0, 0x150, 0x1a0, [@mark_m={'mark_m\x00', 0x18, {{0x4, 0x7, 0x3, 0x2}}}, @cgroup0={'cgroup\x00', 0x8, {{0x9, 0x1}}}]}, [@snat={'snat\x00', 0x10, {{@empty, 0xfffffffffffffffe}}}, @snat={'snat\x00', 0x10, {{@remote, 0x10}}}]}, @common=@log={'log\x00', 0x28, {{0x1, "aa9e03a73ecebe96adc7bf5f6475275cfc115e8d9c564c370c9d4037f8d3", 0x1}}}}, {{{0x19, 0x8, 0x8884, 'ip6gretap0\x00', 'lo\x00', 'veth1_to_bond\x00', 'ipddp0\x00', @random="3073dfeff48b", [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @local, [0x0, 0x0, 0xff, 0x0, 0xff], 0x70, 0xe0, 0x118}, [@arpreply={'arpreply\x00', 0x10, {{@random="fed144e983ef"}}}, @snat={'snat\x00', 0x10, {{@random="1e8319bceb0a", 0xfffffffffffffffd}}}]}, @snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe, 0x2, [{{{0x1d, 0x4, 0x9100, 'rose0\x00', 'bond_slave_0\x00', '\x00', 'gretap0\x00', @remote, [0xff, 0x0, 0x0, 0xff], @dev={[], 0x1c}, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0xe0, 0xe0, 0x118, [@devgroup={'devgroup\x00', 0x18, {{0x2, 0x5, 0x9, 0x1ff, 0xc0}}}, @m802_3={'802_3\x00', 0x8, {{0x0, 0xa50, 0x3, 0x4}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xffffffffffffffff}}}}, {{{0x1f, 0x2b, 0x6203, 'gretap0\x00', 'team_slave_1\x00', 'tunl0\x00', 'syzkaller0\x00', @broadcast, [0xff, 0xff], @random="2e7637411cdd", [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa8, 0xd8}, [@snat={'snat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x5, 0xfffffffffffffffc, 0x1, [{{{0x7, 0x14, 0x8, 'bond0\x00', 'bridge_slave_1\x00', 'team_slave_0\x00', '\x00', @dev={[], 0xd}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], @remote, [0xff, 0x0, 0xff, 0x0, 0xff, 0xff], 0xe0, 0x118, 0x150, [@statistic={'statistic\x00', 0x18, {{0x0, 0x1, 0x6, 0x8, 0x5, 0x101}}}, @m802_3={'802_3\x00', 0x8, {{0xfe, 0x9, 0x3, 0x3}}}]}, [@snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}]}, 0x980) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000880)=0xffffff42) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev={0xfe, 0x80, [], 0x14}, 0x4e21, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80, 0x23a, 0x0, r4}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x9, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000001300)={r3, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r1, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000800)=ANY=[@ANYBLOB="0000000009000000000000000000000000000000000000000000000006fdba55bc96b4656350bd50be0c7a64237894cd1c5df718ed7c93752567159cf1ff8a85dcaa6f5c6337048771c278f5af"]) setsockopt$inet_buf(r2, 0x0, 0x2e, &(0x7f00000005c0)="f2ce2f9bab80b6835a3c52cc4aed8ff60deb9dff2f8b7fe97db90be2d48b4d9b40651b8791fede95969fc5c5ae0b0a209e4f42b7e1ee3b6e8e86afb56ada", 0x3e) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000680)=0x8, &(0x7f00000006c0)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r1, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) [ 456.646153] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e06038026cd25b8391784603e90521a6cfac89328ebb58eda8474a944cdf2c63dd88cbd9863d3108400731ed1be242991b61189428ee540f592abaf8d9"]) 20:56:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00 \x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 456.708796] loop0: p1 20:56:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000110000000000000000000000"], 0x18) 20:56:22 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 456.789755] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 456.809242] f2fs_msg: 4 callbacks suppressed [ 456.809254] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 456.822185] loop0: p1 [ 456.837897] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 456.850880] F2FS-fs (loop1): Unrecognized mount option "à`8lÒ[ƒ‘xFé!¦Ï¬‰2Ž»Xí¨GJ”Lß" or missing value [ 456.861798] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 456.869954] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 20:56:22 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) gettid() perf_event_open$cgroup(&(0x7f0000000340)={0x4, 0x70, 0x401, 0x1f, 0x400, 0xfffffffffffffffa, 0x0, 0x1, 0x10a00, 0x4, 0x7f, 0x800, 0x4, 0x7ff, 0x6, 0x8000, 0x7ff, 0x219, 0x1, 0xb62, 0x4, 0x4, 0x800, 0x9, 0x4, 0xfffffffffffffbff, 0x6, 0x7fffffff, 0x9, 0x7, 0x7, 0x427c69c2, 0x5, 0x0, 0x200, 0x7, 0x8001, 0x5, 0x0, 0x25, 0x3, @perf_config_ext={0x5, 0x84162b3}, 0x801, 0x25, 0x1f, 0x7, 0x7f, 0x9, 0x1}, r1, 0xd, r0, 0x4) modify_ldt$read_default(0x2, &(0x7f0000000100)=""/72, 0x48) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000f80000001001000203000000e424eccb49e10387b2d1787b4704e9f8ac2136d8ba7fca9cf6c285442ab9637b2321f455e7aeddc78ff039e0f16bc7fafcaf619410bb26d89be4bcee825210a0cdcd22407712b6d1bc2095a4c1abd7ea538f9f2f3ae4c777f302d075e54504"], &(0x7f00000004c0)=""/4096, 0x77, 0x1000}, 0x20) 20:56:22 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x4000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 456.897094] F2FS-fs (loop1): Unrecognized mount option "à`8lÒ[ƒ‘xFé!¦Ï¬‰2Ž»Xí¨GJ”Lß" or missing value [ 456.926634] loop3: p1 [ 456.959115] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 456.967278] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460011000000000000000000000000000000000000"], 0x18) [ 457.000468] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 457.017526] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 457.031156] F2FS-fs (loop1): Unrecognized mount option "à`8lÒ[ƒ‘xFé!¦Ï¬‰2Ž»Xí¨GJ”Lß" or missing value [ 457.046799] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 457.054170] loop0: p1 20:56:23 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00000000ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:23 executing program 1: utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='(\x00', 0x2) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@rand_addr, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) write$P9_RXATTRWALK(r1, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x1}, 0xf) ioctl$SG_IO(r1, 0x2285, &(0x7f00000007c0)={0x53, 0xfffffffffffffffd, 0xa, 0x401, @scatter={0x3, 0x0, &(0x7f0000000680)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/222, 0xde}, {&(0x7f00000005c0)=""/119, 0x77}]}, &(0x7f00000006c0)="7b395b5927de5ed28b8f", &(0x7f0000000700)=""/115, 0x0, 0x20, 0x0, &(0x7f0000000780)}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000480)={'team0\x00', r2}) [ 457.117817] loop3: p1 20:56:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 457.166535] loop0: p1 20:56:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46001e000000000000000000000000000000000000"], 0x18) 20:56:23 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x19, 0x6, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r0, &(0x7f00000000c0), &(0x7f00000000c0)="d351269b36d7e5a8e16b908885c0be3ba9eafad101e1b5a2c2a5cb679267a64914d278ccbd0ed8b8e7cf501985a49ddab79b8a9c649e4b377400c8129079c8b17f2a78b23956636a98111391a9f7b51fbf67028cfac6adb0f3c40944d4fdcdf610", 0x1}, 0x20) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/34) [ 457.287082] loop3: p1 20:56:23 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\a\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 457.346880] loop0: p1 20:56:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0xa23) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="b2104a93a7c022ae8dfbe1442ed465fb", 0x10) r1 = socket$rds(0x15, 0x5, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$rds(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0xffffffffffffff19) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000000)=0x1, 0x4) sendmsg$rds(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, &(0x7f0000001200), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000000", @ANYPTR=&(0x7f0000001840)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="1200000000000000e67586de271fa1f2eaf6c4a0e45e6b6c6fe7f62d41a5548015b0fc8e0ec8684634ce", @ANYPTR=&(0x7f0000003b00)=ANY=[@ANYPTR=&(0x7f0000003ac0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB=')\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="010000000000000000000000000000000000000000000000"], 0x48}, 0x0) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x6e, 0x0) socket$inet6(0xa, 0x1, 0x4000000000000000) 20:56:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000001f000000000000000000000000000000"], 0x18) [ 457.369823] loop3: p1 [ 457.386917] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000240)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a05000000000000754c8107c3cd3923dd4a71c2ff06007b6b481612c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e19ca29e5c07f000000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018ea6fa63b94eb0e4283cea71fcfacf40d32811dc8132725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539db019eebd86f21b030d26430315535774a8815f0bcbc301978a4e3addda671192ac5aa223ad7cdc1377164e0fae71576af854e4e4ddb311e78bcb151b7", 0xf9, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000140), 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000140)='user\x00', 0x2) getsockopt$inet_dccp_int(r2, 0x21, 0x4, &(0x7f0000000180), &(0x7f0000000340)=0x4) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f00000000c0), 0x0, r1) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) [ 457.468140] loop0: p1 20:56:23 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="008000a0ff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:23 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) pwrite64(r1, &(0x7f0000000000)="977a4c196f360f4dd2a220e26597975df462fca791bbdcd49ac12bd0873e9cf3ec9b85a6a68eebe69365f9cfff6cc3a190999bc0644bb117aa8a87852e56b4c152cb2609732b3323a5cd6ef87f18b490aa6c14d3fa211327db47d4b25fb753588016371d23abf38b0c8055081e0ebeb020b342532e194488660fd8cd2c9a0afbad698048288cb9787919035c4f6db60d57e80f437816bbb10ab50ab1ad2df57b68d03add8298283fde8ae2da35a9b149f10f0ed3e4088603576b63deb2d893c0126872f7c676eab3c83678a253c88a5de8d31fac4cfc84e53abf3a5add9970b62de31efafd6a701fd2df26e11c", 0xed, 0x0) 20:56:23 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000011000000000000000000000000000000"], 0x18) [ 457.591038] loop3: p1 [ 457.677318] loop3: p1 [ 457.677351] loop0: p1 20:56:23 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="1000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:23 executing program 1: r0 = socket$inet6(0xa, 0x1002400000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001440)={0x9, 0x9, 0x800a, 0x200, 0x6, 0x9, 0x100000001, 0x0, 0x0}, &(0x7f0000001480)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000014c0)={0x0, 0x1f, 0x8, [0x6, 0x5, 0x3f, 0x4, 0x4, 0x6, 0xffffffff, 0xffffffff]}, &(0x7f0000001500)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000001580)={0x0, 0x10000}, &(0x7f0000001600)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000001740)={&(0x7f00000000c0)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f00000013c0)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000100)}, {&(0x7f0000000140)="024370ad5fd864e07e720bac9c2ed98ee4", 0x11}, {&(0x7f00000012c0)="bb5caa5d656e20478e5f5fd61f25c613056e1d435cd996ba0edcdcf23cbe286c", 0x20}, {&(0x7f0000001300)="6a936102feb558c9f7f1fd77ac60ef4d366a9f5654ee60dbdafebbdd057cb597b68d98338430e8a32515961f4de8f0575bc7e92140e41664ed6551b753f476f35981f95706fdcdd6b9bcfaeb761ac6adfd18e94f68d91f7eb719d994dd0e6b7c9dbfad8abd62cfb63e2f885fbcee25c6b21650b7c6a10f908d83da5ff857ef4df5dbecbaf902921a51b41ab688526bc9284f", 0x92}], 0x5, &(0x7f0000001800)=ANY=[@ANYBLOB="20000000000000008400000002000000070001000900000006000000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="30000000000000008400000001000000000007000e82000000000000b2000000030000000600000008000000", @ANYRES32=r4, @ANYBLOB="18000000000000008400000007000000ffffffff00000000"], 0xf0, 0x80}, 0xff05501210e76e19) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001640)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100), 0x2, 0x8}}, 0x20) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xf42f, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)={0x1, 0x1}) r5 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r5, &(0x7f0000001540)={0x0, 0x36e, &(0x7f00000015c0)=[{&(0x7f0000000180)="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", 0xfb}], 0x1, &(0x7f0000000240)}, 0x0) [ 457.697694] loop5: p1 20:56:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000160000000000000000000000000000000000"], 0x18) 20:56:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 457.813958] netlink: 215 bytes leftover after parsing attributes in process `syz-executor1'. [ 457.823402] loop0: p1 [ 457.825687] netlink: 215 bytes leftover after parsing attributes in process `syz-executor1'. 20:56:23 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 1: syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000000), 0x0, 0xfffffffffffffffb) 20:56:23 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x10000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:23 executing program 1: r0 = memfd_create(&(0x7f0000000000)='deflate\x00', 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$can_raw(0x1d, 0x3, 0x1) sendmsg$nl_xfrm(r1, &(0x7f000000b000)={&(0x7f000000f000), 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback, 0x0, 0x6c}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 20:56:23 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 457.943007] loop3: p1 [ 457.956707] loop5: p1 20:56:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c00000010000100000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000120010000100697036677265746170000000180002000400616907000000000000000000000000000000"], 0x4c}}, 0x0) 20:56:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000008001000000000000000000000000000000"], 0x18) [ 457.997110] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 458.004726] loop0: p1 [ 458.026519] loop3: p1 [ 458.037456] netlink: 44 bytes leftover after parsing attributes in process `syz-executor1'. 20:56:23 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.049011] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x9, 0x3, 0x200000008003}, 0xd3193ed76de2b8c7) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x282400, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000240)=0x1) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000002c0), &(0x7f0000000300)=0x4) openat(r3, &(0x7f00000003c0)='./file0\x00', 0x101000, 0x40000010) 20:56:24 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000002500), 0x0, &(0x7f0000000180), 0x3b9}, 0x20000000) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) 20:56:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000120000000000000000000000000000000000"], 0x18) 20:56:24 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 458.146051] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 458.159200] loop5: p1 20:56:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='veth1\x00', 0x3ac) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x8, 0x3) sched_getscheduler(r3) ioctl(r1, 0x2, &(0x7f0000000180)="eeb773d37d10b4a487a743369025839c8229a6ea87c970c1d95b549a7319826259dea598f1ade1f1939422f62f1cf280dac50abfe2de7be2c66b665ffc0611003ba34c98faa8ae072854abfb6a") [ 458.216911] loop3: p1 20:56:24 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.244900] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) 20:56:24 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:24 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x6915, 0x0) r1 = socket(0x8, 0xe, 0xd0a) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x1, 0x1, 0x7, 0x3, 0x7ff, "08007498096ba79d90e4e792c84a9cb26be7316729ab2487889701a8173b7337fb125e3ca0da3a5cee8256ab9a639dc61bf2b337d2cf695987e098ce3b96ea", 0x9}, 0x60) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000005000)={0x1, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "35087d58ac0076f8042e0b88db000343"}) [ 458.317354] loop3: p1 20:56:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x2, &(0x7f0000000040)=0x7ff, 0x4) getsockname$netlink(r0, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) 20:56:24 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:24 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600001e0000000000000000000000000000000000"], 0x18) [ 458.357819] loop0: p1 [ 458.417540] loop5: p1 20:56:24 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, 0xfffffffffffffffd, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000001000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}}, 0x108) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x76455996) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0200000000000000f0ffffffffff0000000000000000000000000000000000000000000000000000ff6a6577000000000000000000000000000000000000000000000000502c2d7700520000000000000000000000000000000000000000000000000004000000000000002decea7a08ef33c60000000000000000000000000000000000000100000000205e00dbb28e9d788b0f9461aba51b65ce924a343e9939c0d42e60939ba440ba0e1f406576b218a07c723489d98ba84c3040220ffe8d387135900f81d5ae503926bb9562f7c9ebd2c24d75fdc9ae0970aae78463513889ef33e35fdf12bf44beeed0a9a5735d9e30246d57b9a6e55ae5a07499082e"], 0x90) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0xffffca88, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000100)) [ 458.438841] loop0: p1 [ 458.487144] loop3: p1 20:56:24 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:24 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.526716] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 458.546749] QAT: Invalid ioctl 20:56:24 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="ffffffffa0", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000014000000000000000000000000000000"], 0x18) [ 458.569753] QAT: Invalid ioctl 20:56:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000004440)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004480)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000004580)=0xe8) sendmsg$kcm(r0, &(0x7f00000049c0)={&(0x7f00000045c0)=@can={0x1d, r1}, 0x80, &(0x7f0000004700)=[{&(0x7f0000004640)="624451d1abfef8bc7b82e797f356b2eadcbbc727e2b4b12f033a890cdd47b82372d59e2f538747f3bf673640527accf9976d47e4da3e2e1f66963852de48a88616de7213d3b8021821a5b2634c7f7e2385c6808c709dff52da90c8bd9838dcb3dbc917e3941bdbdfba542d43831a667a14d6f8bff57423ff238c61808d6017dd8b0855a211e7775b5c16309011a0db75a8750a", 0x93}], 0x1, &(0x7f0000004740)=[{0xb8, 0x10f, 0x8, "a274880a35a3e4fc472ab348967e868626af4a36dfe10bcffd12b30b448e44201e4be7abf231d5bde79937b2f87983923991a700170eaf88c87a9d4dbd96290642d51dd692b14d22ce12dd425ca5439b1ea9a9672eb2702deafdcf9123690ba6ae534aa6c55eaf11e119b02ad824069c912ac85fb1b520bef71e197d8f786a6fe42158770fe2283055704f3d583b2889c621d2b92d12f0e6ab4a6ea5ed3f13e5c459315fe32d62"}, {0x100, 0x105, 0xff, "e9037e2c565dbe22af92e72a821e5bae5b8796a0c543dd0268d82bc6cabf42d201791bf311aed1fb8389f31ad219e175c3b719c85bfbd59070cc25f4a0a3057870dd0d1768d7ed9347b5ad440927f94fbea35cacfa3a9d3f25558ad1cc0e604e2016c0ae4eb05f4c180aad678d527f9bba061032f41e1706e7b5ba0a9ecbfec4372414e9475a4b9a014c20f2a47674e851601a9b8e757d71a6fe3a89d966ac702e2e2cf180ecc68247b023c86723530a554dd9c5efadb295aec23003cd496e19e005c86ba5cbd547e1e98b5b5e0b0b1f0c46feb8a8ec0b0cb5f41132c376a1e8f2bd5034e78c0327220dfb9008"}, {0x18, 0x1e55411ce09ed10c, 0xaca, "ee7a0a913afa22"}, {0x90, 0x113, 0x6, "276e030bb899e8fc3ba8d94455150545d2073de582901038c5a300cce9dfaf904e389f5d722689c00eb279e5114efe55ecb23f61c55002e5392ef133276eb874ab0a7f16194c28e026380e8951e0c734d0cacfa785bf5ca3af878b035ad75e323ead962644e23cf19f69a2dea3d03370277b634b3f912e2a1056"}], 0x260, 0x800}, 0x40000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='rootfs\x00', 0x0, &(0x7f00000001c0)='9mime_typelo\x00') personality(0x0) [ 458.597295] loop3: p1 20:56:24 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000a0ffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.646592] loop5: p1 20:56:24 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000040)) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8001, &(0x7f00000000c0), 0x41, 0x0) 20:56:24 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.686567] loop0: p1 20:56:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000050000000000000000000000000000000000"], 