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", 0x1000, 0x3}, {&(0x7f0000000080)="f4d70edd141b4b00c5f2e6ea09a1a3e56424e4a95baf8972a9", 0x19, 0x100}, {&(0x7f00000000c0)="aeb3d97f99bd04a55a7991bb81be1e48e8966a6e12ed5611ba7e21cb5b1d872fe8c6fda814cf78966194c3728ec3706a1fb11d5d27d7d07d5ea3209b1db0b533b68d906e7d293c0e7320cbb4d7663f6a6b72c9c40741d2c6e8e613730f4436d64719", 0x62, 0x100000001}, {&(0x7f0000000140)="69fa2a", 0x3, 0x8}, {&(0x7f0000001280)="05cd4e6028e873bcd19cd9a0a9e1dab1b1aae7c648da6f7e4933b2e39f5959dd9c18f92acc61a8ebaa1fb79e47300bf3711ebcaef41118d663cd6df3c555abc712f861964f3b51642ef22228690578d4cd7f1dc0f704f82302177795b1f811066b84e9068550439dc59ad621eb318ad7bd85db1f3e1b67a818de2e5e", 0x7c, 0x6}, {&(0x7f0000001300)="d44047c70d71e11998b1d72088eb2d70ff905f6c7ab5b789fedf85216fd743681c776695423aeae1249db393cb4d06fc65e0264a3ac60b01b161cdf30a89c664f8395fff8112220be7025646b924404aa7258e5da94a3f81b9daecdd2db46de2ccbabd1064d06b533a9e7343531d212742544aae5fe4b08db4433d88f19b0cf2f8b8c8a8438c6e0a9cd9058699dc338f17cdbf3d1ad17437aab85975d011f105ef9e4e6b0b34948ffc6e0cb00f6e370a540cea48a083d870fbf7f8e2fb0df65163fd40ab48e1cae9d03baabcfc65cf3e3a4b323f4b0b8cd50ab76e8f399bf924a43e6bb9dda67404", 0xe8, 0x5}, {&(0x7f0000001400)="7bb20cce951c025820bb0b0ca1918bab379cb7de08a315818d0dc5da0372245d600934a0b236b76a3aa9671e3625f1e0548a191abd585eccb574e1eab369a337c0c10ef47b9fb400e93721200378b63b62c76d6cdf632f9d1adec67d19f4d07bac4f02db03e4e53706b443b2e0b863494ca1e9ca8496f2aced349359869b315ac75b5d763fcf821954eaa50c8531aa2edba6631fa5cbe6149954b1ec52576a326e86bc2a576cb3f78dbbb9362d5e695991323869ddedcf052bc53b26d79e0c1f6425ba5325d24b9e0001c53313f1e23420f0677ffa8dd659208949a069a43c67ba2466663ad6de11a984fd7c27c2cab32f6723beee10e7e42c7feb911f41e482bf6d7eade902105957a3cc531d25905f3a4814b5b93f3bbaf767eb160013b0475a2badd0b46c708375526370a1166a86f3af448604e029d993a3afe0f203a50ea14c8e123dc070d561666cf2f01fee8d3d4511519240398a22d569acf8c0fe915ba1e3d514f7415dfc14fdf92f3f9db950ec97c9e875c5fecfb88c633bcbe5d348dc0056453a4d7babccbab5c85dde99773ec2f3b879b9643ef29d38d8d338a794bbccad5a6cd7e7c6fb22a5f7db1dcf2aa7e6bbac6a8ebede8f11fff0519eb400b7c09613272c51be05b119548b0befeb1fe3cbb7f53e9fd89e75098630120a77743b15dfde3d640d64c7d29105b12f6073ed0fa9c644e8ad8289841503f559cbfd2760d9c0851f8fe5d961613132e9725dbbeab91e96a055c6af7c638c5d9ab346325c553d18acb6ef60cd120d0a01ab576c591996365a53b0fc206d06e5a9c13ee183d1106dffe44a123e198dfdcab3dfb747efe43475485ba6f56a562e693f4913a76e94995a462de10b3d836c352d137feb782979ce6bc1ef016b549cfdc2848d4900a0e000a837d6c3892cab3a5e61f6beafa40603ef8cb76e1e6c959e5a85333d936c7aa39c5f13a1b18f0e9a6e0127ac10890af1c58c783b99c757ca1f2d83ea9f91a295732142f1b8539bea56ea81452c05d41a86525e38b485e5d34a4995239a3a0f92897daafb3a315eeeb0db94e1e0c5f3d7b8bf501a29fc3720b61c9d457b5dbdd2a467b9b6e27f5c878b0467044ea9c5b0e4ca0cb0006e50960e2db1e0bc04bc96a21bf9c36d45c07d8b1ac62cea2c973835008fca724f75c42611bda72ff7a7e0de502d23e237ba1511e4fdd094b9f49a7fd0db327ffd10bd37318da14a003d8c1815afc31bfbb568b153ffcde7aa4f90c13144e21eedcbc661dae33357e8adef21ce329017d6da90ac060b922a297973a35717c9c72e3b4d87ed74347e207968695c7fa78d0cf9d2e36cd7c57dccf79c78060c0b61af206a3b52d63ca452e70606c386a77a3680a8b6b6f66c606590724d00857dbc9d27e3c75641c77f7a807fe741072796921f5c110d3d4d9d549e4d8526b683ce73d8f2a97d89ef4db7adb9d2da6548f546cb62c89dd74aaf091c9c62b566a90881335d3e4c9a7a2b7bfa84b696e3603c0b5d3cb5f2f868d6fba49534172580f37f5038f2c730a50b2790a49cfdd221cf247ed5371320676e74e0546368d44227d89186123844d6911ad9837f59313d63b2e7821bf31c46bfe0a09352c791124f789668aee4b0540aff56058022ff56ef29ef761dce34fdca8e4300a01dee9f97fd809bcf8e8adca297295ebeb6963157c4f9ee2c3e356419b295c2c30f52e9fdbc76381cf714465a16263dc95a11498fcee54e7dbb3d4f651d2152c8f5c4f1fc1734432d43fff60c406539aa24c30ea968d88545be14f06b857d700b9eaf26932b317ae2444ad0ba17f73bad98c86712dd0d47f4d1299a7858a873454a15ff0f4d11ea8f4b8776db529e8fbea4a61ffda46c8948c091c77fff9581d615ce97e522dea8864a1593a2e68e2d13df1260b2526e011387a8106bffff4964ed17fb1d064434f1d5589bc42c4684bb1c1fb7c1845f1d8a7a3c938056cbbd4e8b0932abb448f6afccd4d94b7c7643af4c8afe5810f6228375109a81a1378c0510ec72a564ed1588db7563f4716f2151cd41d1d752129180cc5f1f969732a82e99e8162f67823120b9e07f64563eadd772d36de4b324278c1bc4fbf0a9a7e86f0e3c30375b94462961ef9538120c4221fa85dcc8d6a7e04938d52a2086b30991c1ee8a3de4b55f73baf29211e5eee7cd8a463d328cfe15e7ba0ac79db1b37041b9a3291733474999cb0eceec605eae36cbf2903690f5c7a185b7e8db6cc4ec8f432163bd248733e089871141007e7cc2de3c652a057ff0b5c497b2e841331354ca63e1d38a45187e9c76f6c819b8d123ca350d42e9690cd1c91f08a5e0c9a83a22c62738f5e19d6925f4680e7bdb815431ec463e09f0fee8a834abd4ef12ab5ad4cd7e7ea848e9e9b31a1cc21146d489d731bb96243a2528a943e3d7d5c6d289250f68a968d825c9c5a3f0396f1ab10160d64cc816ea9d243c009f5f05ea9175698522e67a1cd30b3d70cffa46af270b6e642b5926d1b2155d5eb9247b13ac600f991dd94872766fd41577c149e472bf28f3454f36d3e29ea81e0c45a6a7b1f71f7444f9a8c51b0cfb0064dec4ef7dca530332f8fc81c404d71a73eb0eb326a4fbbdeea76ad3220ba07cc32841a66e105352cacc95aacdf2f57af296be718a1b7204d0905c7f6235009552cae07ce1ab1c3176bee0d23ae9a837ef4f718cfe1c39c9455b53d4f8585940fb5a4370874ce141c3cca57f295efbed7467a3fcb29623c9d1681cb27749fe3cd791621d268b6d347fd0eca95c7092c4861bc15aabc1a1d34fc2da582cfb814507101d5a82efa8ddd0ec0885639f06582347042c683d0b928200110c9a6af9154c1cd64899dd0067dd33dc9d9f481cd8f17132d2b438f7e00a90473c5a8e8ac0532b939c647aa1e1706fecd9f343cef3ab0ef4f2130ba83f22add267f39b7e27826283547f24ca8c59f71ed05236d1f6f10e85ad5e8b06843b8d8c43ab25f36d5286f851d42029d786c54f4a1d5be0ca9c4adc4a3830fede8faf81f41d87e5888bd784a63e1561b0365d8f71661d3fc732037e50be9b4e4649a905296c05f776244fad20c3ca0fc9ffd5501b757e0f411b681e2f00