0x18) 20:56:24 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:24 executing program 1: r0 = socket$inet6(0xa, 0x100000000000e, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$intptr(0x27, 0x0) [ 458.763230] QAT: Invalid ioctl [ 458.768250] QAT: Invalid ioctl [ 458.777866] loop0: p1 [ 458.780568] loop3: p1 [ 458.797827] loop5: p1 20:56:24 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:24 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 458.847635] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000030000000000000000000000000000000000"], 0x18) [ 458.926230] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x22, 0xfffffffffffffffe, 0xfa13d7d1) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x2080) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000001c0)={{0x8, 0x6, 0x20, 0x401, 'syz1\x00', 0x8}, 0x6, 0x3, 0x7fff, r1, 0x1, 0x82a, 'syz0\x00', &(0x7f0000000180)=['@mime_type\x00'], 0xb, [], [0x3, 0x200, 0xfffffffffffffffc, 0x8]}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x84, 0x30, 0x3, 0xfffffffffffffffa}, &(0x7f0000000400)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000440)=@assoc_value={r3, 0x7}, 0x8) sched_setscheduler(r1, 0x3, &(0x7f0000000040)=0x3) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000480)={r3, 0x3, 0x10}, &(0x7f0000000500)=0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000340)={{0x7f, @dev={0xac, 0x14, 0x14, 0x15}, 0x4e20, 0x3, 'none\x00', 0x20, 0xffffffffffff9072, 0xa}, {@empty, 0x4e22, 0x5, 0x9, 0x9, 0xfff}}, 0x44) 20:56:24 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 458.977888] loop5: p1 [ 458.981448] loop0: p1 20:56:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) unshare(0x6000000) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x20000003) getpeername(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000000c0)=0x80) bind$nfc_llcp(r2, &(0x7f0000000180)={0x27, 0x1, 0x1, 0x1, 0x1000, 0x4, "f3939661c285eb164803db8450d40882b0682106b1f95936421c523c14a58fcf0e2ce07d1af1ddbefb65b7a09703c4c03797a8351c73cfcf65a631a7c20ace", 0x17}, 0x60) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) 20:56:25 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2700000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000004000000000000000000000000000000"], 0x18) 20:56:25 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000810000)={0x0, 0x2}, 0x8) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x4e20, 0x0, 0x4e24, 0x3f, 0xe4265398adee909f, 0xa0, 0x20, 0x1d, r3, r4}, {0x800, 0x3, 0x1200, 0x2, 0xd4, 0x1, 0x7, 0x7f}, {0x0, 0x80, 0xfffffffffffffc0b}, 0x2, 0x6e6bb5, 0x1, 0x1, 0x3, 0x3}, {{@in6=@mcast1, 0x4d2, 0x3c}, 0xa, @in=@rand_addr=0x5, 0x3507, 0x3, 0x0, 0x5, 0x5, 0x40, 0x69e}}, 0xe8) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000100)=@ethtool_cmd={0xb}}) [ 459.176643] loop0: p1 20:56:25 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x27) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="008000a000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 459.276871] loop3: p1 [ 459.317635] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 459.325316] loop5: p1 20:56:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000400000000000000000000000000000000000"], 0x18) [ 459.386107] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 459.395176] loop0: p1 20:56:25 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000500", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 459.516730] loop0: p1 20:56:25 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000400000000000000000000000"], 0x18) [ 459.613361] EXT4-fs: 11 callbacks suppressed [ 459.613371] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 459.625428] loop5: p1 [ 459.626973] loop3: p1 20:56:25 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:25 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 459.726656] loop0: p1 [ 459.747123] loop3: p1 [ 459.771023] loop5: p1 20:56:25 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 459.814747] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 459.829625] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 459.846611] loop0: p1 20:56:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x401, 0x0) dup2(r1, r0) syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x8000, 0x200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400000) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000400008fe7bb5cd4e344cd0002800000720a00ff"], &(0x7f0000000080)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000081000010000000000000000000000000000095000000000000009a6ef9d1aa993b5c85b3d111691d85e0c251555fe528afeb24cbd9035ebb52e234ada045bde35e39ea3c0ba556b18a479232846ff97d8d7c6f9a37683652a4cc4bdb1c77e454868610b749bd5a024e609f59b1b984422368e148dacbae3d381c82a8734282e321ac9e73912f5fbc9cf1a7589fb5d219b4e13b5210fcca6c87159e7fe352459256b0a3"], &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000003f0000000000000000000000"], 0x18) 20:56:26 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:26 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2700000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.178131] loop3: p1 20:56:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000c00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x408000) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x5) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)={[{@discard='discard'}]}) [ 460.201202] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 460.208113] loop5: p1 [ 460.237744] loop0: p1 20:56:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00?\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000ffffffff0000000000000000000000"], 0x18) [ 460.266405] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 460.274077] loop3: p1 [ 460.289675] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:26 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:26 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.386179] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 460.398820] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 460.434028] XFS (loop1): Invalid superblock magic number [ 460.441614] loop5: p1 [ 460.470061] loop3: p1 20:56:26 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000016c0)={&(0x7f0000002d00)={0x14, 0x26, 0x40000000000001, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000280)={0x0, r2}) r3 = getpid() r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x200000, 0x0) write$P9_RWALK(r4, &(0x7f0000000340)={0x7e, 0x6f, 0x2, {0x9, [{0x80, 0x2, 0x8}, {0x80, 0x0, 0x5}, {0x0, 0x0, 0x5}, {0xc, 0x4, 0x8}, {0x20, 0x0, 0x1}, {0x4, 0x2, 0x7}, {0x1, 0x4, 0x5}, {0x80, 0x4, 0x1}, {0x1, 0x3, 0x5}]}}, 0x7e) perf_event_open(&(0x7f0000000200)={0x6, 0x70, 0x7ff, 0x100000000, 0x7b2, 0x5, 0x0, 0x3, 0x44000, 0x2, 0xd61, 0x7, 0x400, 0x7, 0x7, 0x2, 0x3f, 0x8, 0x3f, 0x1023, 0x6, 0x9, 0xffff, 0x55, 0x1, 0x3, 0x1f, 0x101, 0x9, 0x5, 0x9, 0x7, 0x0, 0x5cc3, 0x906b, 0x8, 0x900000000000, 0x200, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x0, 0x2c3, 0x8001, 0x3, 0x4, 0x5, 0x2ff9}, r3, 0x6, 0xffffffffffffffff, 0x3) r5 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x80000001, 0x400000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f00000002c0)={@local, 0x3ff, 0x1, 0xff, 0x2, 0x1, 0x75cf}, 0x20) setsockopt$inet_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0), 0x4) 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600001f0000000000000000000000000000000000"], 0x18) 20:56:26 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.587032] loop3: p1 [ 460.606891] loop0: p1 [ 460.610215] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 460.648748] loop5: p1 20:56:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e21, 0x0, @local}}}, &(0x7f0000000340)=0x100) r1 = syz_open_dev$evdev(&(0x7f0000000680)='/dev/input/event#\x00', 0x1f, 0x4000) r2 = dup(r0) setsockopt$inet_dccp_int(r1, 0x21, 0x6, &(0x7f0000000080)=0x8, 0x4) mlockall(0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000000c0)=0x0) write$P9_RGETLOCK(r2, &(0x7f0000000100)={0x1e, 0x37, 0x2, {0x2, 0xfffffffffffff6d8, 0xa0000, r3}}, 0x1e) openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000040)) 20:56:26 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 460.677131] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460012000000000000000000000000000000000000"], 0x18) 20:56:26 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.762511] loop0: p1 20:56:26 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.850047] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 460.897523] loop3: p1 20:56:26 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000040000000000000000000000"], 0x18) 20:56:26 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:26 executing program 5: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 460.996612] loop0: p1 [ 461.037364] loop1: p1 [ 461.040452] loop3: p1 [ 461.053590] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 461.066762] loop5: p1 20:56:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46007fffffff000000000000000000000000000000"], 0x18) [ 461.087166] loop0: p1 20:56:27 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000000000000200000000000000f53e2328a7a1338ac584ae3b6ee1b2332329c282deb75eba01be3f56f720476bede98f5e9eb80303d9180b70ec0cbb9adb5cc6bd5aba0984d8f9957b86bea92595031b5ed8a1c50ba294bb222d9ecfd338d4905521127385ba3106eb1ea3e202f8863e429c8900000000000000"], 0x10) 20:56:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='`\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:27 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000007fffffff0000000000000000000000"], 0x18) [ 461.232746] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 461.236485] loop3: p1 [ 461.241943] loop1: p1 [ 461.246850] loop0: p1 20:56:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 461.288120] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 461.295752] loop5: p1 [ 461.316703] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:27 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000002000000000000000000000000"], 0x18) [ 461.376365] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 461.387804] loop3: p1 [ 461.408525] loop1: p1 20:56:27 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 461.457142] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:27 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x1f, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 461.506472] loop5: p1 [ 461.512931] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 461.523308] loop5: partition table partially beyond EOD, truncated [ 461.536356] loop5: p1 start 1 is beyond EOD, truncated 20:56:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000140000000000000000000000"], 0x18) [ 461.616986] loop0: p1 20:56:27 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 461.648468] loop1: p1 [ 461.657043] loop3: p1 20:56:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) [ 461.689596] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 461.707497] loop0: p1 [ 461.712592] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000002000000000000000000000000000000"], 0x18) 20:56:27 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x500) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 461.770207] loop3: p1 20:56:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000001000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:27 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x7fff, 0xffffbffffffffffe) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f000035dffc)=0x20000000004) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10) [ 461.893800] loop1: p1 [ 461.897831] loop0: p1 20:56:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000012000000000000000000000000000000"], 0x18) 20:56:27 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000", 0x20, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:27 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 461.956891] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 461.959055] loop3: p1 20:56:27 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 462.026583] loop0: p1 20:56:27 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 462.086552] loop3: p1 [ 462.104874] loop1: p1 20:56:28 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000", 0x30, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffffffff, 0x48080) open_by_handle_at(r1, &(0x7f0000000600)={0xdf, 0x1ff, "425e2bd6913d879b2221f1dc946d9eda125ccacaf4a2712f6b75c824169ff81821c3537b5e6dde66c599556f78280eaefed74d9f931d8cc1f2afb4bc6010bff973f26573710e121e5cf0046cb7ac2f24bccd39a3daa5450bdf9c9fd6dfca476c15369e162e4425e232093da251e12b01604ad2442d7a38a5d0e94c1c7f463916fcc14b1bdb4aa93cc4470ce0301c2738affd4b878bf37de74cc7269772d09eb95d7a290d2a470623748bf796ff5b57d20d70b6883f63f7626a3609336a9604eb0eb74485f15a688a778a6520657b62e15ae03609d9c9a3"}, 0x68080) [ 462.127350] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460016000000000000000000000000000000000000"], 0x18) 20:56:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 462.176552] loop0: p1 [ 462.237278] loop3: p1 [ 462.271873] loop0: p1 [ 462.278686] loop1: p1 [ 462.286897] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:28 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x5) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000015000000000000000000000000000000"], 0x18) 20:56:28 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x38, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="fffffff600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 462.388718] loop0: p1 [ 462.397133] loop3: p1 20:56:28 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f0000000180)={0x2, 0x44, 0x3e5}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) fanotify_mark(r3, 0x10, 0x48020013, r3, &(0x7f0000000300)='./file0/file0\x00') [ 462.456813] loop1: p1 20:56:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 462.512876] loop0: p1 20:56:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000003f000000000000000000000000000000"], 0x18) 20:56:28 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 462.606521] loop3: p1 20:56:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 462.647968] loop1: p1 20:56:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 462.687248] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 462.697477] loop3: p1 [ 462.763471] loop0: p1 20:56:28 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x80, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000200)={0x5, 0x1, 0xef, &(0x7f0000000600)="346057d0e52bdddf5f466caff2e6cfdc9cf30a73ea5f0b8deea1a7d385f9da6f612c14804c35dd50b11f47d3f27c644c2f91be7e5871334f1b659fc167d3e491d63fa34b1729f45968b6c97ab7a12ec39d306f83d9320ecf2df3441abbe57fe495286c33a4d9fd10945cd2a4b10deeccbe99e3a872fafcd243145494519a9ba692cf2dcbaa6e0282fee16679e4d82538b3805ec124aaed4024091e97aed5b3b5b2d3e41e1e76b8c2ea9d7ea8d4ab43df8f9870c1a8d7f59edf944103a622cc41ec1b4f765466b5d98abdd0bad5735e66c2835bc02c45bbad759438d54df5b1699d9271432f30bc467d9ce4463f2a97"}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) dup2(r0, r1) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000300)='nfs\x00', &(0x7f0000000340)='./file0\x00', 0x3, 0x4, &(0x7f0000000780)=[{&(0x7f0000000480)="d0fa37992f11026f1de7e18fd1e3c2634a3ace1dd0b529003060d112494d1df00e59453543a0b13bbe8f850d6c47ebdd753d40bc56a510c66ca72691711c9045a19638173e7d9d65677ad5266abb0de570cd542b5113d5e97473ff23b75bbb5faedc95826a43ef2b55ba3f04adeeb03faeea9a43f2443e2a4d7bb9247e9eb61bedcbe5298df589decda71d2bc0f0b95554dbb90dbe", 0x95, 0x1}, {&(0x7f0000000700)="5fd46d2585508c41984883e30af0c0f233cc42423be66a7d315f5f3401d7f6ab3ab05637d8f0075d2d99eca634f24848453a94c3e22564b5a0634f947718b4ec6dfd5a26c678dfeeec3fc1b539a89ff2f1c5b58fcc82592bcb54ff61d7f2add9d49c0e855c70315e16f4", 0x6a, 0xa3b}, {&(0x7f0000000380)="e68ad665e8e6f94eb7bc89ffe80df1b709891edef550e7db7061995d455c2c4fb5a55a0c82a90596cb30365a072706bcd09973aefd4d", 0x36, 0x3f}, {&(0x7f0000000400)="c5a5f8671e431c5dfdacd4", 0xb, 0x3ff}], 0x4000, &(0x7f0000000800)='/dev/snd/controlC#\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000003000000000000000000000000000000"], 0x18) 20:56:28 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:28 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x38, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0400", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 462.867120] loop0: p1 20:56:28 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 462.919723] loop3: p1 [ 462.926501] Unknown ioctl 4713 [ 462.930591] loop1: p1 20:56:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460005000000000000000000000000000000000000"], 0x18) 20:56:28 executing program 1: syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 462.966758] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 462.986482] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:28 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0200", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:28 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3a, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 463.067467] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 463.087202] loop3: p1 [ 463.094716] Unknown ioctl 4713 [ 463.108516] loop1: p1 20:56:29 executing program 3: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0), 0x4) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="02aa100000000000000002009aacb81800001c91ca1c8bc35de1b84793a04b9c8d3280113bdfd06c69f3b42593598fec3d21f862e64303dd17fd53814ff2949721d5cceeb45785c45e9240cd3f606c78bcad4fdfb8034ef284311a9658183fdc957200219900dc1e8e9c782e31a248556b4846d657e80605bcb1cb301ceb889b6b89608ea3739d95b062c120b20df9aa96fe65a401ab53b750749d35a544273d430103c0f2dff518"], 0x10) 20:56:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000020000000000000000000000"], 0x18) 20:56:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 463.206548] loop0: p1 20:56:29 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00?\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 463.246062] loop3: p1 20:56:29 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3b, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000001f0000000000000000000000"], 0x18) [ 463.282819] loop1: p1 [ 463.286692] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 463.295725] loop1: partition table partially beyond EOD, truncated [ 463.316361] loop1: p1 start 1 is beyond EOD, truncated 20:56:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 463.366776] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 463.377191] loop3: p1 20:56:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="f6ffffff00", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:29 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000780)) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000300)=""/137) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460080010000000000000000000000000000000000"], 0x18) 20:56:29 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 463.498332] loop0: p1 20:56:29 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040), 0x0, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 463.640277] loop3: p1 [ 463.647896] loop0: p1 20:56:29 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000001e0000000000000000000000"], 0x18) [ 463.689250] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 463.727594] loop3: p1 20:56:29 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000000000000200f0e7b76c6abd000000000000"], 0x10) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) quotactl(0xefd, &(0x7f0000000200)='./file0\x00', r1, &(0x7f0000000480)="47eb77628020b6587e1e027ae9e6fdf145b4ec2e4aa7550eea92a6c62c1dd9c0c723fd4ea5f99207d8168eff10372e46385d86ec2f46e8870b9c13aa8340df78e12a91bb746162f5f3b6ebc4310552d7b6eba809141fb27202acbac3a249869583") 20:56:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000", 0x20, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:29 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x27000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="001000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460003000000000000000000000000000000000000"], 0x18) [ 463.941980] loop3: p1 20:56:29 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000", 0x30, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 464.006880] loop0: p1 20:56:29 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x2, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="100000000000000002000000009a9f3e6c66b3c1360c51774e0683615df6a5bd63640677d5445ba15d9413a2df90cef7251a6695427a7d299443366d62dc8ecd32be8d4b"], 0x10) 20:56:29 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x0, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:29 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000400", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 464.087147] loop0: p1 20:56:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460015000000000000000000000000000000000000"], 0x18) 20:56:30 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 464.147622] loop3: p1 20:56:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x38, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 464.189502] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 464.268462] loop3: p1 [ 464.278030] loop0: p1 20:56:30 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x124) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x800) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000300)=r1) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r3 = gettid() sched_getscheduler(r3) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r4}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)=0x13a1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000000340)=0xffffffffffff9448, 0x4) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="152000"], 0x10) 20:56:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000030000000000000000000000"], 0x18) 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x8, 0xffff, 0x800, 0x5, 0x4, 0x71e7d405, 0xffffffffc2800fd6, 0x100000001, 0x0, 0x8, 0x5ed}, 0xb) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000070000000200000000000000e05cb198ed1e11987633c84481e57f2dcf23394f9441f9410522da9742518330f142c0ce54677918b3d2a46edc8e29166f3679f831d1f8773135297ed99c80250f2a5c22e131fe51d222ee92de98630a695439780d2e6a17009dffacc2f286ac9e9a23dd4896ba59dbdff45a2bcd434dad43de1402"], 0x10) [ 464.397155] loop0: p1 20:56:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000005", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:30 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000001e000000000000000000000000000000"], 0x18) [ 464.567520] loop3: p1 20:56:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3e, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:30 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000002", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 464.657417] loop3: p1 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(r0, 0x0, &(0x7f0000000140), 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000600)=[@in={0x2, 0x4e23}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x13}, 0xff}, @in6={0xa, 0x4e22, 0x2, @remote, 0xffff0000000000}, @in6={0xa, 0x4e23, 0xff, @empty, 0x635291b5}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e23, 0x9, @remote, 0xd0f6}, @in6={0xa, 0x4e22, 0x7f, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}, 0x9bec}, @in6={0xa, 0x4e23, 0x5, @mcast1}, @in={0x2, 0x4e20, @local}], 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 464.696971] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 464.707903] loop0: p1 20:56:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055", 0x3f, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600003f0000000000000000000000000000000000"], 0x18) [ 464.769967] EXT4-fs: 14 callbacks suppressed [ 464.769978] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 464.817735] loop0: p1 [ 464.827710] loop3: p1 [ 464.839032] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:30 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 464.876459] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000140000000000000000000000000000000000"], 0x18) 20:56:30 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 464.937258] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r2 = getpid() r3 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x400, 0x3f, 0xf9c, 0x7ff, 0x0, 0xabe2, 0x100, 0x4, 0x0, 0x62, 0x200000000000, 0xe2, 0x101, 0x6, 0x1, 0x91, 0x0, 0x6, 0x6, 0x8, 0x9, 0x648, 0x3d3d1e0e, 0xfccd, 0x80, 0x81, 0xd7d, 0x80000000, 0x4000000000000000, 0x9, 0x3f, 0x4, 0x3, 0x3, 0x5, 0x4, 0x0, 0x4, 0x4, @perf_config_ext={0x5, 0x7}, 0x100, 0x5, 0x0, 0x5, 0x6, 0x10001, 0xad5}, r2, 0x4, r3, 0xb) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000840), &(0x7f0000000880)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000780)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000007c0)=0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000800)={r4, 0x5, 0x0, 0x6000000000000000}, 0x10) r5 = request_key(&(0x7f0000000400)='cifs.spnego\x00', &(0x7f0000000540)={'syz', 0x2}, &(0x7f0000000580)='bond0\x00', 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f00000006c0)=0x6, 0x4) r6 = add_key(&(0x7f00000005c0)='user\x00', &(0x7f0000000600)={'syz', 0x3}, &(0x7f0000000640)="a52703e52428644ece43338ba59d4606caa4d61e9fe44965780f758b6c25ec1d5b8cf44bbf3b388ec66f678a9e22770ac7c743453b7cf5adbad717de3d091a997f1b202e617474ed3a17a8cab64b9798e9db905ea138774e60e7a078a48f153906f935839071128da2b078e0469b4f5e", 0x70, 0x0) keyctl$unlink(0x9, r5, r6) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000003c0)='bond0\x00') ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000380)={0x4, 0x5}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r7}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000200)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000480)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000700)=ANY=[@ANYBLOB="10000000000200000000000000000000cec54a83189d02c5d7e0e6bca498d3b49e7bdfc39a8d1b8303d52078ba5f98bc21855f0b1cc5822733de4d46cf890706a70babb1"], 0x10) [ 465.018888] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 465.024718] loop0: p1 20:56:30 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\a\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:30 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x0, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000150000000000000000000000000000000000"], 0x18) [ 465.106835] loop0: p1 [ 465.116781] loop3: p1 [ 465.161046] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 465.197874] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:31 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:31 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 465.217304] loop1: p1 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 465.287107] loop3: p1 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x0, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 465.328718] loop0: p1 20:56:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460004000000000000000000000000000000000000"], 0x18) 20:56:31 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x9, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x3e5}, 0x0, 0x0, r0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 465.386502] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:31 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 465.466756] loop1: p1 [ 465.467441] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 465.486307] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000050000000000000000000000"], 0x18) [ 465.528498] loop3: p1 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:31 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 465.584722] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:31 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000010000000000000000000000"], 0x18) [ 465.662539] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 465.666172] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 465.723009] loop1: p1 20:56:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00?\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) fcntl$getownex(r0, 0x10, &(0x7f0000000400)={0x0, 0x0}) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) fsync(r4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)) r5 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) getresuid(&(0x7f0000001c40), &(0x7f0000001c80)=0x0, &(0x7f0000001cc0)) getgroups(0x1, &(0x7f0000001d00)=[0xee00]) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001d40)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000001e40)=0xe8) getresgid(&(0x7f0000001e80), &(0x7f0000001ec0), &(0x7f0000001f00)=0x0) getresuid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)=0x0) fstat(r5, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000002140)={&(0x7f00000004c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000001c00)=[{&(0x7f0000000b00)="a9161c096dabf072a0749a88d82c3db002b4d56d2c0e6d6718ef89de15d3458d7a3786e35e93d8bbd952ffa276c189c4b1495a7bd4508c706bb1ec98052c346e6a", 0x41}, {&(0x7f0000000b80)="137bafca7904b423f0d0c107d3c1921079b42cb4f7b415e65c040e0d1e935284cea34f91354a523bb31c7e85794fd0d9b6a05bc2891f87eb2d59f569f7a26c79ec0228c79a8abeaaa027bae1e6701cfca5e0e4958922ee346abdb4c96de9775e5eb64dd30f1f3bf2ed86a8f2c5c5a1cf729534da3732a9332b71c6e5b90434ecd606a13ac56aafa252169d1cc27d1048d98a6f3c4d0660db4f562410e96496da07b0fb4bb59785c3faace6e6d96cd335cc698e10c318f4d4ac11b8a83440f3f0c6f58fe7287e403fe89aa1554afa03aceddd4a81bd372e319fa5ab64f34c1bfb99cfec4427eb92e9b10ab57ff74635d3eeb00d82901d348a100648683eecdac8ca86cf86594944a4975a4ae022c2b50dca0b0e70d4931b0deb01502eac87a7c48108f6f53fd5ea7a0ae22de4066d55337f5049f0e84a11cc472fba8c84376234758481d0f2ec3a71f61a75beb385272ae666b85720cd1f14f9fe2908c2152509132f69b58303d83db06cb8e291e29d747a1bbcec72b1df3f0b372de12b5eaabd6a5d2f9420cc66a74cc065a1b78c120f834bebfd1210f01db7cf6106d299cafa27cb95dd6a9696239e7510a4ec2d50d197a6b183f81d56976401b121e0593f51a4b3462a8bc638b7491f10c4b8b46c2a4397c3c71c16706bfec0fc6f9ba2a7c45aa2351cffa7d51dccfb7a5c24f61d22bb2f0e0851c36a57e6cd658c05e4a678cd9d680a670a4670bbba9b6543b26bb2b7a9171e568e1b19a03b9cf3f73fcc23b8ba7eafe56e1bf43929b252e281f5d3d3ef700fe5c9b3004e4f6fa71c8d51b4c7580b2243e7ec888ed1f36cd5deb2368502f5ed82df843f9e2b88df9668a83ba59530325cd4f00fe4bb05fcca54269ebe40e4616a98e93541be79d776e4676c18caacf237c5ec925b8abca731fc38605dc51fb9b4a8b89300422a5c442405fe11ab128687d0bb904571b04776ee966fda0b601f0059cb00e1523f7e8d638bae88e579c1a33410431d0cf476e78129b1e6d88d7e5c34fa64290f04c9c8eca04330e5d18932ccb8c2829cdcbfecabeb804fcadf83225f822574f10c63c0bbd024d2b67bc49fd7876503cdb33ff8d81a73e25cae2c225bdff2817462d0a637a332a847913f9c97cd03b34291e6edfbecb900033b3ce613a0bb9ae58da59ffd7d8ea3bf3398fb77b2650a03cf66ee51604064d4da9b3f7771fc8ed6393258afa77cbd54884e37c7831b99e80baba24b757247b40604c577e2dc1135e9b2847118a7a7b53623365412f4186ea38045cc18e7bc61ba943c489134c2161640de9331aee5df9611a5ee19afad7500dde16b4eeb64ca033254a7e5b48e6e7a735c9cf8a99f43c1e423d8967b6c9935d0602bd806ca44d1ec7383741b7a4bee1fd5913f930e166cae4bc2db47258eb1bc56dafc238e1ce2e49922e96f92e3a2af58b7a6124ce5a74a19b883209a8495f891108d68cb843a73e2f56eeb66b4ee9499382abe26298639f35b13281192381b841262e6c96c0fad550d03ccc3afb12c8994bf465c361f3ae3bc316cb71441b29cbc2038beb1c8855b65cf99336f8fd44b95ca2edecdde42a685e72db72a3c7de4c4625f26d473dfdd52e0245736dc03ea6e6f2e2dc663eb73e16c1c05c488cb347945ec9717c41bedea5460438716bf0e9680df3fc883fe7c28d02005b582eb1f90c9b6b0dbcd18f02a2eb8da365596458aa7f38195fc5f0745b7ca6f946b44c7833bb6ea83a52b7d0d0ed83ae670abb5c797f0d0763608b25f16cfa537f21f1c0df29c582dcf20560355dc894febf6e05bd90dcfa1a36ab555b32fe1432b199dee27811ead04a7a3e4b96472da02225c1cbf154e4446dea8f2398cf75a2bd516c2e91196b4a7e26eedc03d38155c0007255593cc9bf541790ecf8568a06f9ed874150e113bb9429a65e1a55dc378026d6ce0f3ef3976675de2cad266e6ae88ad6508ad8a8cfa019d857869a11afbe2b487f60aa7b7140f76ab569366e91cc9fed728703169024aff139d0601936928c9b108e8abcaafbf929f505f6313ee04106ed6e5b41a64c375ee245ff73ee8db9bc70d870b382a04e07446c8a1e6e1f7e2bbfdeea78799c1d7e922c9005946efb6e02ae26b20a7dc808f012646dd67b577cdaf54528b0b72514494d8e5bc78d0b24dbbd77bef3f750f70b30252892ccd612e473ed8d2d4f8119a0a429e5bb688b59698c6c5e09128803a6026fda7aa634d3423895a2031ba611c0db3d8e67a00665555f7270363f2a54a35e5ccead2b2db0449e4afae7f8f64637e62690b4fc7557e8661f4b886d3fb1d857c2af3bc0912fad5ab7729ad585dcbce3187547b47c0d8232fd611c6ed5cb1ae89fbda3580f5166ebf77b6646a1c7a781a431715a55ebd1e84a651a4e5073180541b424505e4e9eac69a73500b25613883cff3e83999db9db4b2935c0a495d1cdc8a34bccd9ffd27335b7e180756c0989efe7de9cc6652e92ab40b730da34305278d88247b69fcccc1fa303b94c6d5f044ae5d9d754cf8adee1cd689879a2164998e68a797617c046bb2480830a03d298d39a72071580822c8d3d432db3ec9657ad709a07e0bf04c824a6a0b0e358e129b0d6e53602be525f4009129e31a78ebb3eaca05960d59f1ae25f724b9f6fb26be34b7e0b20db5121885531934e418935fa69424edb67c00a40ff8602ab7b581f8562d151826d21023f0be08554a9658c68cb32a910aaae9bae47df434db1ceee79f57db3da54ba93b5a6cf8de78ecffe0bab2b5ee1a74cc2fc060943e4be8d6de189344b372c5dcd90011dbadedf0349f6a7d7b969fa2882841ad94f990c1c7bef6851670549507ceeb708e8fb3ad54fe871a46e7a38ec21b93b6567221404a07bbf6b0ee2c72e5778caaf0ce34173554589c61aee423dd61088099ff75bf815bd87743425f6e030fa4dc4ce8a5e705ca731a9e022c55f7ca506c9609c5609265d31df9565e36d3b8a2f1468c9e36b459797423ca2eda39777f0b037a27ae51d16f629ab8e3c8316d9e656d332aa9fe7847608542e154f3eaeb594c2acfef5a31bb5c1dda834f42c585a020e06417db7fa00191634c495c6a4322786971574a30ac07b391e65fa210bd4770997e1002bad17109b641ee2f59e9dafc5c42f64e68ec0a7a0a6da0d6c0e84633905cd16501d1d49d57ae48705403ad693979bc22bcf3e5c53c6ec2d25e39079bf1ab3f4bc2982b050c87c3557f844fdaaa092cc798159dc0a5a5c212686d389c5da3a195654901fc95d817387febddb515306d9a044740d6fb8981d790f4658be25c919c0b8f9444e24086a25f8ebce4a3a93d8503475ce70554167fabd6c37a394dcb881fedf89863522af8cde9de860d628e7b62b616e970c2dbc9554d09929e9c8b48df3917fafb34e734e4b6a6960d705336371f67d1dd4b041dc6be1d358af43469313a5bda29cbcfd18d2f91af566f77b3e9edf362bc49713d5cfc6d0592e25d0b35fab19dc0ead80ec808e1016794a5cf3672b224176c5307b5ad030ee075d556f5fd11f731866d45e5b94871ea45dec9bc2fe7ecc32abe6c61130b02b3d0d282ae6f1d76cfe6577db6dc2d3c760e9926eb1a7368aa5731feb0ec7c2e5396080d824acb8bdb1971f1d3c80277e7467a7fadf88eb46f5ab5f03990c78ba306650c0581c3d6769e12a9193d895f1ba4234f9290a605997848548dd01c4c9850fd3b0d1e8e448b93173213622c369b7997d243169ee6c5d537a28577d9acbb2497e3d3ff18c4ce93a03dd2d6e608085e1de720567c5a5a6a38f7d9c1038f3bf4761daa52be6afe3242ce6d335427fbea86993d4f34b1395f9e88747f751d4d8c23d02c5e11be909782e9bd6800e72d40332e7b98956a81891b46ad2d75152b10921d1696f8f5056c5f3df30ff92dded0cf0611511beb7a80c932ca85da29d502215d6abdc04b390d8629b0838c75730b1b022eb523ae5d2f88683afd4dc7bb871054f85d242aa999878ae88ae8d9704ae571f98cc5d5f87bef32d91afc92d3b9ab7c518295e662b7cb09f4e6fa01045f2821ffea470044397071e321d87b0a5aefe6e8bd95b38c5ccdc7d9ddaac755c4179551aadf33e94da6809f4cfe8ad93c0efc1c441334bfdc0eb78e622cefdd28bf9b2b13d6144e4f6b30323761c9659afa2876b59b5f9ae00c988695a5a638787a7a650739c4bf14b2eea530ad8e75c672a58735e8970463576c715306837fdc078687424781816c60d836c7fa9e83b98913689293919e69befffc53c483867f47ca3d7e68d540098925fc10448321123901416c2c44b74a5257615b3530984db50a4b5d1f7c94ab4be3251d891e57d11750fddf53e399353e50701cffb45b605646c6ab813c96fda13d38eb99c94e45a0da6f0a83f65c66c1d4ec218be6d8b28367ab386f591021232d1dffe8add2d6e1d7911d6116e79bb6274d105d4f89a380db015b26400abd5b7eb3550bfd5e5ed299e01c36ba4d5b3e7949a1c3e6d054bcbcf5abf9828e74cd474855edcff54234c41defea4cb260f9846dbb967c6d89e98db81dba34d7e2359a68a3e23ef736b48798f34bc457d647c651d26748080c99b6bc261cae6d3c06dce34b00c1a717bfdb859f07161421a932af1dd002fda0a0a96ae5ededfbd76097c0ffe30077fc9df21cfce9660883d8f65851383f6ea8ac7651751e66a356d3c6d6d77982bdbc1ee2685c1cb0141694094b2504b65f8aff92e99349d46db47ceb7ee6312bc5ee7e6dddbfa087a8f53a944c311977991e4bb12c8af6fe7626988c5ac64b60e9f910ed256b83a866974bd4b0a9755cb9edd90f8db4ccbe456f04f0259bd719d79af879382586d0da924844089b2f7b4744d0cb26a5f22f363c8e17934534979f7cd00d3e8b915c3a5a7ec12e4257f22e1e6434af64ef2e8523d1dca54636a0d75d70d24b4ed04790a5aa0e77136a37030fcc053277273511fd56e6124f5c40851709b6facf5adb8b7bf3943f103adde967b2eaee5cb355657f51db6910e6359df8c9175f054488ce0870e72d66a61b79f17602f955c0a87bbb727d2706dfad06e04e33ac3a0d22c9fbc2441adc5af95fc542a524b0dd9d1c74efcad046c4886fe89e68257c24e83d2bb4783f4269b8aa0db8bcec4594e191311b36a590b53b8ad3208c1e59cead48c87dfae88ff7e4ae9f045b4b45e81753b27b71f13ac7cc2dd03ed7efe09865f484c0750d2450337a2ee1bf24ba611dcd7bcf802fa2657dc0e81e3fd6a99b4e95f8117a391e2c0c4922e47c46ade5a27d5d879bc116f029c910f5f552107bd6ca3b4a1fec0395c0445839712e718fdb05ec235d648311c895d5a9ac226932749150779f88d5362d9541d3ff61f352e95059c33cea2ce0301f1e2bd0dad8a866b55f04bf97ff8d54bf8786823419391c6b03a3d98a0fa59d522d790ff6451a187fc281c34f8e4fe7baa0970a5ac9e87a5fd0d8a68f1a9d02101ea0c8452bc7f2bec5a69ee7a049c2291092084d126920c09ec274782243e1b448ffd4b9d5ac9d646a287487ddd023e3364971023cbf72031b8f54d16212b4a0cc816db767f5fc2ee8bbc797f5f027572d62276a39b5061a706f3e5b3e4f1521f89bbe7ec4410913070f1cb24919fe9c0c9a4bcacca812752e846c41857f150559100ae7ca564c3ac93238443773aa16a21f82aa1ecec146ce2c70bac41c6c5a3cd17196b4426a6e4e302cf993fe590c65a1cf52149868b020680be5bd6cd6aa664f128bf3508c43ce1bf17f411f0f4e8353da34c9072e89863caa05", 0x1000}, {&(0x7f0000001b80)="b22f59d1d10461cac115121aedf446a8ad1e33ab861d7b2c16d6a99413accfd4fec45691dab4a573f6536417b6caf78769c3098f25f8812c720fa110aeced5e6bbf227f10d929a37293185f0db1e3ebcd32b4af92a7a7d2758d6e8507a678bd704316af6", 0x64}], 0x3, &(0x7f0000002080)=[@cred={0x20, 0x1, 0x2, r2, r6, r7}, @cred={0x20, 0x1, 0x2, r2, r8, r9}, @rights={0x18, 0x1, 0x1, [r1]}, @rights={0x28, 0x1, 0x1, [r5, r4, r5, r0, r1, r3]}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r2, r10, r11}], 0xb8, 0x40040}, 0x20000801) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000002180), &(0x7f0000000380)=0xb) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r12}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r13 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES64=r4, @ANYRES16=r13, @ANYRESDEC=0x0], 0x3e7) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r13, 0xc4c85513, &(0x7f0000000600)={{0x9, 0x5, 0x6, 0x0, 'syz1\x00', 0x6}, 0x0, [0x7, 0x5, 0xfff, 0x100000001, 0x2, 0x1, 0x4c, 0x62ea, 0xb92, 0x2, 0x8001, 0x8, 0x0, 0x3, 0x4, 0x6, 0x5, 0x3, 0x94d, 0x5, 0x1ff, 0x8, 0x3f, 0xffff, 0x7fffffff, 0x80, 0x100000000, 0x1, 0x3, 0x7f80000000000, 0x5, 0x1, 0x9, 0x2, 0x4, 0x0, 0x8, 0x80000001, 0x1, 0x1000, 0x8, 0x7, 0xe, 0x8000, 0x3, 0x1, 0x7, 0x0, 0x1, 0x5282d12b, 0xb62e, 0x0, 0x0, 0x6, 0x3b5, 0x1, 0x0, 0x2, 0x4, 0x1, 0x5, 0x6, 0x8001, 0x4, 0x2348d46d, 0x4d8, 0x5b, 0x5, 0x9, 0x7, 0x0, 0x1000, 0x7, 0x1, 0x6, 0x2, 0x3, 0x6, 0x8, 0xffffffffffffff0b, 0x0, 0xffffffff, 0x5e4e, 0x80000000, 0x0, 0x5, 0x4, 0x4, 0x1ff, 0x5, 0x7f, 0x800, 0x80000000, 0x100000001, 0x1f, 0x800, 0x8, 0x3ff, 0x1, 0xff, 0x2, 0x401, 0x2461, 0xffffffff, 0x8, 0x5, 0x80000001, 0xffffffff7fffffff, 0x2, 0x4, 0x10000, 0x7, 0x0, 0x97, 0x7700724f, 0x2ed6, 0xffffffffffffffff, 0x5, 0x1ff, 0x401, 0x8, 0x9, 0x401, 0xfff, 0xae36, 0x7, 0x8, 0xfffffffffffff800], {r14, r15+30000000}}) [ 465.777324] loop0: p1 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:31 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 465.846823] loop3: p1 [ 465.866451] loop0: p1 [ 465.880344] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000080010000000000000000000000"], 0x18) 20:56:31 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 465.896417] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:31 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:31 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:31 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000003000000000000000000000000000000"], 0x18) [ 465.946655] loop1: p1 [ 465.966203] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 466.026495] loop0: p1 20:56:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0xffffff0d) [ 466.047649] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 466.084436] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000016000000000000000000000000000000"], 