cb6d45fee854d85fb3e50c2e74e620bf90d288f4d7e80d683be1b12518c57571f0ee4e070a160428f9e7898d9fd4937e75f7af15382be72af51b89eae8d9c694a4b5d015c5cea6ef89946e669f2285819a2951d08bf110f5439ea4ea3c2e82a36eab7fe6867bc5865363389b03b8075c8c69b3762fca6d6503d16e9828f165268a890a8ad94812a3b8e7bf2d1a29a5f474e2f40839986f8c309c1d87884d15c9e8aaed72d413f1db90a7a1f137bdadb8ccf032de625f3f580884ac91ce9aa5b1e4ba47b1ce38c5baf170588ce62e4e096023442dc5826492c5a5f1cd317f369d5e8aa5aadf23aa7e611ea4a6f6f2fb1a119e813e452bc92e44206b623202d4c4be88fd7069a9732616fad36a5d0f8c40531d3811939221cb552dd8a3ede5713b3294a31950564a4268d0337b0594a6208d22640ce8dd50eed130d6d8fe2bd2afb73f3c0a690c233f843517e32e59601276e6799cbb44f804eb7608d60a9bd51ca463fbbaed3d685af38076364c59540d10a22a4fd330d8361817e9545d5e63c8fe5fb8755187f669e648d97eb6837354ce6759f6935eabb1a9100b06324792e3ff0664f51a4632da8545e83a5dd1e7f2ca5087204f71b33af7689912230a72e5afadfbc3269eb9cde3c9d7d7256afe1f53c52bb69ea82b0988e51b6780d8425ab2a046f1002d75ff10ed28535186ff5b67ebe39dc8af75e150580fb32ca350872196da0fcb89d6ef21b173f25b84d6f5ee960ec3bfb4c6ce06e1971e46a747bd3e31ade79388b0a9b0deb8b0289324869de2cb00a8c2bd6782300336f95653416fd36b0d11124956e6475425851fee9dbe813e125b8482a24fc5517f025d592c80bbe562f093a4abeaf7a47dbc2b5b65ef2d58d2a2fba5a43ba4a58efbc2ca45fb5eaa3466d858d11da1a58928f0dcd9c0ad74f1a039b2ec847033c1577c17170a9f7d1fc43a4e34461777aa29b7c82c0d51d7f0e62a3b767929302568e074559d49370d9b15f7069d30049ccb2a66fe4f62242a8d9303bd9f516200c98b9189a85d4f04feb04be3f04812359126cdb63ca6a87f896fb9a59c2e74b1a1664fe805545eb7b0ba8b0688f2494770da5c1d7854743c6f0ae2df73ce43418c0035bbaf3548ddfb856fb83f5f6d7d4d95b1a8e0835f726af71b764fa1acea2f5f318211438caa2353411f8527d6fa29f57164e0f112b139db408d7652aa87285ae4ad26bcf2a8bbceaa989c232fae8e8f9ead4ab8cc79f5125efad8c39b92622d678df99246a929ed3e0e756e20aa23a2e35868606b9211b6c72902f37aa3b4fba09418fcb8ddfdc47836219b53611bb88e8efe843b3864bc3f39aa4eed8146fed36d90080cc52e4f842ff6ef5f7d7ebded84f8c8990a3d744b101e878461fa2ff3655d08d776b284fce90578cf18833ce05ff10253e362aa62f4f3fb4e447c230accbda19cc2c5bc4a3eeb8468d28288591a388d74ad2863f4836f21056d51e2bf0bca73179bda28d8c5a84ba669ac8b208980daece685268ef89d5ac7ee568fef634826745fa0e0f72b6378f5fe702fbb986df4e0555a9934927795da029e7a7d92fbbb01dd3b0fcb623fea45050bff4fd2443480b15c829db07933417655d64cdddff7a05f01a5bb0ed89173c42687b40470c593ef6ce755c13e78a5190076e4532cd46e7da45b0cad71571900c3a3995f15570e13628066c8fc731b56bf74e40f49e3e62ccc086729314fcbaaada163c29ae9dbafc0d3f4c0d39b7d5b3f4903e9e3a2fdffe2964668b2c310ad52d608b312d2f978af64718159393a27949b54eaff6f22181db1dea80c6aa577fc4550171e959183ed0133c3681caad1b2f6def764709a10c2206a92b373bed098b8e00f6eee9ea52fdde677160a4b6ff43d15c9e6d0dfea96d1097f40b090581523462c09f0a6fecf5986935ad7299664c017c0edccab910fe59fbd84c1dc4bdcfa97f5e670f770e81dee3f30832bd10541baff088c127b37cb3adc10e7b18e0c077e2c603e6a0b571c1b0bb0847ba323570ac547fd6fb743ad06dae81472cf0f71dbc5443e85a759e5e983001bde425aa751bf1b07ffc9e20c1803eb2c21aae55d212fc8155cdb3e2b0240eccce22ed8142f5d55e192059cffe1692ff446a1fd22a26b494f350fb6a9c0485b2c67c5a8f26a21b0cab0f73d289b921dad9a55e02329526f3aa886d55cea89f6faeceb76d0b2e1202b5abfd3713029b2c899288f9f7bd6c0fe7ad8840d30881938d4b8ff8c1d3e17456451292cc7ebf0e622cfabd49d06cc3ab34294f8c6fd7a8ef50d7c20f003cda5b36cbb19987218c3a9ac1ebeda504d6279d4f504680fdf892f2d2d9c056169fd0bd299c1e3978ad6ecd85d26ca3bdaf47297a2c6c4d837d7d6081dfb6ac753d59e0aeb4e487e83a582ebd2def078ba2852ca50773f7d6fc31710498c04d680451cc1b72447296d4520ea41aa7a95f39cb95c4c7fbd91372ca27780313a002669755e81fa3adbd1609008b68c18a022e8d1feecf1c020e2d40d4718e176ce3fb8ccda6ac25731a0742c2a6841528078bede1277a4f09705380359c9c43272365567758f3c861bd9c2a4998dda934dcbfcda1b93c73204c43023d87292895f79bdfd5d6fcb75e34b29e5278f0840301010be14b69aad21242a0eb76a00be9c75ee52d1f373a0d2", 0x1000, 0x6}], 0x2000020, &(0x7f00000024c0)={[{@stripe={'stripe', 0x3d, 0x3}}, {@data_journal}, {@data_ordered}], [{@obj_user={'obj_user', 0x3d, '&$#!.[$&#!'}}, {@euid_gt={'euid>', 0xee01}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@dont_measure}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x62, 0x34, 0x30, 0x66, 0x61, 0x37, 0x55], 0x2d, [0x33, 0x30, 0x64, 0xfed54ae9050dcffb], 0x2d, [0x62, 0x64, 0x61, 0x34], 0x2d, [0x64, 0x63, 0x0, 0x39], 0x2d, [0x35, 0x34, 0x66, 0x39, 0xd02696e055e21c6, 0x65, 0x33, 0x31]}}}]}) 13:16:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000000e00)=""/156, 0x9c}, {&(0x7f0000000ec0)=""/212, 0xd4}, {&(0x7f0000000fc0)=""/9, 0x9}, {&(0x7f0000001000)}, {&(0x7f0000001040)=""/210, 0xd2}, {&(0x7f0000001140)=""/98, 0x62}, {&(0x7f00000011c0)=""/79, 0x4f}], 0x7, 0x2d4b753, 0x9e3) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1000, &(0x7f0000000040)="89275f5270fff3136638de79aac2a8ba444cef4c7a9574c9e9892986954e", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="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") r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:15 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x48, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x1615f000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r2 = dup3(r1, r1, 0x80000) mount_setattr(r0, &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={0x100071, 0x10008e, 0x0, {r2}}, 0x20) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 0: io_setup(0xffff, &(0x7f0000000240)) io_pgetevents(0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) clone(0x10000, &(0x7f0000000080)="c2add7816655c7078d24633648ceaded7399e0a6c3935fed3c", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="c5ef39e2ca81bf60ea44dedcf0f5f6606477ff487b5eeb83015c63e415eeaa56850a3c3fa768281df4085529e27216f62d845f5e00f1e464bfa757bc32424798bef14be880a4fe1d2b0a17b285911887afef563c288fb58df6a74a0fb590a93ec01916e2d22e83666c38452c03b1bf0a53986ab04ae7fd643efa4f5b0377405094ba252692a2b5eeb0ace3a89d5064400e99de686350a1d128c4f91b5a12aa4c235256d98846e3d8208741b612ce71f1a3589d28cd4587c5e232fb96d7e5b36c2ba01a148ec8c2a2b5542c55d56f2ad537488eb8beaaaa5db6439a425b52d62711a15a28b8ebe26555e3605f25b45b0080e84e66") ioctl$TCSETSF(r1, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) gettid() fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2, 0xffffffffffffffff}) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 752.614925][T13108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000000e00)=""/156, 0x9c}, {&(0x7f0000000ec0)=""/212, 0xd4}, {&(0x7f0000000fc0)=""/9, 0x9}, {&(0x7f0000001000)}, {&(0x7f0000001040)=""/210, 0xd2}, {&(0x7f0000001140)=""/98, 0x62}, {&(0x7f00000011c0)=""/79, 0x4f}], 0x7, 0x2d4b753, 0x9e3) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4, 0x12, r1, 0x0) futex(&(0x7f0000000180), 0x7, 0x0, 0x0, 0x0, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) wait4(r2, 0x0, 0x2, &(0x7f0000000200)) 13:16:15 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x4c, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r2, 0x0) mmap(&(0x7f000043a000/0x3000)=nil, 0x3000, 0x9, 0x13, r2, 0xde026000) [ 752.676586][T13108] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) gettid() 13:16:15 executing program 0: r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x20, 0x0, 0x9, 0x800000000000000}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$peeksig(0x4209, r0, &(0x7f00000001c0)={0x34a1e5d0, 0x1}, &(0x7f0000000280)) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe2(&(0x7f0000013780)={0xffffffffffffffff}, 0x0) setrlimit(0x0, &(0x7f0000000040)={0x100000000, 0x400000000000007}) r4 = getpid() sched_setaffinity(r4, 0x8, &(0x7f0000000500)=0x9) setxattr$incfs_size(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000180)=0x192f1a6800, 0x8, 0x0) sched_setattr(r4, &(0x7f0000000000)={0x38, 0x5, 0x44, 0x5, 0x9, 0xffffffffffffff86, 0x400, 0x8, 0x40, 0x2}, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x0, r0}) clone3(&(0x7f0000000800)={0x274000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) 13:16:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 752.764115][T13142] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 752.921055][T13142] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:15 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_pts(r0, 0x200c00) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000000c0)={0x0, 0x8, 0x7f}) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:tty_device_t:s0\x00', 0x22, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000004700), 0x40, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800007, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000045c0)=0x3) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000003440)={0x0, 0x80, [0x100000000, 0x1, 0x3f, 0x7, 0x1, 0x8001]}) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x1209, 0x10000}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xa, 0x11, r4, 0xeb624000) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) sendmsg$sock(r0, &(0x7f0000004580)={&(0x7f0000000080)=@tipc=@name={0x1e, 0x2, 0x3, {{0x1, 0x2}}}, 0x80, &(0x7f0000004480)=[{&(0x7f0000000200)="8de7726015c07f9fde14317ef2313c93c37f55067ae5131ce4a0756f2e47b1407cd8e44947a8b49617c9c746e574141c24c323d5286d80d6e1ed60c4531c7869d45bea1ae5b8", 0x46}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000004740)="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", 0x174}, {&(0x7f0000001380)="b3a3427520875b16b636257e3b74720bd7c0d384e963949e3ee708281a2e3d34557535c7550b8d4759bc4da192c0fa5a87421836a2fbc1b33a0d7308c5884fb2002ca0eaae8f29d5c2a751e4f728d484ec404540f28f159514d717604441bfeb7dcc9e", 0x63}, {&(0x7f0000001280)="9ad632b199952ae09758e4d64ed10284a654579b486a95c5ba1bf54217a63195500059456d60dadecf522fe90ae25e74fb9ebfd5f0421a7ad22d16d8d474db1dcc945d7a6cdf14227c2b229bd351e59aa185fe8687660a0fef97ff16ae379ea6a7aef657af0510ec7f732133a435b7f4313dc52c988c6f261e58ce7ea514b6cf9c8976d2c6b9cfccf5b081770c2ea5292beb74c2822c554c6db20548fc7ac5b9bbf05139", 0xa4}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000004600)="81b6b4d000000000003a9de8091a91aca1b007f9576e46699a9bd2a6393ae336fc09888c637d331aa1cf8c13dfd66938eb7f266c3381e2780210bfa68e5c7283adf51e9cc7f0d66ae4856ade1e77682c2004b6f13595b143125d79719d7efa69ee0d1de618111fee9459bda282eed1c0354efc6283853024af0c12d98435d8c300089382a85d92156b5d93eda5a7cd03e5c5129a0241538af47f678abb215d9d646ab85ecf", 0xa5}, {&(0x7f0000003480)="700d7a54370688461faef095b1d64e5e4caea55689088241e65a3ad64d05d25f635e4d6fc29e17005b7c2051acfa099f195909f42a8ec0926933229b8975e4dea6c00361f58518dee45ee34ae27794fbe7471d20080e41eaa01c1e7865d0d706aab6226e851a60ea197b06cdf3f8d4f427e86e06af696688b12a294eb80fac4cda39dcb230044d1c9f928dc0a56977a1ed55c07af60e5a645c8fa5de9465a1d8d1beb58ece713e5dd08c2029088cee1ec195b40f8e1976ab4dae8ad3402c2a67712eadffc8b661a97202e8bee52b79a387d19a6f5a6aa4cf88553f7d3164dab037bdfbf10456489e759dddf78099ab0858344297fcdbbcb3cdd66da33334d97c3b6b0731d9157b20686587d30d325ce9dfb0f9b5389944cbaa2660ea47b402c1b02cf0b84cdf46f8e3fc1caaebe49ad6687fef72d5130fee84f1348e016c9b8050da4b6777c9bbd9af6fb750176705da9444c4f599851f164d5c4d118ae8cf6219cc713d726214da21d38af6382328070f6c3dc66708b810d1af956dc9334cc35c74138b6c36ccd3491fd612b43f0232cb23fac4626df4ee55ef2606ca30292e3d03cfb37a95fc62743420d9816708ca736a73086a4990e99787089a89b887adf53f9049729d06fdb93c57234f9e82eb743c82dd1d31967347888bd63d756555678d0339a8210bfc5e4bd3d5cb8a2257ba49a92c18ec