0x18) 20:56:32 executing program 5 (fault-call:6 fault-nth:0): accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:32 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 466.096783] loop1: p1 [ 466.106405] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 466.137486] loop3: p1 20:56:32 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f00) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 466.231331] loop3: p1 [ 466.251131] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 466.263886] FAULT_INJECTION: forcing a failure. [ 466.263886] name failslab, interval 1, probability 0, space 0, times 0 20:56:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000160000000000000000000000"], 0x18) [ 466.291975] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 466.306530] CPU: 0 PID: 22112 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #270 [ 466.307061] loop0: p1 [ 466.313907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.313914] Call Trace: [ 466.313953] dump_stack+0x1c4/0x2b4 [ 466.313975] ? dump_stack_print_info.cold.2+0x52/0x52 [ 466.313993] ? usercopy_warn+0x110/0x110 [ 466.314016] should_fail.cold.4+0xa/0x17 [ 466.314041] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 466.325885] ? lock_downgrade+0x900/0x900 [ 466.325908] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 466.325926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.325940] ? pid_task+0x115/0x200 [ 466.325953] ? find_vpid+0xf0/0xf0 [ 466.325973] ? __f_unlock_pos+0x19/0x20 [ 466.337391] ? lock_downgrade+0x900/0x900 [ 466.337409] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 466.337428] ? fs_reclaim_acquire+0x20/0x20 [ 466.354756] ? lock_downgrade+0x900/0x900 [ 466.354777] ? ___might_sleep+0x1ed/0x300 [ 466.354799] ? arch_local_save_flags+0x40/0x40 [ 466.354814] ? fsnotify+0xaae/0x12f0 [ 466.354833] ? wait_for_completion+0x8a0/0x8a0 [ 466.354852] __should_failslab+0x124/0x180 [ 466.386941] should_failslab+0x9/0x14 [ 466.386959] kmem_cache_alloc+0x2be/0x730 [ 466.386976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.386994] ? check_preemption_disabled+0x48/0x200 [ 466.387013] getname_flags+0xd0/0x5a0 [ 466.387029] getname+0x19/0x20 [ 466.387044] do_sys_open+0x383/0x700 [ 466.387061] ? filp_open+0x80/0x80 [ 466.449373] ? __ia32_sys_read+0xb0/0xb0 [ 466.453443] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 466.458898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.464450] __x64_sys_openat+0x9d/0x100 [ 466.468519] do_syscall_64+0x1b9/0x820 [ 466.472414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 466.477784] ? syscall_return_slowpath+0x5e0/0x5e0 [ 466.482720] ? trace_hardirqs_on_caller+0x310/0x310 [ 466.487744] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 466.492761] ? recalc_sigpending_tsk+0x180/0x180 [ 466.497519] ? kasan_check_write+0x14/0x20 [ 466.501766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.506623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 466.511811] RIP: 0033:0x457579 [ 466.515017] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 466.533917] RSP: 002b:00007fba91470c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 20:56:32 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x2, 0x0) r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000300)="745b0b46ae053bcc0a0fff80bc90ea4c3a413f4492fdeada9937dec94e45779b3cc4bf9489bf59456cf0c4cf2e6b901aacb7d2e588c2d717bc9a2b571ea770a2fe", 0x41, 0x0) keyctl$describe(0x6, r0, &(0x7f0000000600)=""/196, 0xc4) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) futex(&(0x7f0000000380)=0x1, 0x9, 0x2, &(0x7f0000000480)={r2, r3+30000000}, &(0x7f00000004c0)=0x1, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x200000000004, 0x8, 0xffffffffffffffff, &(0x7f0000000700)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="10000000000800800200000000001f00d85ce52edc27aa26cf100898ca5f15bcd0971c04ae14ca08ea218e5d373b000000261c6900000000000000"], 0x10) [ 466.541632] RAX: ffffffffffffffda RBX: 00007fba91470c90 RCX: 0000000000457579 [ 466.548900] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 466.556171] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 466.563440] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba914716d4 [ 466.570730] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000005 [ 466.578414] loop1: p1 20:56:32 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00000600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:32 executing program 5 (fault-call:6 fault-nth:1): accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 466.648296] loop3: p1 [ 466.657003] loop0: p1 20:56:32 executing program 1 (fault-call:5 fault-nth:0): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460002000000000000000000000000000000000000"], 0x18) 20:56:32 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x300) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 466.698799] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 466.777316] loop3: p1 [ 466.784019] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 466.791507] loop1: p1 [ 466.792154] FAULT_INJECTION: forcing a failure. [ 466.792154] name failslab, interval 1, probability 0, space 0, times 0 [ 466.817639] CPU: 1 PID: 22148 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 466.826317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.835678] Call Trace: [ 466.838287] dump_stack+0x1c4/0x2b4 [ 466.841930] ? dump_stack_print_info.cold.2+0x52/0x52 [ 466.847159] ? usercopy_warn+0x110/0x110 [ 466.851235] should_fail.cold.4+0xa/0x17 [ 466.855312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 466.860938] ? lock_downgrade+0x900/0x900 [ 466.865094] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 466.870901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.876440] ? pid_task+0x115/0x200 [ 466.880072] ? find_vpid+0xf0/0xf0 [ 466.883619] ? __f_unlock_pos+0x19/0x20 [ 466.887604] ? lock_downgrade+0x900/0x900 [ 466.891759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 466.897327] ? fs_reclaim_acquire+0x20/0x20 [ 466.901654] ? lock_downgrade+0x900/0x900 [ 466.905813] ? ___might_sleep+0x1ed/0x300 [ 466.910011] ? arch_local_save_flags+0x40/0x40 [ 466.914601] ? fsnotify+0xaae/0x12f0 [ 466.918323] ? wait_for_completion+0x8a0/0x8a0 [ 466.922913] __should_failslab+0x124/0x180 [ 466.927173] should_failslab+0x9/0x14 [ 466.930979] kmem_cache_alloc+0x2be/0x730 [ 466.935136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.940684] ? check_preemption_disabled+0x48/0x200 [ 466.945712] getname_flags+0xd0/0x5a0 [ 466.949517] getname+0x19/0x20 [ 466.952716] do_sys_open+0x383/0x700 [ 466.956447] ? filp_open+0x80/0x80 [ 466.959994] ? __ia32_sys_read+0xb0/0xb0 [ 466.964069] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 466.969534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.975080] __x64_sys_openat+0x9d/0x100 [ 466.979148] do_syscall_64+0x1b9/0x820 [ 466.983041] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 466.988411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 466.993347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 466.998196] ? trace_hardirqs_on_caller+0x310/0x310 [ 467.003220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 467.008291] ? prepare_exit_to_usermode+0x291/0x3b0 [ 467.013322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.018178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.023389] RIP: 0033:0x457579 [ 467.026607] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.045508] RSP: 002b:00007fa675d6bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 467.053229] RAX: ffffffffffffffda RBX: 00007fa675d6bc90 RCX: 0000000000457579 [ 467.060509] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 467.067779] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 467.075055] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa675d6c6d4 [ 467.082337] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000006 [ 467.101842] loop0: p1 20:56:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:33 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000200), 0x4) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="100000000000296900000000a9d3946eace4ae9e4df9cd2d167964089e12be5d23babb569879276b69013dda9998940b763544d91416e41e7f108179d78d1cd9e9dad709e125b41d2d1d558f99441adaaae77c63cc2ad609d16e341447beaf5dd748549610819925af7b898a2e55ebdf70e24c3e35e74f49ff2c254d9c6faf7c368b0a1a2266a2b31bad3c6a7ea1b61c3c847395664a99008a81143a1f45137e213902b1e7ae6c31849ad3125231272c6752527302a4"], 0x10) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000380)) syz_read_part_table(0x5, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000600)="563d2e45448a2e97c4445165651f756a0b7b6c1b64c6646edf44f345befd8c60403d1355a907e82d8b2f6b65941c08bd12dbcb84522a1590d8dbdac464e89a41bfba85d23f76bb181d94d6064d2a67487bb6ece4cfda6ce561a3261d83882f0d95b08b8447dfcb1b5c99f6e8969f0accdc8104c886c36cb98d1812adfba3bf42a3a2ad2dc4b37ffa4cc58d159f5a774d4166bc63f1cf6f97955dc1654e56a640d3c7558dc385f6c223a7c079730e7aefc7ec3749c6d8f6be13b41fcd87b2421759d539a20ca1ba", 0xc7, 0x23}]) [ 467.132248] FAULT_INJECTION: forcing a failure. [ 467.132248] name failslab, interval 1, probability 0, space 0, times 0 [ 467.179122] CPU: 1 PID: 22142 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #270 [ 467.186532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.195884] Call Trace: [ 467.198514] dump_stack+0x1c4/0x2b4 [ 467.202172] ? dump_stack_print_info.cold.2+0x52/0x52 [ 467.207382] should_fail.cold.4+0xa/0x17 [ 467.211454] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 467.216566] ? zap_class+0x640/0x640 [ 467.220380] ? debug_smp_processor_id+0x1c/0x20 [ 467.225056] ? perf_trace_lock+0x14d/0x7a0 [ 467.229306] ? zap_class+0x640/0x640 [ 467.233031] ? mark_held_locks+0x130/0x130 [ 467.237286] ? zap_class+0x640/0x640 [ 467.241014] ? fs_reclaim_acquire+0x20/0x20 [ 467.245347] ? lock_downgrade+0x900/0x900 [ 467.249507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.255061] ? ___might_sleep+0x1ed/0x300 [ 467.259220] ? arch_local_save_flags+0x40/0x40 [ 467.259235] ? perf_trace_lock+0x14d/0x7a0 [ 467.259260] __should_failslab+0x124/0x180 [ 467.259289] should_failslab+0x9/0x14 [ 467.268108] kmem_cache_alloc+0x2be/0x730 [ 467.268127] ? mark_held_locks+0x130/0x130 [ 467.268144] __alloc_file+0xa8/0x470 [ 467.268158] ? file_free_rcu+0xd0/0xd0 [ 467.268172] ? mark_held_locks+0x130/0x130 [ 467.268188] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 467.268205] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 467.268221] ? zap_class+0x640/0x640 [ 467.268239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.268272] ? check_preemption_disabled+0x48/0x200 [ 467.320447] ? lock_downgrade+0x900/0x900 [ 467.324627] alloc_empty_file+0x72/0x170 [ 467.328703] path_openat+0x170/0x5160 [ 467.332516] ? zap_class+0x640/0x640 [ 467.336294] ? is_bpf_text_address+0xd3/0x170 [ 467.340806] ? kernel_text_address+0x79/0xf0 [ 467.345225] ? path_lookupat.isra.43+0xc00/0xc00 [ 467.349985] ? unwind_get_return_address+0x61/0xa0 [ 467.354922] ? expand_files.part.8+0x571/0x9a0 [ 467.359521] ? iterate_fd+0x4b0/0x4b0 [ 467.363331] ? zap_class+0x640/0x640 [ 467.367059] ? __alloc_fd+0x347/0x6e0 [ 467.370867] ? lock_downgrade+0x900/0x900 [ 467.375015] ? getname+0x19/0x20 [ 467.378391] ? kasan_check_read+0x11/0x20 [ 467.382560] ? do_raw_spin_unlock+0xa7/0x2f0 [ 467.386981] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 467.391582] ? kasan_check_write+0x14/0x20 [ 467.395828] ? do_raw_spin_lock+0xc1/0x200 [ 467.400094] ? _raw_spin_unlock+0x2c/0x50 [ 467.404248] ? __alloc_fd+0x347/0x6e0 [ 467.408073] do_filp_open+0x255/0x380 [ 467.411879] ? may_open_dev+0x100/0x100 [ 467.415861] ? strncpy_from_user+0x3be/0x510 [ 467.420290] ? digsig_verify+0x1530/0x1530 [ 467.424542] ? get_unused_fd_flags+0x122/0x1a0 [ 467.429133] ? getname_flags+0x26e/0x5a0 [ 467.433207] do_sys_open+0x568/0x700 [ 467.436929] ? filp_open+0x80/0x80 [ 467.440476] ? __ia32_sys_read+0xb0/0xb0 [ 467.444547] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 467.450000] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.455548] __x64_sys_openat+0x9d/0x100 [ 467.459619] do_syscall_64+0x1b9/0x820 [ 467.463511] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 467.468883] ? syscall_return_slowpath+0x5e0/0x5e0 [ 467.473824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.478674] ? trace_hardirqs_on_caller+0x310/0x310 [ 467.483695] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 467.488722] ? prepare_exit_to_usermode+0x291/0x3b0 [ 467.493748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.498606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.503802] RIP: 0033:0x457579 [ 467.507002] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:56:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000150000000000000000000000"], 0x18) 20:56:33 executing program 1 (fault-call:5 fault-nth:1): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 467.525919] RSP: 002b:00007fba91491c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 467.533631] RAX: ffffffffffffffda RBX: 00007fba91491c90 RCX: 0000000000457579 [ 467.540905] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 467.548178] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 467.555482] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fba914926d4 [ 467.562752] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000003 [ 467.596687] loop0: p1 20:56:33 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 467.619471] loop3: p1 [ 467.641001] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 467.648575] FAULT_INJECTION: forcing a failure. [ 467.648575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 467.660471] CPU: 1 PID: 22173 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 467.667831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.677183] Call Trace: [ 467.679798] dump_stack+0x1c4/0x2b4 [ 467.683444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 467.688644] ? zap_class+0x640/0x640 [ 467.692374] should_fail.cold.4+0xa/0x17 [ 467.696452] ? check_preemption_disabled+0x48/0x200 [ 467.701479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 467.706592] ? debug_smp_processor_id+0x1c/0x20 [ 467.711274] ? perf_trace_lock+0x14d/0x7a0 [ 467.715521] ? zap_class+0x640/0x640 [ 467.719244] ? mark_held_locks+0x130/0x130 [ 467.723524] ? check_preemption_disabled+0x48/0x200 [ 467.728556] ? debug_smp_processor_id+0x1c/0x20 [ 467.733228] ? perf_trace_lock+0x14d/0x7a0 [ 467.737483] ? _parse_integer+0x180/0x180 [ 467.741639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.747187] ? check_preemption_disabled+0x48/0x200 [ 467.752207] ? zap_class+0x640/0x640 [ 467.755933] ? debug_smp_processor_id+0x1c/0x20 [ 467.760608] ? perf_trace_lock+0x14d/0x7a0 [ 467.764855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.770401] ? should_fail+0x22d/0xd01 [ 467.774301] ? zap_class+0x640/0x640 [ 467.778029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 467.783146] __alloc_pages_nodemask+0x34b/0xde0 [ 467.787829] ? zap_class+0x640/0x640 [ 467.791557] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 467.796582] ? __f_unlock_pos+0x19/0x20 [ 467.800571] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 467.806129] ? fs_reclaim_acquire+0x20/0x20 [ 467.810464] ? lock_downgrade+0x900/0x900 [ 467.814626] ? ___might_sleep+0x1ed/0x300 [ 467.818793] ? trace_hardirqs_off+0xb8/0x310 [ 467.823236] cache_grow_begin+0x91/0x8c0 [ 467.827318] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.832874] kmem_cache_alloc+0x665/0x730 [ 467.837032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.842582] getname_flags+0xd0/0x5a0 [ 467.846391] getname+0x19/0x20 [ 467.849596] do_sys_open+0x383/0x700 [ 467.853331] ? filp_open+0x80/0x80 [ 467.856877] ? __ia32_sys_read+0xb0/0xb0 [ 467.860947] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 467.866407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.871959] __x64_sys_openat+0x9d/0x100 [ 467.876058] do_syscall_64+0x1b9/0x820 [ 467.879961] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 467.885344] ? syscall_return_slowpath+0x5e0/0x5e0 [ 467.890288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.895144] ? trace_hardirqs_on_caller+0x310/0x310 [ 467.900174] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 467.905198] ? prepare_exit_to_usermode+0x291/0x3b0 [ 467.910231] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 467.915110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.920309] RIP: 0033:0x457579 [ 467.923512] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:56:33 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 467.942416] RSP: 002b:00007fa675d6bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 467.950151] RAX: ffffffffffffffda RBX: 00007fa675d6bc90 RCX: 0000000000457579 [ 467.957424] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 467.964697] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 467.971976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa675d6c6d4 [ 467.979248] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000006 20:56:33 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00000300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 468.010031] loop1: p1 20:56:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000200000000000000000000000000000000"], 0x18) [ 468.077947] loop0: p1 20:56:34 executing program 1 (fault-call:5 fault-nth:2): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000380), &(0x7f0000000400)=0x14) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) socketpair(0xb, 0x4, 0x401, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f0000000300)={{0xfffffffffffffff8, 0x2e58}, {0x0, 0x100000000}, 0x84, 0x6, 0x82}) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) 20:56:34 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf6ffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 468.168343] loop0: p1 20:56:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000001000000000000000000000000000000"], 0x18) [ 468.206463] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 468.218877] FAULT_INJECTION: forcing a failure. [ 468.218877] name failslab, interval 1, probability 0, space 0, times 0 [ 468.231071] loop3: p1 [ 468.234024] loop1: p1 20:56:34 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000a0ffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 468.252133] CPU: 0 PID: 22206 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 468.259539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.268892] Call Trace: [ 468.268923] dump_stack+0x1c4/0x2b4 [ 468.268947] ? dump_stack_print_info.cold.2+0x52/0x52 [ 468.268966] ? lock_downgrade+0x900/0x900 [ 468.268992] should_fail.cold.4+0xa/0x17 [ 468.269008] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 468.269029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 468.269052] ? is_bpf_text_address+0xd3/0x170 [ 468.269078] ? kernel_text_address+0x79/0xf0 [ 468.303521] ? __kernel_text_address+0xd/0x40 [ 468.303540] ? unwind_get_return_address+0x61/0xa0 [ 468.303559] ? __save_stack_trace+0x8d/0xf0 [ 468.303591] ? fs_reclaim_acquire+0x20/0x20 [ 468.312483] ? lock_downgrade+0x900/0x900 [ 468.312497] ? kasan_slab_alloc+0x12/0x20 [ 468.312518] ? ___might_sleep+0x1ed/0x300 [ 468.312535] ? do_syscall_64+0x1b9/0x820 [ 468.312551] ? arch_local_save_flags+0x40/0x40 [ 468.312575] __should_failslab+0x124/0x180 [ 468.321799] should_failslab+0x9/0x14 [ 468.321818] kmem_cache_alloc_trace+0x2d7/0x750 [ 468.321835] ? lock_downgrade+0x900/0x900 [ 468.321860] apparmor_file_alloc_security+0x168/0xaa0 [ 468.321874] ? percpu_ref_put_many+0x13e/0x260 [ 468.321894] ? trace_hardirqs_on+0xbd/0x310 [ 468.330339] ? mem_cgroup_charge_statistics+0x780/0x780 [ 468.330359] ? apparmor_socket_getpeersec_stream+0xab0/0xab0 [ 468.330374] ? kasan_kmalloc+0xc7/0xe0 [ 468.330392] ? kasan_slab_alloc+0x12/0x20 [ 468.330408] ? kmem_cache_alloc+0x306/0x730 [ 468.330428] security_file_alloc+0x4c/0xa0 [ 468.338708] __alloc_file+0x12a/0x470 [ 468.338722] ? file_free_rcu+0xd0/0xd0 [ 468.338739] ? mark_held_locks+0x130/0x130 [ 468.338756] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 468.338772] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 468.338797] ? is_bpf_text_address+0xac/0x170 [ 468.338813] ? lock_downgrade+0x900/0x900 [ 468.338829] alloc_empty_file+0x72/0x170 [ 468.347455] path_openat+0x170/0x5160 [ 468.347473] ? rcu_bh_qs+0xc0/0xc0 [ 468.347488] ? unwind_dump+0x190/0x190 [ 468.347511] ? is_bpf_text_address+0xd3/0x170 [ 468.347528] ? kernel_text_address+0x79/0xf0 [ 468.347545] ? path_lookupat.isra.43+0xc00/0xc00 [ 468.347559] ? unwind_get_return_address+0x61/0xa0 [ 468.347578] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 468.474857] ? expand_files.part.8+0x571/0x9a0 [ 468.474876] ? iterate_fd+0x4b0/0x4b0 [ 468.474896] ? __alloc_fd+0x347/0x6e0 [ 468.474913] ? lock_downgrade+0x900/0x900 [ 468.474925] ? getname+0x19/0x20 [ 468.474944] ? kasan_check_read+0x11/0x20 [ 468.474961] ? do_raw_spin_unlock+0xa7/0x2f0 [ 468.474982] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 468.507668] ? kasan_check_write+0x14/0x20 [ 468.507685] ? do_raw_spin_lock+0xc1/0x200 [ 468.507705] ? _raw_spin_unlock+0x2c/0x50 [ 468.520300] ? __alloc_fd+0x347/0x6e0 [ 468.520333] do_filp_open+0x255/0x380 [ 468.527920] ? may_open_dev+0x100/0x100 [ 468.527938] ? strncpy_from_user+0x3be/0x510 [ 468.527961] ? digsig_verify+0x1530/0x1530 [ 468.527981] ? get_unused_fd_flags+0x122/0x1a0 [ 468.545301] ? getname_flags+0x26e/0x5a0 [ 468.545324] do_sys_open+0x568/0x700 [ 468.545343] ? filp_open+0x80/0x80 [ 468.556632] ? __ia32_sys_read+0xb0/0xb0 [ 468.556652] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 468.556668] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.556687] __x64_sys_openat+0x9d/0x100 [ 468.556707] do_syscall_64+0x1b9/0x820 [ 468.556728] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 468.584986] ? syscall_return_slowpath+0x5e0/0x5e0 [ 468.585002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 468.585018] ? trace_hardirqs_on_caller+0x310/0x310 [ 468.585035] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 468.585053] ? prepare_exit_to_usermode+0x291/0x3b0 [ 468.585074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 468.614662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.614675] RIP: 0033:0x457579 [ 468.614692] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.614700] RSP: 002b:00007fa675d6bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 468.649651] RAX: ffffffffffffffda RBX: 00007fa675d6bc90 RCX: 0000000000457579 20:56:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 468.649660] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 468.649669] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 468.649677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa675d6c6d4 [ 468.649686] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000006 20:56:34 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffeb) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 468.706442] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:34 executing program 1 (fault-call:5 fault-nth:3): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:34 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x8000a0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 468.768009] loop3: p1 20:56:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000005000000000000000000000000000000"], 0x18) 20:56:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00fffffff6", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000300)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:34 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2611) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 468.916614] loop0: p1 [ 468.920822] loop1: p1 [ 468.934054] FAULT_INJECTION: forcing a failure. [ 468.934054] name failslab, interval 1, probability 0, space 0, times 0 [ 468.976082] CPU: 1 PID: 22246 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 468.983479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.992835] Call Trace: [ 468.995460] dump_stack+0x1c4/0x2b4 [ 468.999109] ? dump_stack_print_info.cold.2+0x52/0x52 [ 468.999152] should_fail.cold.4+0xa/0x17 [ 469.008391] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 469.008408] ? perf_trace_lock+0x14d/0x7a0 [ 469.008428] ? zap_class+0x640/0x640 [ 469.008442] ? mark_held_locks+0x130/0x130 [ 469.008460] ? mark_held_locks+0x130/0x130 [ 469.008479] ? trailing_symlink+0x970/0x970 [ 469.034211] ? mark_held_locks+0x130/0x130 [ 469.038458] ? debug_smp_processor_id+0x1c/0x20 [ 469.043144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.048699] ? zap_class+0x640/0x640 [ 469.052422] ? fs_reclaim_acquire+0x20/0x20 [ 469.056752] ? lock_downgrade+0x900/0x900 [ 469.061042] ? ___might_sleep+0x1ed/0x300 [ 469.065197] ? arch_local_save_flags+0x40/0x40 [ 469.069790] ? ilookup5_nowait+0x84/0xc0 20:56:34 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00a0008000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460014000000000000000000000000000000000000"], 0x18) [ 469.073872] __should_failslab+0x124/0x180 [ 469.078113] should_failslab+0x9/0x14 [ 469.081922] kmem_cache_alloc+0x2be/0x730 [ 469.086077] ? find_inode.isra.19+0xc3/0x210 [ 469.090489] ? do_raw_spin_lock+0xc1/0x200 [ 469.094736] ? bdev_i_callback+0x30/0x30 [ 469.098831] bdev_alloc_inode+0x1b/0x40 [ 469.102812] alloc_inode+0x63/0x190 [ 469.106446] iget5_locked+0x124/0x1c0 [ 469.110273] ? bdev_test+0x90/0x90 [ 469.113822] ? I_BDEV+0x20/0x20 [ 469.117116] bdget+0xb7/0x5b0 [ 469.120237] ? bd_may_claim+0xd0/0xd0 [ 469.124061] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 469.124080] ? kasan_check_write+0x14/0x20 [ 469.124095] ? do_raw_spin_lock+0xc1/0x200 [ 469.124115] bd_acquire+0x102/0x2c0 [ 469.137165] blkdev_open+0x10e/0x280 [ 469.137185] do_dentry_open+0x499/0x1250 [ 469.137201] ? bd_acquire+0x2c0/0x2c0 [ 469.137219] ? chown_common+0x730/0x730 [ 469.156368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.161916] ? security_inode_permission+0xd2/0x100 [ 469.166943] ? inode_permission+0xb2/0x560 [ 469.171190] vfs_open+0xa0/0xd0 [ 469.174533] path_openat+0x12bf/0x5160 [ 469.178430] ? zap_class+0x640/0x640 [ 469.182167] ? path_lookupat.isra.43+0xc00/0xc00 [ 469.186933] ? expand_files.part.8+0x571/0x9a0 [ 469.191529] ? iterate_fd+0x4b0/0x4b0 [ 469.195340] ? zap_class+0x640/0x640 [ 469.199070] ? __alloc_fd+0x347/0x6e0 [ 469.202879] ? lock_downgrade+0x900/0x900 [ 469.207028] ? getname+0x19/0x20 [ 469.210409] ? kasan_check_read+0x11/0x20 [ 469.214568] ? do_raw_spin_unlock+0xa7/0x2f0 [ 469.218987] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 469.223579] ? kasan_check_write+0x14/0x20 [ 469.227821] ? do_raw_spin_lock+0xc1/0x200 [ 469.232073] ? _raw_spin_unlock+0x2c/0x50 [ 469.236230] ? __alloc_fd+0x347/0x6e0 [ 469.240055] do_filp_open+0x255/0x380 [ 469.243863] ? may_open_dev+0x100/0x100 [ 469.247848] ? strncpy_from_user+0x3be/0x510 [ 469.252285] ? get_unused_fd_flags+0x122/0x1a0 [ 469.256878] ? getname_flags+0x26e/0x5a0 [ 469.260953] do_sys_open+0x568/0x700 [ 469.264692] ? filp_open+0x80/0x80 [ 469.268248] ? __ia32_sys_read+0xb0/0xb0 [ 469.272329] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 469.277794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.283347] __x64_sys_openat+0x9d/0x100 [ 469.287424] do_syscall_64+0x1b9/0x820 [ 469.291326] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 469.296700] ? syscall_return_slowpath+0x5e0/0x5e0 [ 469.301636] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.306490] ? trace_hardirqs_on_caller+0x310/0x310 [ 469.311519] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 469.316548] ? prepare_exit_to_usermode+0x291/0x3b0 [ 469.321575] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.326442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.331656] RIP: 0033:0x457579 [ 469.334866] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.353781] RSP: 002b:00007fa675d6bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 469.361508] RAX: ffffffffffffffda RBX: 00007fa675d6bc90 RCX: 0000000000457579 [ 469.368790] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c 20:56:35 executing program 1 (fault-call:5 fault-nth:4): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 469.376062] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 469.383334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa675d6c6d4 [ 469.390605] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000006 [ 469.406812] loop3: p1 [ 469.410166] loop0: p1 20:56:35 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:35 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf6ffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 469.499290] loop3: p1 [ 469.502420] loop1: p1 [ 469.503447] FAULT_INJECTION: forcing a failure. [ 469.503447] name failslab, interval 1, probability 0, space 0, times 0 [ 469.536665] CPU: 1 PID: 22273 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 469.544054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.546558] loop0: p1 [ 469.553411] Call Trace: [ 469.553437] dump_stack+0x1c4/0x2b4 [ 469.553458] ? dump_stack_print_info.cold.2+0x52/0x52 [ 469.553485] should_fail.cold.4+0xa/0x17 [ 469.562162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 469.562179] ? mark_held_locks+0x130/0x130 [ 469.562197] ? lock_release+0x970/0x970 [ 469.584747] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.584769] ? trace_hardirqs_on+0x310/0x310 [ 469.594716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.594733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.594752] ? check_preemption_disabled+0x48/0x200 [ 469.594772] ? debug_smp_processor_id+0x1c/0x20 [ 469.605836] ? perf_trace_lock+0x14d/0x7a0 [ 469.605856] ? zap_class+0x640/0x640 [ 469.605873] ? fs_reclaim_acquire+0x20/0x20 [ 469.605892] ? lock_downgrade+0x900/0x900 [ 469.615574] ? ___might_sleep+0x1ed/0x300 [ 469.615592] ? arch_local_save_flags+0x40/0x40 [ 469.615618] __should_failslab+0x124/0x180 [ 469.615636] should_failslab+0x9/0x14 [ 469.640706] kmem_cache_alloc+0x2be/0x730 [ 469.640724] ? mark_held_locks+0x130/0x130 [ 469.640738] ? zap_class+0x640/0x640 [ 469.640759] ? is_bpf_text_address+0xac/0x170 [ 469.640775] __d_alloc+0xc8/0xcc0 [ 469.640801] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.648844] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 469.648866] ? debug_smp_processor_id+0x1c/0x20 [ 469.648880] ? perf_trace_lock+0x14d/0x7a0 [ 469.648900] ? zap_class+0x640/0x640 [ 469.648917] ? mark_held_locks+0x130/0x130 [ 469.648932] ? kernel_text_address+0x79/0xf0 [ 469.648949] ? mark_held_locks+0x130/0x130 [ 469.648965] ? unwind_get_return_address+0x61/0xa0 [ 469.648984] ? __save_stack_trace+0x8d/0xf0 [ 469.649001] d_alloc+0x96/0x380 [ 469.661066] ? __d_alloc+0xcc0/0xcc0 [ 469.661081] ? perf_trace_lock+0x14d/0x7a0 [ 469.661100] ? debug_smp_processor_id+0x1c/0x20 [ 469.661118] d_alloc_parallel+0x15a/0x1f40 [ 469.661135] ? __d_lookup+0x591/0x9e0 [ 469.669066] ? lock_downgrade+0x900/0x900 [ 469.669080] ? mark_held_locks+0x130/0x130 [ 469.669102] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 469.669116] ? perf_trace_lock+0x14d/0x7a0 [ 469.669132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.669147] ? check_preemption_disabled+0x48/0x200 [ 469.669169] ? __d_lookup_rcu+0xaa0/0xaa0 [ 469.679706] ? debug_smp_processor_id+0x1c/0x20 [ 469.688583] ? perf_trace_lock+0x14d/0x7a0 [ 469.688601] ? __d_lookup+0x5b8/0x9e0 [ 469.688617] ? zap_class+0x640/0x640 [ 469.688637] ? d_alloc_parallel+0x1f40/0x1f40 [ 469.688651] ? path_openat+0x220/0x5160 [ 469.688670] ? lookup_open+0x302/0x1b90 [ 469.688691] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 469.710174] ? zap_class+0x640/0x640 [ 469.710191] ? __lockdep_init_map+0x105/0x590 [ 469.710214] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 469.717796] ? d_lookup+0x221/0x340 [ 469.717815] ? __d_lookup+0x9e0/0x9e0 [ 469.717833] ? lock_acquire+0x1ed/0x520 [ 469.717848] ? path_openat+0x250d/0x5160 [ 469.717865] lookup_open+0x560/0x1b90 [ 469.717887] ? vfs_link+0xb70/0xb70 [ 469.717911] ? down_read+0xb0/0x1d0 [ 469.717929] ? path_openat+0x250d/0x5160 [ 469.725884] ? __down_interruptible+0x700/0x700 [ 469.725915] path_openat+0x252d/0x5160 [ 469.725933] ? zap_class+0x640/0x640 [ 469.734831] ? path_lookupat.isra.43+0xc00/0xc00 [ 469.734848] ? unwind_get_return_address+0x61/0xa0 [ 469.734871] ? expand_files.part.8+0x571/0x9a0 [ 469.742808] ? iterate_fd+0x4b0/0x4b0 [ 469.742829] ? zap_class+0x640/0x640 [ 469.752849] ? __alloc_fd+0x347/0x6e0 [ 469.752867] ? lock_downgrade+0x900/0x900 [ 469.752880] ? getname+0x19/0x20 [ 469.752899] ? kasan_check_read+0x11/0x20 [ 469.762649] ? do_raw_spin_unlock+0xa7/0x2f0 [ 469.762667] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 469.762684] ? kasan_check_write+0x14/0x20 [ 469.762703] ? do_raw_spin_lock+0xc1/0x200 [ 469.771847] ? _raw_spin_unlock+0x2c/0x50 [ 469.780769] EXT4-fs: 3 callbacks suppressed [ 469.780779] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 469.784513] ? __alloc_fd+0x347/0x6e0 [ 469.784540] do_filp_open+0x255/0x380 [ 469.784556] ? may_open_dev+0x100/0x100 [ 469.784578] ? strncpy_from_user+0x3be/0x510 [ 469.792778] ? digsig_verify+0x1530/0x1530 [ 469.792806] ? get_unused_fd_flags+0x122/0x1a0 [ 469.792824] ? getname_flags+0x26e/0x5a0 [ 469.806199] do_sys_open+0x568/0x700 [ 469.806219] ? filp_open+0x80/0x80 [ 469.806234] ? __ia32_sys_read+0xb0/0xb0 [ 469.806254] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 469.806283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 469.814475] __x64_sys_openat+0x9d/0x100 [ 469.814496] do_syscall_64+0x1b9/0x820 [ 469.814512] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 469.814532] ? syscall_return_slowpath+0x5e0/0x5e0 [ 469.826939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 469.826958] ? trace_hardirqs_on_caller+0x310/0x310 [ 469.826975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 469.826994] ? prepare_exit_to_usermode+0x291/0x3b0 [ 470.019827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 470.024682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.029881] RIP: 0033:0x457579 20:56:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000001000000000000000000000000"], 0x18) [ 470.033077] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.051979] RSP: 002b:00007fa675d6bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 470.059690] RAX: ffffffffffffffda RBX: 00007fa675d6bc90 RCX: 0000000000457579 [ 470.066958] RDX: 00000000008000a0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 470.074222] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 470.081488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa675d6c6d4 [ 470.088756] R13: 00000000004c2a61 R14: 00000000004d4020 R15: 0000000000000006 20:56:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000300)=0xc) sched_setparam(r1, &(0x7f0000000340)=0x1000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x202002, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockname$inet(r2, &(0x7f0000000380)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000480)={0x4, 0x0, 0xa6}) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xc) 20:56:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000600", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:36 executing program 1 (fault-call:5 fault-nth:5): socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:36 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x8000a0ffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 470.207237] loop0: p1 20:56:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000120000000000000000000000"], 0x18) 20:56:36 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xa0008000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 470.286547] loop1: p1 [ 470.297355] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 470.316967] loop3: p1 20:56:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 470.367999] loop0: p1 [ 470.407022] loop3: p1 20:56:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000040000000000000000000000000000000"], 0x18) 20:56:36 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000600)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) rt_sigaction(0x3d, &(0x7f0000000380)={&(0x7f0000000300)="c4e1f910b500000080440f38c9d36647808704a4000009c4c3d569e9ea470f5c7501c443710eec0364420fef2142c10c3681c4427d18cb673e670f76bb71900000", {0x800}, 0x4, &(0x7f0000000080)="f34483cf12c4a3d148a50010654800c44235b7fa42a5c4c179e6800c1000023e66266666430f38245cd17bdde9660f3a601900c0c672c461f8ae546142"}, &(0x7f00000004c0)={&(0x7f0000000400)="8fe978e3210f5b1fc4a1656a0ca42687aa00000000460f2fb3cb000000c4e105d30a6666460f5603c4017b10342164640f01d0c402e53ee5", {}, 0x0, &(0x7f0000000480)="c4812575c7d9f4f3460294ab0f0000003e64ff11c4c1f82901c4a3bd0def7e0f446ffb0f71e3002e673665f76906dc2490"}, 0x8, &(0x7f0000000500)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x181000, 0x0) openat(r2, &(0x7f0000000200)='./file0\x00', 0x0, 0x200000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 470.469606] loop1: p1 20:56:36 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x200000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 470.504589] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 470.517528] loop0: p1 20:56:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x8000a0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:36 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000110000000000000000000000000000000000"], 0x18) 20:56:36 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x500) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 470.664016] loop3: p1 [ 470.667133] loop1: p1 [ 470.683429] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 470.697139] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xebffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00ffffff8c", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001600000000000000000000000000000000"], 0x18) [ 470.728201] loop3: p1 [ 470.737161] loop0: p1 20:56:36 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000780)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 470.806637] loop0: p1 [ 470.809959] loop1: p1 20:56:36 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffa0008000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:36 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1126000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:36 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffe0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000800100000000000000000000000000000000"], 0x18) [ 470.937239] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 470.947365] loop3: p1 [ 470.966406] loop0: p1 [ 470.977369] loop1: p1 20:56:36 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="008cffffff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 471.006389] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 471.026747] loop3: p1 [ 471.029727] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 471.090230] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 471.125465] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001200000000000000000000"], 0x18) 20:56:37 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x500000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 471.136673] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xe0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000004c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000500)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000600)={r4, 0x4}, 0x8) accept4$unix(r1, &(0x7f0000000640), &(0x7f00000006c0)=0x6e, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000740)={0x6, 0x118, 0xfa00, {{0x2, 0x9, "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", 0xc9, 0x4000000000, 0x764, 0x2, 0x3, 0x2, 0x3, 0x1}, r5}}, 0x120) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)={0x94, r3, 0x230, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9aef}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3c8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x729}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80}]}, 0x94}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="10000000000038be26b18545b24c9908"], 