8d38f7db714b3f8f2d9248c195caf9a42a3979c9e8e13fb22ea94326c259e1f0ad9b2f1378407a2d01c8370dbea70099ee5546843f94dd87b4c1f138c0b9bf3462de23dbf78cef8702110da8029a6ddb472cace1c053566ea1daa632e4cc341993b26c6624879691e375e80f99fcfc21cc3fc43ef2fee7d9461c11bf23fa46f5a3fb355caad7fb0a838b655cdcff647e09138cf1014167d3d3661c66693d192cc835076cba6087991da9f3cf85ef4a7a4bd94d3839097d5f2b11765b24d7c2bc7f9c7f93ad86a9596eb38196d9f822cb33a9659e54fc935eacae96634540b2d925b728e38a1033fbea5c2451eeb2e16b4d3506d5483040b51753aa2708fa470286678c042a673b6d62f4156fd7779d57495dc517057ad72eadee28fcd124e4704f78e8049c290e6a1a9fd8f1258b0f4299209d18d25e6bf4d0889ad27d1811a46977aa850270f9b738ec7fed29c51008d2d87b00d378259b8f5b46503fff76298f15031984f3872feadc45ae63bde2af3afc17f43a31baf27ac326e1c5d19541ed7665252839b3e99af74801776fda8ced87f8520695bc95e0eb0a55ceb113746d8d04c07f02ad0353244068cde007d50678a5bebcd1c78d74b2edb7c51f75699099369a49c4f14dc145dee7999639d797a1700a89e5aad2617d1fbe5d4001dadb0559fa0b1d30df210923aaeeb2767ead6fd6fff53f4f362eb6801e16501fd65aa2252ddb13616ae3555779db838f4465fa9badddaccf4437d55f887841c12e41e1e4ceb18e325edba32db84543c1ea6d09b44028ebc790558fdb5ace43bca5b6e1a829ee10d3d04937169d0b263a1da0c8c27e5acdfa1b0ff235281942b19d40c9b4ec4c1207522ed71ddb1a39a3a06309deecfbc4a5b5d92e03080744ad904a69109035b55fbbbbb2d1e488c56b839634faa5ba06c068aa8c3009bb37a33d6a1063efdef61cbfa7ee940df03c8d5ba11a6fc514d6704fddf956243501fa9a8773dfca465363ab035dc286b3c14141a955d72899309d386ad20401e2df8bddd2ccfd1ae285f02e5dc7d9fbbec2bf0aee68f75a3b72f003453e6f8ce808df3fb4b5dc915f7dd96cdf2185050e60ca6bafa7db5f3659728d7b59b07b519d3f0fe1e48e493387053df7b86c39819a0cf5d7a67f38ca44ecdf0d710673f9f81de7a296ec3e505ce7b2ed7ae0ca0db0af09dbbdb6f1592fc5eb24f45f1e985328c0842ccdede6963b5d1025610ca0b799fbfa06e1ba662340b54156d3eefffea9f3194b0e7b150a2fc055b21f2893168747b0e881e3eea0a92f4356854ffd9a69d4fa41b9fd16b3bef8542a7959cecb3f7616e51136670492ac1aee3ed30c66661d70a434f4b89b065a2c23a8b9e117b034979f6819fb0046dd6e293e875848022fb70f7b00614c1a3830b3d47c70bd6b7865ca1f04b09e1bd11a681ca8add2362c97f329765ce975442786a63c6cefdee5b75a749862260a4d1fcdd84a2483c95b04e542242327a634d2594149128b74d6b051ef172fde5967bb1777c9798375e8fa31a08a56fa240ee8301cf4256f77cb567995e27e9f9215686d99f61b2c8609ac00ea9104ba99a9417b6e3aa228988eba20d9ab9ab6da723270aed94e61e5dadddfd4924899821c586e0f1932c1e917fccd8b3666dc9b854f310dee6c4fbc3e28591270f3c271f3675af3907537b7099dbdc014cb11cfcdeb8a52929b80698040cad25e496e56c08337ca590daf07c9274e902fb85e51e0882f2caffe8ea7fb9ea72f9dcf5bbc0290400ec74cc3cb9963b2b5350622b4c5c460bc90b414fad689c8bafdfbcc5ec2bfae760ce53a2dd74606b83d4dcc38533e7daadb3d668965589724baecc6d20eaae1548b0c65c573b1dc0ddb55c15f1107d65a23299d6947a3ae6cd19c1f0cb72e9512368c398d6450f18bdbfd47fe6a4c57bd04fd04ae2c80320af45f570c7236ed73a756e69835b1885f20eb77471502f1f7bfd8e137797348690d329ff4d22b9fa930745b57bd815c189ed63578908e5ee208114fa88bade90cdc924e8f88ff2ffb1a9e1b5997fbde4a6b9fb9ad95e8c6798ce49ef83c366aaba6aa066ee0f34c97f34a357c6386218439828a2498165725ca57b6a2201535c9a53ae81ea793a857bfc686d558e4208a1d3d788a0058158f0b62b598c6db1cafcbe9c41b09ef3db98b5cf38a11bc9bfe21018d7978b1fe8282734b589d7c7bfb71d954276477e6378cf3ee9b2105c0b020bb33a34137e968add30e947c822cdc6f286ff98fc4dc53cbe09516ce11c2b31c70b8f127204b3dbf08c26524587968e8c4738c25f0f39429f3dbea6686f4cb6d1b6aa52b400f38972b20419c1bf3ac834892ab1a6e433b094b4db8e8cb626099eb8c07afe9a26923b3ea4351ee21e76f99fb4460c1aa530877881aff0542cb8a7b2563f7f59826164725240698e6704f263962ef1156011bb47d2cb25c1015455c8578a150a126e5542f1059435ab4cdd204a67c072570578b41ce9feda16b3082d56d6ed8a097c40f82c4feb1f7917edfae6cf25a4ca604431abf36839b307addb992069341d0550cc574cbdb8ef94890584dfcb07b578f327a157fec0cabb4cf2b34b093a396351b9bea3ac8345d807b7835338146b1b5719fa8f82f3762e292dd35bdf0816c07dfdb6ba096ccc0aee9ce7ab0d5965823fa359aac2b10b7b6b5fdc6caa39bcfd1907d4142fdabafb834ed794f0d949a44fdf093f37929cf0245a7a3b3f0c96765a6b4945c963833fdb9f8443544fbd9f55c404e94437afde5b6986590b87eae500d26b49b3210372be287989ae568407cfcdf5bd58ef7065bc66e4e65e00816d9fdecf79ffbc61d48e55057a440fad29b41abed91b65cf98b034b9534dae92e82a734cc7b88f97dfe7f115d6d9ed4bb36df691ac0ddfc6230388d4454b9d3d88aa23b56f6a12e42db814b9985532a341a8b8929fbed60c77bd2b5f06453d645af46d59a2bb4b6b2e59ceed2c758eb635cbbf1f4cf5a53529bf806788d491052146b09668314de034ca7aee724fba90cc9fb6aec273b95eec23b62462caf5818cb6f52d317282682910adc613eb1da27c2c02c9e4602aecb6bebd72fb13975426e53926c16205599f8723e37678f449447fabd82a61f4954a3b5aa20648082bbe1b8c265a60eac62c25843bd55844ca7a22cf78d3b8ffe7e529687b3d8a91e006b9d3e7c76c93b7b4eed7288bca91c116127b5d4c2015c6009d5ec004147a91d858684fddbb29ecb938647ac56df2ef2a50ac233d2be5484f923e2095306c4eb035b046fb2a64d4b89699b7c55abbaef8d07ceeeb306b7749e61f9ecea277a10894a9be26d55a12e9a807831f78ac42dd1f0157488cc20e735ba0a5caa68f0af72df80efa5c6ebd2324965f8d3daef15962e2a40ea1f4559e0053ab57a66cbff198e6f36c8b635dd7e1a895ff7a806e84b4584d1c024d3da52bc3f8df5e14710425eab66677b602e46e3200bb0f7ea2ab30efb8a9b4d82382bd5a7fc27e8fb4b7423665d1972dff83e71305bf5fad8a5b516526f91b7c56317bf1f0e61f1531e38206d398be63eb6b2400fd6c06d4462fe5b3031f6a0983ec0f6912579861082b815bb116bfb355a19021921443d209f7ac5d4194155b084822bebd864d48e7fffccbf5d66e2f6806681bb7defbc4641e8e3b7dafeaaada912f7b8015d5dc194ec79fe6eea7a23ff59efb89e2de4f9165135372d99c94f2c31e615ad0ce1b846d505bd91fd824a1e66461877fa7f23268fdcf940cca2291c0ac08ebab2a7b37ab7d18520e1196121da2b9fc008a59be68ba2b86a23287eb1b0330beeb3cdedb52f20e0af8676d6b877408e07e5e045a4cb33527ac0bacefb274d5cae54c14aff96bd747f9f7a51cfdfdabdccf7d1f5c546df0f8e99ae60a134a1b85c0a4e12a41408ea6997b839566ef4205ebf3b1815df64beb43c3ab2aaa18a6fc11036afb3b591c846524b3990