0x10) 20:56:37 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 471.277355] loop1: p1 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000001f0000000000000000000000000000"], 0x18) 20:56:37 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x7, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f00000000c0)}) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(r1, 0x22, 0x0, r1, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffffffffffe0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 471.300884] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 471.326748] loop0: p1 [ 471.330021] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:37 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x11260000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001500000000000000000000000000000000"], 0x18) [ 471.428657] loop1: p1 [ 471.431841] loop3: p1 20:56:37 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x8000a0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 471.487102] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 471.506743] loop0: p1 20:56:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffffffffff000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:37 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xebffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 471.569732] loop3: p1 [ 471.586828] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000110000000000000000000000000000"], 0x18) [ 471.657186] loop1: p1 20:56:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000300)={r0, 0x1, 0x40, "772b70c4ade248f2f94d85d076be1d6edba0ef31d1e606ce8002653c67786f586bb1d098f154cb488629d97bcd3ec484d7a70e7a281f97e41ce1c8c00fd18169fbd21c6d85fbf2027b1d87bcd78ebf6b6cd87431bcfbaada1253ccb1cee2b3ac8efcd1725ee9"}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 471.696709] loop0: p1 20:56:37 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 471.766594] loop1: p1 20:56:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x600000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 471.802061] loop0: p1 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000010000000000000000000000000000"], 0x18) 20:56:37 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 471.858599] loop3: p1 [ 471.877092] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:37 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="007fffffff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 471.926610] loop3: p1 20:56:37 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x100000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 471.949384] loop1: p1 20:56:37 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x200000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000080010000000000000000000000000000"], 0x18) [ 472.006906] loop0: p1 20:56:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0x20200) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000340)='/dev/snd/controlC#\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000200)={0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000300)={r3, 0x2}) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x6, 0x10001}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000380)={r4, 0x0, 0x3, [0x5, 0x5, 0x0]}, 0xe) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r5 = openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x10800, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r5, 0xc0a85322, &(0x7f0000000540)) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r5, 0x40045731, &(0x7f0000000400)=0x1ff) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000001000000000020000005e090000"], 0x10) [ 472.073154] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 472.097723] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 472.106864] loop1: p1 [ 472.126884] loop3: p1 20:56:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000500", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 472.147454] loop0: p1 20:56:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000500000000000000000000000000000000"], 0x18) 20:56:38 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfeffff00000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2000000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 472.266500] loop3: p1 20:56:38 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x400000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:38 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="100000000000000a0200000000000000"], 0x10) r1 = semget$private(0x0, 0x4, 0x480) semctl$SETVAL(r1, 0x3, 0x10, &(0x7f00000000c0)=0xa4d) 20:56:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000300000000000000000000000000000000"], 0x18) 20:56:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00f6ffffff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 472.427346] loop0: p1 [ 472.430070] loop1: p1 20:56:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0ffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 472.488645] loop3: p1 20:56:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000040000000000000000000000000000000000"], 0x18) [ 472.537628] loop0: p1 20:56:38 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x4) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:38 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 472.596763] loop3: p1 [ 472.637055] loop1: p1 20:56:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000006", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:38 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1000000000000000000000dc87bfdbf1fc18bd2a5b1ee48879ecbc0e3143c4c2d40e905cc1b765572b768bc138728d6884018eb11bfcb056abe1a363119ebb9463f7e6627db6b1e916a02f47e7fe5534cb9b0beddd0cb4764e79dc71f507e3cc165abceafdf14da951464b223ecb613daee36986e335dd8c6be8e6bd44b4fe9887a46e11b9a4fbdcaf48aff5c0444136421b5529a8879b57a00d0962a9d49ca2169014427c0383a65e3a101c4d895343651a8157bab9945b7e3f1a5f1cf4dded"], 0x10) 20:56:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xe0ffffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:38 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffff6) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 472.696398] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001600000000000000000000"], 0x18) [ 472.786564] loop3: p1 [ 472.790120] loop0: p1 [ 472.807054] loop1: p1 20:56:38 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x3f000000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00-', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 472.872916] loop3: p1 20:56:38 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xa0008000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 472.936565] loop1: p1 20:56:38 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x10, &(0x7f0000000600)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@common=@aname={'aname', 0x3d, '.'}}, {@rq={'rq', 0x3d, 0xd46}}, {@common=@nodevmap='nodevmap'}, {@sq={'sq', 0x3d, 0x5}}, {@rq={'rq', 0x3d, 0xffffffffffffffff}}, {@timeout={'timeout', 0x3d, 0x2}}], [{@measure='measure'}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, '.'}}, {@fsmagic={'fsmagic', 0x3d, 0x7f}}, {@smackfsroot={'smackfsroot'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(r1, &(0x7f0000000900)={0x100, 0x0, 0x2, [{0x2, 0xc94, 0x1, 0x0, '.'}, {0x2, 0x7, 0x13, 0x3, '/dev/snd/controlC#\x00'}, {0x3, 0xff, 0xfffffffffffffd92, 0x401, 'cgroupbdev#'}, {0x3, 0x3, 0x0, 0xd2b, 'md5sum*system'}, {0x2, 0x400, 0x13, 0x5, '/dev/snd/controlC#\x00'}, {0x1, 0x1, 0x13, 0xbce2, '/dev/snd/controlC#\x00'}]}, 0x100) 20:56:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000040000000000000000000000000000"], 0x18) [ 472.976506] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 472.986687] loop0: p1 20:56:38 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 473.048535] loop3: p1 20:56:38 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00?', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:38 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffff000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 473.077737] loop0: p1 20:56:39 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x2700) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 473.129885] loop1: p1 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000003f0000000000000000000000000000"], 0x18) 20:56:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfeffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 473.196755] loop3: p1 [ 473.206547] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:39 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/igmp6\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000300)={r3, 0x20}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:39 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:39 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000010", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000140000000000000000000000000000"], 0x18) [ 473.307771] loop0: p1 [ 473.357858] loop1: p1 [ 473.386698] loop3: p1 20:56:39 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:39 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffffe) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000030000000000000000000000000000"], 0x18) [ 473.437402] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 473.445103] loop1: p1 20:56:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x6000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:39 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00\'', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 473.548745] loop0: p1 [ 473.558163] loop3: p1 20:56:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) fallocate(r0, 0x0, 0x9, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000002000000000000000000000000000000"], 0x18) 20:56:39 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffffa0008000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 473.676582] loop0: p1 [ 473.679705] loop1: p1 20:56:39 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffeb) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:39 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00008000a0", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 473.807085] loop3: p1 [ 473.847890] loop1: p1 20:56:39 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000010000000000000000000000"], 0x18) 20:56:39 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffffa0008000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 473.876959] loop0: p1 [ 473.886924] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 473.890072] loop3: p1 20:56:39 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f000035dffc)=0x77e) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="10000000dd0000000200000000000000"], 0x10) 20:56:39 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\x00\x00 ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 473.997782] loop0: p1 20:56:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001500000000000000000000"], 0x18) [ 474.019524] loop1: p1 [ 474.060075] loop3: p1 20:56:40 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffeb) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:40 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x47535) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:40 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0ffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 474.176829] loop3: p1 20:56:40 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x152, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="1040200000000006000000e500000000"], 0x10) [ 474.210507] loop0: p1 20:56:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000001e0000000000000000000000000000"], 0x18) [ 474.246612] loop1: p1 [ 474.270950] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 474.279047] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:40 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000001", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 474.326319] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 474.334989] loop3: p1 20:56:40 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffe00) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000500000000000000000000"], 0x18) [ 474.437610] loop3: p1 [ 474.441328] loop1: p1 20:56:40 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xebffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 474.526485] loop0: p1 20:56:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) getsockopt$netlink(r1, 0x10e, 0xf, &(0x7f0000000900)=""/215, &(0x7f0000000380)=0xffffffffffffffe6) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e24, @broadcast}, 0x10) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:40 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000400000000000000000000000000000"], 0x18) 20:56:40 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0ffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 474.646570] loop0: p1 20:56:40 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000480)=""/130) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000120000000000000000000000000000"], 0x18) [ 474.746259] loop3: p1 [ 474.757346] loop1: p1 20:56:40 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00008000a0", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x20000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 474.856691] loop3: p1 [ 474.876904] loop0: p1 20:56:40 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x312, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) write$binfmt_elf64(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x534c, 0x0, 0x8, 0x4, 0x3, 0x3e, 0x3, 0x221, 0x40, 0x43, 0x8, 0x80000000, 0x38, 0x2, 0xfffffffffffffff8, 0x3, 0xff}, [{0x6, 0x100, 0x7f67, 0x1, 0x8001, 0x80000001, 0x1, 0x6}, {0x60000000, 0x0, 0x4, 0x4, 0x5, 0x100000000, 0x8, 0x1}], "3610f3d5f1a4e0e2e150551a43bc8d4c0a5188d88c82368a932b8eb8b123716d9e89385603d4aedabd2b6ebaaf4066afdfbbb497f72c3543c8d49931de0b22d5090a9a259e88f48aa1e0983d365e9c87714365e39aa55f81eb697d0367736c5db0d0e1aa69ebaa80a95e166a13ec78127d109f80625f7a3f11dde185ed59f304bc23f2e2c9b2fc4ebd2e32e2fa1d3d48221a9290068c8940f18e02734b84f8f7ac0427d21ed08efecac0a340cc3c5a12655f7e652e6da37ec85a52b0f17ef72929ff4f85b30427dc82a10886a6389bfe", [[], []]}, 0x380) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 474.899818] loop1: p1 20:56:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001400000000000000000000000000000000"], 0x18) 20:56:40 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1126) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:40 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000000000000278bc23c941cfb75f21f2321e856100000000000000"], 0x10) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000340)={0xfffffffffffffff8}, 0x4) syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0xe0, 0x40000) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000200)={0x2, 0x0, [{0xbff, 0x0, 0x8}, {0x944, 0x0, 0xd370}]}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 475.013454] EXT4-fs: 12 callbacks suppressed [ 475.013464] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 475.037242] loop0: p1 20:56:41 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="10000000000000000200100000000000f1b66043a826f841eacab52d1b1e5721963aa36447c31b1724314bfabe783807d73e42133505a7faed76fcc29172c9af343660316be865e5f414d9210097249583d766f026c370052736eeaa7a62480ea2255746e45f87c18f2846c13c5167367a8a6b95fb39ab99d5f4aad62c6ed66699e08ffdba607bf9792f71c30a0cd77bbc21d80c349866c1bd4015387b016897b126b42d5a09c1a2ea98305df30ad6ecb79fc49373a82e1e7ccf3288fe22c01abd54629139"], 0x10) 20:56:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000004", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000020000000000000000000000000000000000"], 0x18) 20:56:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x4) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 475.156473] loop1: p1 [ 475.167180] loop3: p1 20:56:41 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffffffffff000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 475.225816] loop0: p1 [ 475.234916] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 475.257614] loop3: p1 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001100000000000000000000"], 0x18) [ 475.286569] loop1: p1 20:56:41 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4, 0x5}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000300)={'nat\x00', 0x46, "3e196f13d5c7d13dbe224897ade3534da658332afe8afaeed1d0e4aa1e6e488c46df66833fa3de56d6be15f0ff129a3f90ffc1fed039bfde56a1ad9217d5ccbb463e08530a70"}, &(0x7f00000000c0)=0x6a) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00000500", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf0ffffffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 475.308896] loop0: p1 [ 475.327075] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:41 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000680)=ANY=[@ANYBLOB="c6000000180002000700000002000000ec00000001000000f80600000300000081af6b0840a0c1d0ee345a6f983eab9c28cd0351f624396488ae427e926ac4fe02000000c8b0e40c43288ae22a3dfb87c295891c70c268d3881e3cbc09f06e376ddc471f3a32650af2a5480e17c2aa4e59275fc7bc6bcf4149abae99a364e2a49c9cacea77b830bf6f1a610c29498f8961229b5ee20178080776f3fb04709ef1ba53f92257a7ab5acf57594a5c829acb8035825f5ae4b4ff45307798ebea05791000000000000000000000000000"]) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/49, 0x31) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f0000000400)={0x4, 0x59, 0x4, 0x2000, 0x0, 0x37159824}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f00000002c0)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="10001000000000000200000000000410c10b7092905c1dc0a5ece15304b7fbedc41f04c16e95f1d1e64f2985bda387e61f7933f6b531c04e5dbb8e0080e9ff5b71c1d39effff7cacd49b2f54f505f268668aa27bdf8a336d3d48395c667ed48e9ede4705ce4cbf4af59439d2c249c23c3e653a7a"], 0x10) 20:56:41 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x3f00000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000ffffffff00000000000000000000"], 0x18) [ 475.471285] loop0: p1 [ 475.474554] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 475.481403] loop3: p1 [ 475.506533] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:41 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfeffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 475.520895] loop1: p1 [ 475.527336] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:41 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="10000000000000000200000000000000680c7f0e6c2fd85e032f40983073c6e1dd2cbdbd9ab672e0086aab872262e6dfd1ce55e58b57e7653c94a17b40952a2dc9bd2a63a54b05e27d3f"], 0x10) [ 475.586299] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 475.594759] loop0: p1 20:56:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x400000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000110000000000000000000000000000000000"], 0x18) 20:56:41 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) dup3(r0, r2, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x10) [ 475.668816] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:41 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 475.746645] loop1: p1 [ 475.758276] loop0: p1 20:56:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\a\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 475.787101] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 475.795889] loop3: p1 [ 475.799304] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000160000000000000000000000000000000000"], 0x18) 20:56:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x8000a0ffffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 475.866130] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:41 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x4000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:41 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x8, 0x3848, 0x3, 0x3, 