b0ff2ef8b4bd1b587c76986130b550d80fc3227da2c7f801573d2b7b27eeb872dcc5e9415cb17c30abf659fbec64614917ed3494270dbdb1de26602da33925fc97858074aa7a6f23bba14ec16f47da2dd545f0f9e5d7027f9cd63313e03794e3b279926c8d3ad35e5197398f4f5206434249506c7dbf6a2782934babe71aedb286a63de3666d96408286c03927988d0082d41889e783b52431278525c0c45719312865037977fbbfa64495687ca65d0b73819d396fd690b7834b23f841ac8c01458d462f8944d6e02dc0fd5e9fe5d431d4198f3732c3d10e53b615d844cf8cdfbcbd00b00411365ee999daaa8e6a928b13ae811640074c5b748aca262f9c69f98dc29520b8fb6162c1b11c6394d584656658fc56e1b0088f7be3d4b1d410ae8e4a401f18777b6cae18a9adbc33ed52d032fcd44a32afd0b4511930e4e12b1a138927c4f4016b6fbc0c0f5856ce3c78e6f328abf9fbbafc283977b3babda4a1f32fef67353605767d4471ef756890bb170e9e51f7401bbad22a11f59f7245d26dc4fec64029c300520a396e4a5594c400aa3ea79b41280182ba81f4abb44a98e6f03b72466de199075a68541eee10f088ff47d671e431bed0c563d592eac6c4c3528cf998b893fc1f937c8cf09a6ac997c1d348f8d63cbe8eb2b3e1de780006af5d73da98ddcdaa5cb10c203800c2803c13c7acb47df2c7667ec948602064230acca1b567f685ac178fc6058be1fe979146e970eae102faf71f3631bbdee6a4643f2324f428d6764f6f8b716d6034b1e230039c29668a2081b6021345746d44c0c4535a94864bc5af1910cd6d1f93d5bb9df9e8d42bb11e254dd456aaa107cd29e6212160b71612799ed1d9e4700d7db0b7526c0afc2f06cdbb70ec1763210398dcf8dfaea9bc4c65c9840ce103d38eea5bf992ed4de675df786a6712847b905c852ab35115b14bbd24084364f28e786d2be035571d706036dd8d7c355683f3a30192b363acb8901068fef225e5f10a070da3f8765722bb7fb3df28730a881d4f3dfeb7ae656c7c401572ed09760501898375fcc11b92f2db833631e1fd57dcb16578ca252b78b2", 0x1000}], 0x9, &(0x7f0000004540)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1000000}}], 0x30}, 0x20004090) 13:16:15 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x60, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 753.031944][ T25] audit: type=1400 audit(1620998175.571:419): avc: denied { relabelto } for pid=13186 comm="syz-executor.3" name=6D656D66643AA19F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A dev="tmpfs" ino=3502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 13:16:15 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) clone(0x400, &(0x7f0000000040)="b0445eeccd85a5c7fafb1fe8e3e51d3432440bbd097a20ad303194be8776faf98c2f201315909c0765f91dea7d4eec2f389a513add106e06b7d660af249742227ee131110d5271e56302883429dfcf13a51609b4a886de9581ec7a28743027ba048dd6bf5ae18c07cef977799b7567bba7258c9b3782380f2b772243786c8c854825ee2581b41ee31bc8638aaea15aea05860c1d6790145b72a006d57a905d2f49fa0597e975b97a5f39260fcbf680d3290f428797c8539e214abad67e68e94627cd66eda2c63c2eba7d", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="c6755181f90c7bb34d05b88fa9eedb28ba9fe9acef68349d443cd06e9f225510d68a90cd91644d1c06801ebd377d851b5f6d634dd52470ced4bfc3edda953aa0675f1d0a16a39f58b24338da2a804d13030cf2") 13:16:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:15 executing program 3: prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) clone(0x2000000012108200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9\"q\x1b0)\xccm\xacz\xa3\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x18\x16\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9\xa1\x7f\xcaD\x14\xcf\x88\xff\xac\xdd;\x83j\xd7\xb3F!L^\rz\xeb0\xc2\x9aC\xb2\xca\xa7s\x8e`.\x90}`\x9b\xbfT|\xa3\xab!\xe3\xf6\x9c\'\xdf\xa7\x95_o\x13\x993&\xdb\"\xe2F6#9_\x87\x12]\xdc\x81bq8\xa5\x978mP\xd6\xad<\xf8\x82\xfd!:Q\x843|V\xec\xb1\x10\x82\x80\xb0\xabY0 {\xb2d\xac96v\x80\a\x8f(\xba \xef)\xfe<|\xb1@m\xf6\xd4R\xc3\xbb\xedi\xe4\x9c\x85\xa8\x82(\x06?ws>,\x93Q\x99\xff\xb8K\'C4Y[\x1fW\x8b\x04>RyP(\xa2x\xbdc\xa4\x04\xa9\xe9*Qe\x85\xa6j,N^\xc2$4\x939[,\xf25\xd8\xb9\xf1\xba\xb4\xbf\x12\xb7x\xb9\xb2\xab\xec\xef\x90t\xb9n\xfcH\xddr\xad\xb2\x89', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 753.172290][T13208] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 753.291671][ T25] audit: type=1400 audit(1620998175.571:420): avc: denied { execute } for pid=13186 comm="syz-executor.3" dev="tmpfs" ino=3502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 753.342175][ T25] audit: type=1400 audit(1620998175.571:421): avc: denied { read open } for pid=13186 comm="syz-executor.3" path=2F6D656D66643AA19F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=3502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 753.388132][ T25] audit: type=1400 audit(1620998175.571:422): avc: denied { execute_no_trans } for pid=13186 comm="syz-executor.3" path=2F6D656D66643AA19F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=3502 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tty_device_t:s0 tclass=file permissive=1 [ 753.432585][T13207] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:16 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_pts(r0, 0x200c00) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000000c0)={0x0, 0x8, 0x7f}) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000040), &(0x7f0000000080)='system_u:object_r:tty_device_t:s0\x00', 0x22, 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:16 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:16 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa2270eb95e915022, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0xd9f, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r6 = syz_open_pts(r5, 0x0) ioctl$TCSETSF(r6, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r3, &(0x7f0000001200)={r4, r6, 0x27e}) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) gettid() execveat(r7, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:16 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x01\x00M\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8!