0x800}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000b40)=ANY=[@ANYRES32=r1, @ANYBLOB="b700000006ac27150500000000000000e0d9017fb14fe9a1d83287b3c280fc6df2f7f9cdf30473fd000000008000000000cc536c5d6a2e8c07a237db8d6ed13ef3685cf7701ebca2c108c077c37d764842a3ee7610388d62ffffb7277ca65d22b2af0ea1e2339aaab90da375075d19aa3f7775e8c8d72f2a391cdc014c9353c66a2768fdec1f266011c9d3c71f01dee4996653350108ead950b2a9437ba7c1ebdd0a40180d9552b50d633f3bf672794327686cf46adf1ac76eae25cd75dffd9611ed9aea52f640a585c7db367bad7974affbc9f6a77bffbe1926ba8da8a3b52acfd2c149adee424a4d7901eb9761"], &(0x7f0000000200)=0xbf) sendmsg$inet_sctp(r0, &(0x7f0000000880)={&(0x7f0000000300)=@in6={0xa, 0x4e23, 0x8, @mcast2, 0x4}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000006c0)="edaf3082752e01530b38eb4cd9d4249d4c4772e1a08eaf5b12625d432fa3fb3bbc22ccd69b3a80130b1b84f671f155bf7f0d954d819766bd26d9f3cbdc5a641d63848931a1", 0x45}, {&(0x7f0000000740)="d77c4badcf7e2a648e600cfb67a618269ca35dbb4f4c8bebb125f1953814ea9e7b794a7575f852dd664d8e587d203280a081ed5c4c09f549333bc4f07c1c0e5fffdc9cea067605a24f9ebdb2a2b68461d1c4a04f6159245055757fea95f58fae8effc3669e0c34acb1ce1e979295edcc2f2ad754e2d90989d1", 0x79}, {&(0x7f00000007c0)="0b41ac3f7cebd4a193c1e2ed7c28d282bfd098f15e409f3bc1abc569e9ac05c80db0d48901ab482530c5ac6d1f61c683790f9272dba8c5e136fe68ffd9ff7e1f68b8dd57bef192c554d58d8579805106fed3911269b62eeeaf536ccda848b01182c4dee52ee52d489e7da54fe4b99d4cadef36beeb2bdd76682bd4be33834facdcad6671f1f6f49a4b04771cc7d6c3b3ea9b3221a30a8836c1043497c13000e5d2d3e828a18cfbf25ee57cd1296cbf28facba6f08bf925fe", 0xb8}, {&(0x7f0000000380)="4095baab455e2a4747263592ada28c79702a0c3c43a1cb06b037326350ac87737395", 0x22}], 0x4, &(0x7f0000000900)=[@sndinfo={0x20, 0x84, 0x2, {0xffffffffffff6caf, 0x8000, 0x100000001, 0x800, r1}}, @sndrcv={0x30, 0x84, 0x1, {0x100000001, 0x8, 0x200, 0x9, 0x6, 0x1, 0x9, 0x8, r1}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @authinfo={0x18, 0x84, 0x6, {0x379}}, @init={0x18, 0x84, 0x0, {0xbf5, 0x2674, 0x6, 0x5}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x17}}], 0xb8, 0x4000}, 0x4) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000ac0)=0x1000000000000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f00000008c0), &(0x7f0000000a80)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000b00)={r1, 0xffffffffffffff9f}, 0x8) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000009c0)=ANY=[@ANYBLOB="100000001d0000e10100000000000000e0ce9e8616a3bb0c37d14e5f29a731d6bbd9c21228cbd9f07203b2a3c5e1cf919fb85f37a141139810434f270cdf12af8542704efae182df83bf84ad0d690f9a90c74964cbf7d7224c62002b7d1a56620be54ff52b4200ecc02b2efb8bfed02a96592038f4f5425a627bdeb20b10ef96efb8d4a24e2a082ddcc5e86e201a016f0707aadcf5b33edda9b045dd2c83df"], 0x188) [ 475.908025] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 475.916858] loop3: p1 20:56:41 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:41 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000400)=0xff) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0xfffffffffffff800, 0x4, 0x1, 0x56e1}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r3, 0x1}, 0xc) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="1000ec06000000000000000000"], 0x10) 20:56:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000100000000000000000000"], 0x18) [ 476.005171] loop1: p1 20:56:41 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x3575040000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 476.056645] loop0: p1 [ 476.057072] loop3: p1 20:56:42 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 476.119984] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 476.127878] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 476.139102] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000200000000000000000000"], 0x18) [ 476.196523] loop1: p1 [ 476.216482] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 476.226466] loop3: p1 [ 476.236428] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:42 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000007000069858ff893b52c65b8a638dd3369efe3e95400f100"], 0x10) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000480)={0x40002, 0x0, [0x9e7, 0x9, 0x2112a763, 0x8, 0x8, 0x40, 0x10001]}) 20:56:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="00ffffffff", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:42 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x10000, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x5, 0x200002) perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x7f, 0x9, 0x3, 0x1, 0x0, 0x2, 0x24, 0x9, 0x3ff, 0xc5, 0x40, 0x1, 0x9, 0x7fff, 0xf5d, 0x6, 0x3ff, 0x5, 0xb866, 0x5668, 0x80000001, 0x400, 0x81, 0xfffffffffffffffb, 0x3, 0x1, 0x2, 0x4, 0x4, 0x5, 0x1ff, 0xfffffffffffffc00, 0xfff, 0x7f, 0x6f, 0x8001, 0x0, 0xfffffffffffffffa, 0x3, @perf_bp={&(0x7f00000000c0), 0xb}, 0x21100, 0x10000, 0x1, 0x7, 0x8, 0x5, 0x10000}, r1, 0x3, r2, 0x2) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)=@known='trusted.overlay.opaque\x00') 20:56:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf6ffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 476.519086] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 476.566447] loop0: p1 20:56:42 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x5000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 476.589695] loop1: p1 20:56:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00`\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000150000000000000000000000000000"], 0x18) [ 476.647868] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 476.660435] loop3: p1 20:56:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xa0008000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 476.688177] loop0: p1 20:56:42 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x1000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 476.754589] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 476.761707] loop3: p1 20:56:42 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000600)=ANY=[@ANYBLOB="04000000ff0f0900ff0f0180ef02009494232eab592e9277906ac99a139d198109ef257976871813aa782556e2faa402e8b15d37f4de9650eceb49fbc0b86344444db61d30aedc7151745df35a1e85d9561900a79a170048f5093c052a53339ac047a9f1ff0700001272e9a87d5aa45ff1444374b04414bee3ee680cf1491567182c783e17c586da864de04577fb950015716de048cc3cd5157531e6f92baef94cfb4db040b336062552d823650b1d12204726077674eaadebdf2d0da9952ad890517cbe17b9ef36aa"], 0xc) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001f00000000000000000000000000000000"], 0x18) [ 476.796387] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffffe) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:42 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00`\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:42 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x40202) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000380)={0x4823, 0x80, 0x7, 0x2, 0x0, 0xfffffffffffffff8}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getcwd(&(0x7f00000013c0)=""/142, 0x8e) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) utimensat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)={{0x0, 0x7530}}, 0x0) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="10000000800000000200000700000000c974cbb5194a4bacc374243d8e00020000bc70154561"], 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f00000000c0)={0x800, 0x401, 0x6, 0x5}) 20:56:42 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x3f00) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 476.940543] loop0: p1 [ 476.957490] loop1: p1 20:56:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000140000000000000000000000000000000000"], 0x18) [ 476.997829] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 477.014544] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 477.020476] loop3: p1 20:56:42 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x6) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 477.078156] loop0: p1 20:56:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:43 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(r0, 0x0, &(0x7f0000000140), 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000000c0)={0x2, 0x8002, 0x1f, 0x4, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000300)={r4, 0x4}, 0xc) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 477.117808] loop3: p1 [ 477.166121] loop1: p1 20:56:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001e00000000000000000000"], 0x18) 20:56:43 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x5) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:43 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64\x00', &(0x7f0000000340)='!ppp0security\x00', 0xe, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 477.413523] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 477.447003] loop0: p1 20:56:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 477.477014] loop1: p1 20:56:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000007fffffff00000000000000000000"], 0x18) 20:56:43 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xebffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 477.536978] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 477.556838] loop3: p1 [ 477.560321] loop0: p1 20:56:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xe0ffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:43 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') ustat(0x1, &(0x7f00000000c0)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600001e0000000000000000000000000000000000"], 0x18) 20:56:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000200", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 477.688560] loop1: p1 [ 477.689721] loop3: p1 20:56:43 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="10000005000000000200000000000000"], 0x10) [ 477.746575] loop0: p1 [ 477.749806] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 477.777351] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:43 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x2000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001400000000000000000000"], 0x18) 20:56:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 477.829206] loop0: p1 20:56:43 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r2, 0x21, "626181c80a6663febc14be0cb4f544cd3c392450dd26dadd4dfc5df62ab57d9f7e"}, &(0x7f0000000380)=0x29) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 477.876576] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:43 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x600) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 477.946327] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 477.955169] loop0: p1 20:56:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000003f00000000000000000000000000000000"], 0x18) [ 477.988459] loop3: p1 20:56:43 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:43 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x3f000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:43 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) stat(&(0x7f00000000c0)='\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r1) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 478.123224] loop1: p1 [ 478.146569] loop0: p1 20:56:44 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000600)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) r3 = getgid() write$FUSE_ENTRY(r0, &(0x7f0000000480)={0x90, 0x0, 0x6, {0x2, 0x0, 0xfff, 0x4, 0x7, 0x8, {0x6, 0x2dba, 0x81, 0x80000001, 0x2, 0x5, 0x76f, 0x9, 0x1000000000, 0x3, 0x3, r2, r3, 0x8, 0x3}}}, 0x90) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 478.168320] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="000300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001e00000000000000000000000000000000"], 0x18) 20:56:44 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfeffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 478.216623] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 478.224424] loop3: p1 20:56:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xe0ff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000001f00000000000000000000"], 0x18) [ 478.326777] loop0: p1 [ 478.336503] loop3: p1 20:56:44 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f00000000c0)=0x6) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[@ANYBLOB="1040d3f1deb39166600e4cf0e0000000"], 0x10) 20:56:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:44 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="900001000000001625d502ba391b0000000000000000"], 0x10) [ 478.439824] loop1: p1 [ 478.458011] loop0: p1 20:56:44 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='ns\x00') ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000300)={0x2, &(0x7f0000000200)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000380)={r1}) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000600)={0xfffffffffffffd5e, 0x0, 0x2, [{0x5, 0x1, 0x13, 0x100000000, '/dev/snd/controlC#\x00'}, {0x6, 0x938b, 0x13, 0x7fff, '/dev/snd/controlC#\x00'}, {0x4, 0x1000}, {0x2, 0xf60, 0x8, 0x7fffffff, 'cgroup)*'}, {0x5, 0xffffffffffff8000, 0x13, 0x52f, '/dev/snd/controlC#\x00'}, {0x5, 0x400, 0x0, 0x9}, {0x3, 0x1, 0x13, 0x8, '/dev/snd/controlC#\x00'}, {0x4, 0x1, 0xb, 0x80, '/dev/audio\x00'}, {0x2, 0x80000001, 0x13, 0x4, '/dev/snd/controlC#\x00'}]}, 0x178) 20:56:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000300000000000000000000"], 0x18) 20:56:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000003", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 478.566879] loop3: p1 20:56:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:44 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc10c5541, &(0x7f00000000c0)=0x6) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 478.646663] loop3: p1 [ 478.666963] loop0: p1 [ 478.697442] loop1: p1 20:56:44 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x80, 0x0) recvmsg$kcm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)=""/68, 0x44}, {&(0x7f0000000480)=""/170, 0xaa}, {&(0x7f0000000200)=""/52, 0x34}, {&(0x7f0000000380)}, {&(0x7f0000000400)=""/55, 0x37}], 0x5, &(0x7f0000000680)=""/198, 0xc6, 0x4}, 0x20) socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="100000000000000002000000000000000000000000000000000000000000"], 0x10) 20:56:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000020000000000000000000000"], 0x18) 20:56:44 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) r2 = request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500)='/dev/audio\x00', 0xffffffffffffffff) keyctl$get_security(0x11, r2, &(0x7f0000000600)=""/105, 0x69) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000900)=ANY=[@ANYRES32=0x0, @ANYBLOB="0500000000000000ed562df907b50f57b7e160d9010aa1a1e1b4f681e3f32fb9877f6004330f745a4a3d831f8b84d182a0ef59fb5b504debdefefd108196a4d419db234829ddef1c70a4dc0685e45c7f671451629489e40b8a0eb0a16792008708547e85f13644e614dabf6c6e08224434bf837233a2f5a88326b69545696c153a3944d84e35f200000000b4c4cef7fcbb876d8ff12b646f3ac2c872698b242211c1a6d12fd2c8614db60273b58d8a6be2a7b5132c3c64159ed9aa6cdd83e9be2b54131569ed7b2915597ab45272b066dc6657f71d3db877e0ce5bd52ec185b1d4e08c99e3baaf60dbd7bd74624b6290413704d0f39304b5cbbed433f6caac4a8a1e33b470a20feb094ab15d4ea2f97042fc5926dfac405e7e09d3b6c1ad0543486c48d160c5aead1d67e143e052312ba1855bb7dec3a4d1e42ed945a7a1ba68d72cac1f458bd9e5996341dc461476a98336afed918bee0901b6a60ebef196a5ea4154e16c4ebe083143ef1d283d3f78fc57ba5cb7094684aa0f5c771dbfa28d08357052a4a10b8570c6bddb00b47625305262559b324abeeec3f61b16fc10f1237d1115f25845d706274b851e2bee77ba9e61c60377e81b49fb822d17334889558926ddc377f76e5bc1fcc0dccd1d3e44930db11cfc4ef42ed06ae0b8c200124c260d3ff50238d44d4bae461531f83d30de07c534b1e44da7e7a032e3f03db81313812b80cb6735837b08b8f5991911654e62169817925074ebdc746f0f98b736520eeab314d5acacddd71e33"], &(0x7f0000000200)=0xb) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000300)={0x8001, 0x201, 0x9b02, 0x9, r4}, &(0x7f0000000380)=0x10) keyctl$link(0x8, r2, r2) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000400)=0xe5, 0x1) 20:56:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xebffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00 \x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:44 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) getsockname(r0, &(0x7f0000000300)=@ethernet={0x0, @broadcast}, &(0x7f00000000c0)=0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x20, 0x0, r1, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 478.856970] loop3: p1 [ 478.897737] loop1: p1 20:56:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000003f00000000000000000000"], 0x18) 20:56:44 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:44 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 478.957589] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 478.958615] loop3: p1 [ 478.969971] loop0: p1 20:56:44 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffff000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:44 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = syz_open_dev$sndpcmp(&(0x7f0000000c00)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000f80)={{0x40, 0xe5e0}, 'port1\x00', 0x3, 0x1, 0x0, 0x1, 0x3, 0x2, 0x0, 0x0, 0x2, 0x2}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000b40)='/dev/midi#\x00', 0x400, 0xa4042) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='gre0\x00') syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000bc0)=0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x307) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000700)={0x0, 0x81}, &(0x7f0000000740)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000780)={r5, 0x9, 0x10, 0x4b, 0x1}, &(0x7f0000000b00)=0x18) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000300)=0x10001, &(0x7f0000000340)=0x1) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000600)=""/206, &(0x7f0000000200)=0xce) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x4, &(0x7f00000009c0)=[{&(0x7f0000000480)="f8c3f973ddedcdab175a43676ce25e114ab091586d02620036c91eab9fdb918311c4b67b22277e85507a20d139b55977645f05b1d71069d05640560861f8a8ce2f0d892d7a41efa4f57f3f4283a87db0305a1004987b8a4cf556e4df1273d93307388b9a014b", 0x66, 0x80000000}, {&(0x7f00000007c0)="6eeca44f474a90039aeefb77bb26321eaa5e989f6026d569c73fd68b1b69863e6684ceb9b60bccceaa6f1b8c3259ad99261d34dbbd6a21ec86424f9673776560b9e88304a9dedc1c92a5be485748ba48e98ad4256586cb3dff8acf67fef588e3a30d70744c121b1c8f64306ba3d2fe2c7b3c21ad4c798f42fb2056cd2e2229b1a963649d68bf05d26eb57baffa4efaf9a17b8ffb6382d04f79194d50227bbb62159dc24b203ae8d6e791b3203f97bbfdc2bc078babd15588cfda2c31bfb6f0b59852157a69934fc8dc9705898fa184dfcb846db32804df5207b77d58842f0a528e18d75923a286e23e9ee40be7dc", 0xee, 0xa9c}, {&(0x7f0000000500)="9c2a47455a77e7a2cda0b7f3cdb545d0b9fe857a", 0x14, 0xffffffffffff4c43}, {&(0x7f00000008c0)="19a8c2f2a6ee29ab12e940661ddba68c5abe80d123dda9a153151bdbb3c459e307ace0b0cd5e10e818196c93f3c3a96f0c36d0d0a1c9f3e6986438871cfaadbcec1db6d4fd05ac60ddaa061195e417743dc51703c765146eed2545a1c3e78319ebd8152e7dd4183b3440f3e4d5403fead079e55a46a9ec66e8c149e52aa04e459dbb14be2acad7248e1f8246df6aa811b7775bd5e73ebaec8b4c82e27c4af65b2892a31fbe5dc6073ea4d6883817477a1537946c4bd40e2196ae0438e7c0b61f7cd5273594e831126ce9b5aaad30d3a04b23088e3cff56704a51114b37107031fa99e24c77c9", 0xe6, 0x8}], 0x40000, &(0x7f0000000c40)=ANY=[@ANYBLOB="73686f72746e616d653d7769916e742c757466383d302c757466387d302c73686f72746e616d653d6c6f7765722c6575698b607fb5403744f051a407953e2ee400104c6c1228b861d33db37fd1acfd48abe7d969fa2f2357be754a67386b4ddeb31450336d4da37bf3bbdffcad90b62e89076447882a6d3f58691bb14ff72cc62d", @ANYRESDEC=r6, @ANYBLOB=',subj_type=/dev/snd/controlC#\x00,fsname=/delC#\x00,smackfstransmute=gre0\x00,appraise_type=imasig,smackfshat=*,fscontext=system_u,\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000b80)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x5}, [{0x2, 0x4, r6}, {0x2, 0x1, r6}], {0x4, 0x2}, [{0x8, 0x1, r7}, {0x8, 0x0, r7}, {0x8, 0x6, r7}], {}, {0x20, 0x1}}, 0x4c, 0x2) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x10) [ 479.080754] loop0: p1 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000400000000000000000000"], 0x18) 20:56:45 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = syz_open_dev$adsp(&(0x7f0000000600)='/dev/adsp#\x00', 