\x00\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\x04\xf1\x99\xc2yY+\xd9y\x8a\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb6s\x00\x0e\xbcfvi\x85\xfc.|ph\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xcc\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9\x00\x9f\x0f\xa5\xf2\xb9\xa8U\x82\xd6?\xd5\r\x8c`\x1b\xac\xf92\'\x00'/240, 0x0) gettid() execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x1000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x68, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:16 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@sco={0x1f, @fixed}, &(0x7f0000000280)=0x80, 0x800) recvmmsg(r0, &(0x7f0000001d40)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000340)=""/18, 0x12}, {&(0x7f0000000380)=""/246, 0xf6}, {&(0x7f0000000480)=""/148, 0x94}, {&(0x7f0000000540)=""/73, 0x49}, {&(0x7f00000005c0)=""/23, 0x17}], 0x5}, 0x9}, {{0x0, 0x0, &(0x7f0000001c00)=[{&(0x7f0000000680)=""/73, 0x49}, {&(0x7f0000000700)=""/125, 0x7d}, {&(0x7f0000000780)=""/204, 0xcc}, {&(0x7f0000000880)=""/202, 0xca}, {&(0x7f0000000980)=""/136, 0x88}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)=""/244, 0xf4}, {&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/114, 0x72}], 0x9, &(0x7f0000001cc0)=""/82, 0x52}, 0x7fff}], 0x2, 0x40002101, &(0x7f0000001dc0)) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:16 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = fork() process_vm_writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:16 executing program 0: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) write$P9_RLERROR(r0, &(0x7f0000000000)={0x9, 0x7, 0x1}, 0x9) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() write$P9_RLERRORu(r0, &(0x7f0000000040)={0xd, 0x7, 0x2, {{}, 0x6}}, 0xd) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x2, 0x2, 0x8, 0x0, 0x3b, 0xfffffffffffffffc}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x0, 0x1) r3 = fork() rt_tgsigqueueinfo(r3, r3, 0x13, &(0x7f0000001580)={0x0, 0x0, 0xfffffffb}) ptrace(0x10, r3) [ 753.785449][T13249] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x40030000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6c, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:16 executing program 3: open(&(0x7f0000000000)='./file1\x00', 0x2, 0xa4) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = gettid() tkill(r1, 0x7) tkill(r1, 0x38) ptrace$setopts(0x4200, r0, 0x7fffffff, 0x100008) memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x800) 13:16:16 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = fork() process_vm_writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@ceph_nfs_confh={0x10, 0x2, {0x6, 0xd42}}, 0x140000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet(0x2, 0x7, 0x800006) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 13:16:17 executing program 2: mmap$usbmon(&(0x7f000000c000/0x3000)=nil, 0x3000, 0x8, 0x12, 0xffffffffffffffff, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl$FITHAW(r0, 0xc0045878) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x74, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mkdir(&(0x7f0000000040)='./file0\x00', 0x105) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 5: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = fork() process_vm_writev(r0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x7a, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="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", 0x10f, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) open$dir(&(0x7f0000000080)='./file0\x00', 0x2102, 0xa0) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)=@v2={0x2000000, [{0xfffffff7, 0x3ff}, {0x10001, 0x8}]}, 0x14, 0x0) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f00000003c0)="bd1f8ec4b7c05ae3d664f4b5a9279e698ef49997076b47d6ec51208bdab069507322b4562f7c28922466557e9a71092d934acaa6b55a5711d4a2b4469d74d03ed14aa06778ba6c684026786beb793552199fa8eae9ba04a32bb76acebaf84f3319846a95676621de75d03aee521e3a8dc83b5b1aba22144ea9fe384ce4447bec20aef0819c5ebc6048c3b167f4f812ad8023fcdaaa1032705e5dd0151c9e1062ba8317ed1c9e4382df8a70bfce4de223f9b408042ec3d09fefec6cf723aa1e11c18ae17274b0b2cc33b909dd280c2b7f5cb196080566152a8e56b2d8840407aa0e", &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="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") clone(0x40000080, &(0x7f00000016c0)="5cbbb22e96d671a5a5598089edb058eaf7d91185cdcb41948dfea7410ba1061c28cc15012ef524494baebb66907509145073a4bde4ac1e502bb811c54681c1786329104a1ab222a4d53301a131", &(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)="4b562cb97e0c8891006b77c7e8142baa09486234d05d5481b973f3ed6a8ec2722e42c70111759a36d33bf0e409d91c1b75f1e16902acd28da8ba25a4f10f19f8b6a21d6d52b786c327295dd5e99a83b55b196494c843ecbe8273d83abc3ff6756c23e122ba4654e327e02286645829ef4f2a33874745d07fbaef87b53ec579a7cbc7a0c1eb3450c7db13984472") clone(0x4000, &(0x7f0000000140)="9d2d369439509b42545f87f9f8f72a8009ca826f923305aedeceac1e24b1ad4f9bcfa4d557020ba4a3265eca769173252e04cc1c9356ffa2717f1d87f6199fabcb60a2bd30aab1549526f16e8e2e5bf1e229c5e7d0de76f7fa88af20f12fea5ac311490c9ace4e151e27065a7a351f90e31935ae0b69a3d5575940b055ee4384e7cf64dce2bb3bc5f567e1830eb0f777829327098cf9bb766c4e95552d4a2f82a641de7cb6b806845150cdfe1fcfe819eebded52c45cc7a90593aae4260867dccbcc252faadd11d9bd306842be022ee7dc55a7203fe9b7b3a098781fb7118db869696c9ac3783dce2a050b", &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="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") r0 = memfd_create(&(0x7f0000000040)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtT\x87\xc9\x8e9\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\x01m\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) clone(0x200, &(0x7f0000001540)="e14e60adaf2f1679571b3fc1bfa08c827a0929582afb2bf49f2aacf169d1c8f295b190bcff79b3ff46963d5b489ccd016bcb017d0a1bdfa148e64fce3584ac6e570c31bff4c66e13c5d126dc2a5098f78d04afba525b7ca4", &(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)="ed1af58929df9397b83d0ce63bbb60faaab4d87906db8cea71923fc9c722a546f2ea43fd3804e40defa5df50d65bb26b865f1ccc331087efc0a268dad819fd339b191254b321cff2a2a313280261") fcntl$addseals(r2, 0x409, 0xc) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00006c5000/0x4000)=nil, 0x4000, 0x280000d, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x5) read(r0, &(0x7f0000000040)=""/6, 0x6) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x300, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x402, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x20) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) quotactl(0x7, &(0x7f0000000040)='./file0\x00', 0xee01, &(0x7f0000000200)="f752729ecae62052f7de79309edf226cd18fe3012c29deff9fec58d3770756fad88f1e69766e36b811599a1f31e026a4b3011287c2f8fcbe4e4ce6ccaf8521b5b1f31061f871ff44f3c61d4f07987cf7522aac757648cc9578fdb114f9100f51421de0bb3c08394cb6d7b68df9f92e6c8d8dd9e13b0de8cdcb2fdfa1557e2911fe3bf857ef18b1e07d1309bb0556ed3673162cc760c2cbeaf32e2eaed8e8d99d3a5d713b942ffb67") preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000340)='\xa1\x9fn\xb4d\xbf\x1f\'~\xc6\x80\xea\xa6\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xce\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd1b\xe8\"\xc0\x1e\x01\x00\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x8d\xfc\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x06\x00\x00\x00\x00\x00\x00\x00\xa8w\xbe\xd0\xd0-tB\x05\x00+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\a\x14\x00\x00\x00\x00\x00\x00\xe2\x04|\xe1>\\\x8c\xe5\xfb\xded\x05\xe4\x8a\'\xacq,\xa3F\x1ergN\xd3\xe304\x96\xd1\xe2\x89d\\q\xcc\x9a+\xe2=\x9f\x0e\x18\xb6v\xa8\x00p-\xa5q\x15r\xf7oG\xfd\x14\xa7\x8cu\xabh\x88P\xd6!\x0f\xcejh\xb7\xa75\x90\xb0\xacmx\x04<\x10\x8a\fR\xa9\x018\x14E6\xa1\xbaq\xbb~\xd4\x96u\xa5eh\xe2\xae\x15?T\x1f\xac\x9fyQ\xf04\xd7\xc7\x94X\xc2[\x90\x11\xe3\xec\x01\xdd\x89-\xe2\xc32\x98\x1e8\xf5\x17\xf2\v\x87\xef\a_](\x1e\xe4=I\xb7\xe1\x8a\xa6\xa2\xe2\xf8\x16\x9e\xc4\xa7\x9f\xaa\xfb\'\xb4\n\x13[\xb3x\x17;\xa2\xb2DR8\x15~\x84\xb6\xa9\x97Cb\x1d\x9dV!\xc1\xcf\x11\xe1n\x1a\xdfn\r\xfe.\x83b\x01\xa1\xdfe+\xe0\xac\xe3)CU\xe6\x1aH\x06&\x9aA\x7f\x168Dk\xfcRI/KT\xe1\x81\x19\x1d\b^\xad\xf1$\xd5B>\xd1\xe7`\x01\xc6\x00\x00\x00', 0x3) r1 = gettid() tkill(r1, 0x7) ptrace$setopts(0x4206, r1, 0x80000001, 0x4) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000540)={{0x0, 0x3, 0x4, 0x1000, 0x8, 0x2, 0x3, 0x3, 0x7, 0x9, 0x8, 0x0, 0x1, 0x10001, 0x5d80}}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000001540)={{r2, 0x1, 0x1, 0x1000, 0x7, 0x4, 0x9a3, 0x7, 0x0, 0x3, 0x200, 0xffffffff, 0x757, 0x2, 0x6}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x500, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000300)=""/131, 0x83}], 0x1, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = accept(r0, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x4) r2 = memfd_create(&(0x7f00000004c0)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9\x03\x00\x9f\xach\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xec\x81A\xc3\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\xff\xff\x00\x00\x00\x00\x00\x00z\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0#7\xbe\x13\xbb\x91\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9\xdcn\x9e\xca\xcc\xbd\x1a\x87\xd7az\xe2\x06\x83\x97\xad\xd1@\xd13\xc3\x11\xc8\"\x90\xe6l\x14{\xad\x04\x94\xadn\xb7E\x05\xea\x89\x1dl_3:\xca{\xf8A\xdcLVo\xdc}\x98e\x1a+\"\xa34%\xeb\xf8\'\b\n\x119d\xfbS-!(|\xba?\x97\xee\xff\x8e\xf6\x9e^RTA\xb9\'!\x14\xb0\xd4J\x95\x03\xb0\xee\xb3\x87\x8e\xf1HolR\x94\xda\x11\x01\xa9\xd7jS+\xe2\xc0\xeb1\xaa4\xec\xab\xb7\xca\b\x1cJ\'\x97z);\xb05!\x8c\xca\x90\xd9\f\xdfI2\xa6\x98\x9f\v\x19p\xb4\x1b\r\xdeA\xd7\"\xdd\x92*\xc0p[\xbdxO\x0e\xa7\x12\x04\";\xab\x93\x99\x8e_\x9f\xf3\x99\x8fr[1\xb7\xb8\xb8\xd6p\xb7\x9f\x111\x18a\xb1/\x96\xba\xf5J\xfa\x87\xc3\x14', 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x204000) finit_module(r3, &(0x7f00000003c0)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x2) mmap(&(0x7f00002bd000/0x2000)=nil, 0x2000, 0x3, 0x10010, 0xffffffffffffffff, 0x4fc71000) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x402, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x20) [ 754.996970][T13379] EXT4-fs (sda1): Invalid want_extra_isize 144 [ 755.007414][T13406] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02n\xd7\xeb\x10\xb4\xc5y\xf1\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x81\x00\x1f\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) tkill(0xffffffffffffffff, 0x3a) clone(0x28400, &(0x7f0000000040)="81132eebaa2f1d1d0d30048f94506b653b3d231d6b1342042d03e486041b99ec95984d57eab8705c7bdf3b16ea23a61724f9e506180ce1103660d758c1850099349a80e983a1e0c9670dc9b390141806", &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)="437cc8fd279d9b87f7ab4ec172d502f19017d51ce32328bab2eb9a5e91cee22e3c8026c435f0fba412b395323449a3359a4107fc908ba93ad05fe1a782f9caa7755e8a114a52e23d40116fd8") execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 755.093827][T13423] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x402, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x20) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x600, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$TCSETS(r4, 0x5402, &(0x7f00000002c0)={0x21, 0x80000000, 0x5, 0x1, 