0x6, 0x43) readlinkat(r0, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)=""/209, 0xd1) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000cc0)={'eql\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000e00)={&(0x7f0000000d00)={0x1d, r2}, 0x10, &(0x7f0000000dc0)={&(0x7f0000000d40)=@canfd={{0x0, 0xffffffff80000001, 0x2, 0x324}, 0x3d, 0x2, 0x0, 0x0, "d4e4d41d580a8b385beca79ce0295ac44e0914b767df3acc85c0fb5801c3c1843f8f8b122c57f1d8e2faf8d1c04822e5c225fcdb221733bdef28087ed53b2a51"}, 0x48}, 0x1, 0x0, 0x0, 0x90}, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r4}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000bc0)=0xe8) syz_mount_image$vfat(&(0x7f0000000780)='vfat\x00', &(0x7f00000007c0)='./file1\x00', 0x3, 0x3, &(0x7f0000000840)=[{&(0x7f0000000800)="45599c4425557775582abff9930e00d2cc227766eee4e1a811c7d25e2ae47d6e60d92cde3839ed99ff6af00f1b4695665f62cf500d42c23a", 0x38, 0x88}, {&(0x7f0000000900)="57f6827de808ad6e428e91f367827d509dca2d276de587533b45e36aeb7f1de6922fdb1758d82b2c6ce4182ff676a25a070ed2d2dd57cb4f941a20b345b289acccf1cd6f4e566051d79b6ef0bb32beadb0133c23a931416b25ee8847ed880f166941f3f5dc5e8acd9de55d3864adfee6c14cf1f0547ca1af5f9667e269e1f08f5cb274e24f4783570831d03802e7e4426f90789c562c8d1b7770d57180dfb08de4", 0xa1, 0x6}, {&(0x7f00000009c0)="61ca4fac3dd08deb8bd3e49ffb2912e8e45ac0f0f44a52ae7562d68f0eabaecef3729624ffe6c535934ecb158f352f38583d0c20a14df5d404f7c5b19d2af7d90904033c31a9b1204526d4c6d86bd1893d2304239c721631c79853cb16fab8d464c2dcd88997ae2c34a86a6e595c78bd07fac5e402513592254a760afe8b1856fc9a6a8ca5568eb25c934cd2625896d2b169f8f925b3c987a0ca9f37be860fd198be410fe83aca21b140071f5b0f93ac995db91e0d4621dabc709edec9aa3a5aad097f51863f79fdfccc1e3d14efc3dce7cb7aca33fa113bd565500314025753f9e62ffb268ad4fcc468bfeefc", 0xed, 0xe4}], 0x80000, &(0x7f0000000c00)={[{@uni_xlate='uni_xlate=1'}, {@uni_xlateno='uni_xlate=0'}, {@fat=@errors_continue='errors=continue'}, {@numtail='nonumtail=0'}], [{@fsmagic={'fsmagic', 0x3d, 0x1b}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@fowner_lt={'fowner<', r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, '@security'}}, {@subj_user={'subj_user', 0x3d, '/dev/snd/controlC#\x00'}}]}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xd1}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x5}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000480)={r6, 0x80000000, 0x4, 0x1, 0x7, 0x5, 0x1, 0x1, {r7, @in={{0x2, 0x4e23, @rand_addr=0x6}}, 0x2a19, 0x8, 0x1, 0x100000000, 0x7ff}}, &(0x7f0000000400)=0xb0) write$FUSE_DIRENT(r3, &(0x7f00000008c0)={0x8, 0x0, 0x2}, 0x10) [ 479.134700] loop1: p1 [ 479.178578] loop3: p1 20:56:45 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) 20:56:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\x00\x00\'\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x100000000000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000030000000000000000000000000000000000"], 0x18) 20:56:45 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') getpeername$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) connect$packet(r0, &(0x7f0000000340)={0x11, 0x1c, r2, 0x1, 0x400, 0x6, @local}, 0x14) write$FUSE_DIRENT(r1, &(0x7f00000000c0)={0x10, 0x1}, 0x10) [ 479.291505] loop0: p1 [ 479.298291] loop1: p1 [ 479.327996] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 479.335667] loop3: p1 20:56:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfeffffff00000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:45 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0}, &(0x7f0000000780)=0xc) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x10000, 0x2, &(0x7f0000000700)=[{&(0x7f0000000600)="aed677d1c4deaff2e1a5cee6e2c08a2273318dc91c2b69cf4a7e22091811e0657f978483aca0bf169c880806fc7e6ec056612454e2c2ab1d70896d5c8abfecd353c9ddc82a4db3725b5d1e2202abdd6cce734f0bcb4c03411e618b3dc25f07df32f610e25bede262f6fd51892c81a510f4c2a7ba0fa21725ac5d8c86c805dd3b7ffb5e8a182bafcd21b014427626bebde5c671dbf086184910c6f48e10eadf49473017ab9ba61e8600165b6334610fee64c8c92ec76fb7a91b1d96d7aea01b90f127ee31d1ea4b5a113f4112448243e91d9a3c93eaeeeb00", 0xd8, 0x401}, {&(0x7f0000000500)="ad18ccd3766c362dd1004c9dc3c2b6d46c41cb7979a51e59d17c294dfde3ebccfd76568c309663957e1e4760e991b22a4500c391c557f14b03a77d7f", 0x3c, 0x1800000000000000}], 0x0, &(0x7f00000007c0)={[{@nodots='nodots'}, {@nodots='nodots'}, {@fat=@dmask={'dmask', 0x3d, 0x7}}, {@nodots='nodots'}], [{@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'staff_u'}}, {@audit='audit'}, {@uid_eq={'uid', 0x3d, r2}}]}) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r3}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in={{0x2, 0x8, @multicast1}}, 0x0, 0x4}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000480)={r4, 0x40, 0x62, "d436f9106f2b7d2cbea17038cb8b22dfe97b5fe3b1e3033a67e8adbe3509ec7f64f4ba542483e39bcaa5bb725762717c7b9a30fae013a25a326cace0df79fcd9bde6926fd6a14e6831e04354e7e5bddc47135484d08dd85be95cec968f74d70dcdfd"}, 0x6a) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000150000000000000000000000000000000000"], 0x18) 20:56:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:45 executing program 5: syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40800, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xec6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0xe20798885b06221d) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30f) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) openat(r1, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x6, 0x4, &(0x7f0000000600)=[{&(0x7f0000000340)="381d287b31415e936e87f8f418b06cb6a1032aee46c73a44199f9ac3076750d5b05ae9735a52667e6fcda2e850337b37a5b041616fce2ce59abb2bd2b7cbe1401a755e4fce70e0417ef9113b06ca454d176f0e3cd1c1ff2c8ac39f36c19b6488a7e7ac569eb36b0246bd298828d1ea8195dc08", 0x73, 0x5}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f0000000480)="e367439e3fdf64b625f36f56cbf408cdb60938a18acae0b811ecbce419c43d33a87132386a133dc50548c71c9cf0dec1ccf6a80035a1e4e9f23901941b54da855ac8a3bd41993a6776b34bd6ef733d333e37b7c784eec597933eda", 0x5b, 0xfffffffffffffff9}, {&(0x7f0000000500)="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", 0xfc, 0xffffffffffffffe0}], 0x4000, &(0x7f0000000400)='/dev/dsp\x00') fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 479.508072] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 479.516054] loop0: p1 20:56:45 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)=0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000200)={0x6, 0x8, [0x6, 0x10001]}) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 479.575276] FAT-fs (loop3): Unrecognized mount option "appraise_type=imasig" or missing value [ 479.584677] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000050000000000000000000000000000000000"], 0x18) 20:56:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xf6ffffff) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 479.666606] loop0: p1 20:56:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 479.697016] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 479.737110] loop3: p1 20:56:45 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300)=0xfffffffffffffe7d, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f0000000140)=0x15c3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0), 0x106, 0x7}}, 0x20) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) [ 479.767485] loop1: p1 [ 479.770105] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600007fffffff0000000000000000000000000000"], 0x18) 20:56:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x4000000) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:45 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r2}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000200)=0x8) 20:56:45 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000440)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000200)={0x9, 0x10000, 0xff, 0x38840f4ff0d9ccb8}) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000400)=0x80, 0x4) fanotify_mark(r3, 0x0, 0x8000010, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r1, 0x0, 0x20, &(0x7f0000000340)='em1cpusetlo)wlan0proccpuseteth0\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r2, r3, 0x0, 0xb, &(0x7f0000000300)="70726f63972f5e402c5e00", r4}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0x1) 20:56:45 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 479.947507] loop1: p1 [ 479.957594] loop3: p1 [ 479.987313] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 20:56:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000020000000000000000000000000000"], 0x18) [ 479.998081] loop0: p1 20:56:45 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xfffffff6) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 480.037475] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 480.048296] loop3: p1 [ 480.051810] EXT4-fs: 12 callbacks suppressed [ 480.051821] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, 20:56:45 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x4800, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000780)) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f0000000740)={0x1, 0x80}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000680)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000700)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000640)=0x9, r2, 0x0, 0x0, 0x1}}, 0x20) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) clone(0xc000, &(0x7f0000000300)="c0b7233af37e0f71487066136e3377f0ba7e7713158257689d3db3aee3ea5cdac3f027180568faa150b023f2c1b54c7b55b8e5f0c89249e0ab5cf996702b643f72b140be6fdf3e70548ba8de4638cc170e4781f1992d240fc7a36eedc89c47cbbc31f087c6752ba3e14cbd8631bf634a64cec2ab3027eaf2afd87d358168ad70a7063baa981e7b691a3c5db9dfb25a4820f007d9bc01c9c2c7d95f7b6bb296e2f78d13", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000480)="ddfc2aece765e6c7a3d5b76442948690a32da0b8f2e7a9198ef7687404") syz_open_dev$dspn(&(0x7f00000007c0)='/dev/dsp#\x00', 0x3, 0x201) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000800)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x10) 20:56:46 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000008000", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:46 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x22, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000160000000000000000000000000000"], 0x18) [ 480.157243] loop1: p1 [ 480.176187] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 480.216508] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 480.276657] loop3: p1 20:56:46 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x1a, 0x29, 0x6, 0x1b, 0x4, 0xd1, 0x2, 0x10b, 0x1}}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000300)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) openat(r0, &(0x7f0000000240)='./file0\x00', 0x10b000, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000200)={0xaa, 0x5}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB="10000000000000000200000000000000d686e481a5e52c97f5f7bb34fc8eb301a5f191859625c7e521b1a5bddac4aabdeedcb2cd368224fb6e5ad3280fca82a2174ba0c585d0000e5372d61dbb091bf49696dca7f90f0a1d19c15f56819f78a946cfad12cd98b8f921250a5df5e3e9dff5b46ab2eaaaaf2982af78d1e8e1f5b1331dd70975dccacfc03f69fe8ecaa098c9e706bbe9ea44954b387e215b"], 0x10) 20:56:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0xffffffe0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 480.300006] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 480.316514] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) 20:56:46 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000000300", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) 20:56:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000004000000000000000000000000000000000"], 0x18) 20:56:46 executing program 5: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) process_vm_writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)=""/149, 0x95}, {&(0x7f0000000480)=""/210, 0xd2}], 0x2, &(0x7f0000000200)=[{&(0x7f0000000580)=""/234, 0xea}, {&(0x7f0000000680)=""/220, 0xdc}, {&(0x7f00000003c0)=""/128, 0x80}, {&(0x7f0000000780)=""/179, 0xb3}], 0x4, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 480.386046] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 480.407864] loop0: p1 [ 480.411336] loop1: p1 20:56:46 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x0, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(r2, 0x2022, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') ioctl$TIOCCBRK(r2, 0x5428) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000200)) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x35750400) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') [ 480.539279] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) [ 480.566977] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 480.617366] loop_reread_partitions: partition scan of loop0 () failed (rc=-16) 20:56:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000001100000000000000000000000000000000"], 0x18) 20:56:46 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 480.662609] loop1: p1 20:56:46 executing program 5: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x3c, 0x1c0}]) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) capget(&(0x7f0000000280)={0x19980330}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3715981d}) sendto$unix(r0, &(0x7f00000000c0)="e226169ed55ef4cf6719ae36d95733994e140b63509415b4fba4a306212fc96d857202699311ee5949036947658c9228", 0x30, 0x8c0, &(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10}, 0x10) [ 480.716757] loop3: p1 20:56:46 executing program 0: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x101ad, 0x0) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x10080, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000003c0)={0x4}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) capget(&(0x7f0000000280)={0x19980330, r1}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000540)) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x0, 0x2}, 0x10) 20:56:46 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) syz_read_part_table(0x1000000000000003, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) capget(&(0x7f0000000280)={0x19980330, r0}, &(0x7f00000002c0)={0x7, 0x5b, 0x40, 0x0, 0x0, 0x3715981d}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc10c5541, &(0x7f000035dffc)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x200, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000200)={0x401, 0x7}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000a0, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000000)={0x6, 0x4, r0, 0x4, r3, 0xffffffff, 0x7fff, 0x5}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') 20:56:46 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) mount$bpf(0x20000000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2001001, &(0x7f0000000140)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="0000a00080", &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000800), 0x100020, &(0x7f0000000280)={[{@jqfmt_vfsv0='jqfmt=vfsv0'}]}) [ 480.788594] EXT4-fs (sda1): re-mounted. Opts: jqfmt=vfsv0, [ 480.816752] loop3: p1 20:56:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x2710}, 0x1, 0x40000000000004b, 0x400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000120000000000000000000000000000000000"], 0x18) [ 480.846699] loop0: p1 [ 480.851430] loop1: p1 [ 480.854394] loop_reread_partitions: partition scan of loop3 () failed (rc=-16) [ 480.873220] Unknown ioctl 19276 [ 480.889344] WARNING: CPU: 0 PID: 23611 at fs/block_dev.c:1788 __blkdev_put+0x688/0x830 [ 480.894715] kobject: 'loop2' (000000005de1cfdf): kobject_uevent_env [ 480.897413] Kernel panic - not syncing: panic_on_warn set ... [ 480.897413] [ 480.897434] CPU: 0 PID: 23611 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #270 [ 480.897443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.897448] Call Trace: [ 480.897473] dump_stack+0x1c4/0x2b4 [ 480.897501] ? dump_stack_print_info.cold.2+0x52/0x52 [ 480.905339] kobject: 'loop2' (000000005de1cfdf): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 480.911257] panic+0x238/0x4e7 [ 480.911290] ? add_taint.cold.5+0x16/0x16 [ 480.911309] ? __warn.cold.8+0x148/0x1ba [ 480.911325] ? __blkdev_put+0x688/0x830 [ 480.911339] __warn.cold.8+0x163/0x1ba [ 480.911354] ? __blkdev_put+0x688/0x830 [ 480.911373] report_bug+0x254/0x2d0 [ 480.919568] kobject: 'loop5' (000000002c42f3e9): kobject_uevent_env [ 480.928071] do_error_trap+0x1fc/0x4d0 [ 480.928086] ? kasan_check_write+0x14/0x20 [ 480.928101] ? math_error+0x3f0/0x3f0 [ 480.928118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.928135] ? trace_hardirqs_on_caller+0x310/0x310 [ 480.928150] ? lock_downgrade+0x900/0x900 [ 480.928172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.928189] do_invalid_op+0x1b/0x20 [ 480.930892] kobject: 'loop5' (000000002c42f3e9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 480.934379] invalid_op+0x14/0x20 [ 480.934394] RIP: 0010:__blkdev_put+0x688/0x830 [ 480.934410] Code: ff ff ff ba 01 00 00 00 4c 89 e7 e8 92 f9 ff ff e9 79 fd ff ff 48 c7 85 50 ff ff ff 08 00 00 00 e9 7f fb ff ff e8 28 63 9e ff <0f> 0b e9 0e fb ff ff e8 1c 63 9e ff 48 8b bd 48 ff ff ff 48 c7 83 [ 480.934418] RSP: 0018:ffff880186a1fa38 EFLAGS: 00010216 [ 480.934431] RAX: 0000000000040000 RBX: ffff8801d4bb9380 RCX: ffffc90003e6e000 [ 480.934445] RDX: 000000000001407c RSI: ffffffff81e07268 RDI: 0000000000000005 [ 480.940188] kobject: 'loop1' (00000000d5a9ae3e): kobject_uevent_env [ 480.949051] RBP: ffff880186a1fb30 R08: ffff880129c66200 R09: ffffed003a977273 [ 480.949060] R10: ffff880186a1fa28 R11: ffff8801d4bb939f R12: ffff8801d4bb9384 [ 480.949070] R13: 0000000000000001 R14: ffff8801d239b640 R15: ffffffff81e07950 [ 480.949084] ? blkdev_put+0x540/0x540 [ 480.949104] ? __blkdev_put+0x688/0x830 [ 480.949121] ? __blkdev_put+0x688/0x830 [ 480.949141] ? bd_set_size+0x370/0x370 [ 480.949154] ? ima_file_free+0x132/0x650 [ 480.949174] ? blkdev_put+0x540/0x540 [ 480.952469] kobject: 'loop1' (00000000d5a9ae3e): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 480.956487] blkdev_put+0x98/0x540 [ 480.956503] ? blkdev_put+0x540/0x540 [ 480.956517] blkdev_close+0x8b/0xb0 [ 480.956530] __fput+0x385/0xa30 [ 480.956546] ? get_max_files+0x20/0x20 [ 480.956565] ? trace_hardirqs_on+0xbd/0x310 [ 481.156383] ? kasan_check_read+0x11/0x20 [ 481.160542] ? task_work_run+0x1af/0x2a0 [ 481.164609] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 481.170064] ? kasan_check_write+0x14/0x20 [ 481.174310] ? do_raw_spin_lock+0xc1/0x200 [ 481.178573] ____fput+0x15/0x20 [ 481.181867] task_work_run+0x1e8/0x2a0 [ 481.185763] ? task_work_cancel+0x240/0x240 [ 481.190096] ? copy_fd_bitmaps+0x210/0x210 [ 481.194332] ? do_symlinkat+0x191/0x2d0 [ 481.198322] exit_to_usermode_loop+0x318/0x380 [ 481.202914] ? syscall_slow_exit_work+0x520/0x520 [ 481.207765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 481.213323] do_syscall_64+0x6be/0x820 [ 481.217219] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 481.222591] ? syscall_return_slowpath+0x5e0/0x5e0 [ 481.227533] ? trace_hardirqs_on_caller+0x310/0x310 [ 481.232560] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 481.237587] ? recalc_sigpending_tsk+0x180/0x180 [ 481.242349] ? kasan_check_write+0x14/0x20 [ 481.246598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 481.251453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.256645] RIP: 0033:0x411051 [ 481.259844] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 481.278754] RSP: 002b:00007fa675d8ca10 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 481.286471] RAX: 0000000000000000 RBX: 00007fa675d8d6d4 RCX: 0000000000411051 [ 481.293741] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 481.301027] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 481.308338] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000000 [ 481.315605] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000001 [ 481.323919] Kernel Offset: disabled [ 481.327540] Rebooting in 86400 seconds..