0x4, "bf6be5ae847816d07bcce31304b978fa3a0606"}) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) preadv(r2, &(0x7f0000000280), 0x0, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000040)="66817a2c8be223ed008c3fa78f052f0d80af7620b71caf680277a12e9f832a7f1abcd89de518d54af63f88ff01", &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000200)="f30f0eed3c1879c41d96f6ba39e5838d9e0b55d492b85375ace8a518c27d9ec4748b260d32d32361e10f722a5227cb194b5f0414653d03549979526fa444892ae293ea0017d3f798227678a3ca97d3479efeaa3efa31b79a4f7cb8715ca7b9ca3de36b05a94ee70ae0ee0558ba8125296cb63ba524776119dd130c446eba2ff1868430c81272ef45da2297144a8ec81cab8ad8220b45fe866aeca266b6006dc5b1158f57a3b1dfde7b") r5 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r5, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x148) r1 = syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000200)='./file0/file0\x00', 0x80000000, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000240)="04b9355a388e35c3c64abd491332f86ba9725fb784e99adf7f87341ec129581b05edd6d9a6a849f726d3ad8fd7c88b27da51c0afeb38a050ef81bbc7f61a5e30193a490821fff23405a11bf4445d2a786c176453faa53f27937667d758e93642d849b91fed9a32df9ddc8f6fac197dc8e1ff8860c16335dc1037f50f7c1f8cf9edb3b43b180d5be472deff6f9885fb930ad8d79ec3472be89fea913182caa1ea0dd620b4836e4bbd303e1b060dac0b9cec6687347867a5feca9a38f88bac8ecac8", 0xc1}, {&(0x7f0000000340)="7f73209005e1c44abdd24748ccef9a1364b7779adcfb212d3d741547554280c67bc77b416bbf7baef33ad0349f7d1e1613e185ef46b78df591ec64c80a121c86a95472489b54cad4c4a5f8c7a7bc9418f9eb81237c0a608c54afd85edc185e29421265b9c94556104305986de5c60631a1c0d032cc35f333f3ea77be07a9167e0b843e791455441221e09836828574bfed1d60bdda616dfdc9e50c3a0e3a3fa1113aadd23a452e4fd298690fb972088360a2339030c1e8ab8f5026379cedb7a932e261fb8da14b189d76acca1c26a3f4410e67f805feff", 0xd7, 0x1b}, {&(0x7f0000000780)="60ee573d35eab54bc3274dbd0db50d2a54fc8bf42349f280300bf50aa1d8f869ea3dbb666c3b8eb45c56f48d6558e19648f023b96044e1ccabd4945cf1c5aa3764b871e2a7be8ee74b34deedf88472878247821b00006d05abc424ce4d42dd114c7f1e5d4d2362dc660ef1", 0x6b, 0x401}, {&(0x7f0000000440), 0x0, 0x8}, {&(0x7f00000004c0)="b4d0dc586e4304c954a2ff172193b4e91857ab0043b0553239184dae423bd95a8602924464e6ff9d14ef3f0754eefe758bec953bac01efd9b69ba2c768e7c8e31582898ecefead89d45ada0adecc442d68952fb01a61ccef399fff0471aee5935f9248dcad5ee5d03f13dde13f48c162e3b050cc43650c0c6f1748cc563ad1c5b7483a0aab6773efd2cc1670289c9124a819bf2846586efc9261333ca87210b8036a2f560d320b58bbe8c2fc4f", 0xad, 0x101}, {&(0x7f0000000800)="5815ebd16552e67fcdca0f5ba9965c03ab5530766b368342c2474edfa9a4c7c6af266c2c8d957c463a573f95ab06e46c38eba012d380b86bb76ed6b408a1e04d3786f8347b6811920c9ac096ccdaaa4efd1b2da44f90ff89d645d89d6fc7e9a0b3e9a1aa03ecb9996aa0c6ce6b3eb0d638d5172235d688ea1b49bd023dd504b33577b440ff85cc2c7c5c71ab2cdeb7b3c17b61dc15626c095b3c07d19e0059750eb0b4b87e29e7410669dba9aa01984e1f2521", 0xb3, 0x2}, {&(0x7f0000000640)="cd8b6ae7923ad5a54e62b275a52a629ca59d5e35a5ca450852d47f695aa43e8b0061d744dbedc51ee28d5ad041268bcee47e5080c13367dcfa996bd15cd18e0022b452a3a439d51657d6bf340bef2740fe404cefdbac730d08bb86", 0x5b, 0x6}], 0x2200001, &(0x7f0000000a80)={[{@dioread_nolock}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}, {@delalloc}, {@data_journal}, {@mblk_io_submit}, {@resgid}, {@mblk_io_submit}, {@init_itable}, {@test_dummy_encryption}, {@usrjquota_path={'usrjquota', 0x3d, './file0'}}], [{@seclabel}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@seclabel}, {@smackfshat={'smackfshat', 0x3d, ').\xe0\x136\x12\x0eJm\xf1o\x18\x16V$C\x88\f]h\x89Z\x81V\x85\n20K\xa9\x19\xb9\xe2\xd3\x0e9\xdeY/S\xa7\x81\x8e\x06\xa3\xb7\x95\xd5v\xae\x00\xd5eD\xb9\n\x11b9\xb9\x8c\x9e<\xf9\xb9D}\xde\xc0\x14\xa4\x06\xa6-d\xb6\xfcy\fD\xd5\x8e\x01\xf7\x10\xe4_\x10$9W\xb8\xd8*i\xff\x92\x8d\xb4\xe0>\xb2\x81w3Z\xef[TR\xa8\x15\xe8\xba\xa9\xb7i\b\x11\xb8N\r\x11=S)\xd0\x1b\xf45o\xebl\xd6\x87\x8b\x90vs-\xc5\xa2\xcaI\x80\xbc\xe3\xb8\x9cz\xd8\xf3.j\t\xaf\xd9\xd9\x9eh\xed\xd4\xe2\xf9\x16G\x177<\xc0\x96\x93V\x88\xf8\xa7'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) open(&(0x7f0000000480)='./file0\x00', 0x90800, 0x10f) execveat(r1, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x700, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 755.226144][T13453] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="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", 0xff, 0x80000001}], 0x880, &(0x7f0000000300)={[{@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x35, 0x78, 0x6d, 0x36]}}, {@huge_always}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x39, 0x65, 0x2d, 0x2d, 0x38, 0x30]}}], [{@smackfsfloor}, {@dont_measure}, {@smackfsdef}, {@euid_gt={'euid>', 0xee01}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\x8c\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2tTDq\x81bo\xa0\xd51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x00\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@uid_lt={'uid<', 0xffffffffffffffff}}]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400) 13:16:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x402, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x20) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x900, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:17 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) 13:16:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r0, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36}, {&(0x7f0000000580)=""/11}], 0x0, &(0x7f0000000600)=""/76}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104}, {&(0x7f0000004140)=""/244}, {&(0x7f00000008c0)=""/230}, {&(0x7f00000009c0)=""/4096}, {&(0x7f00000019c0)=""/70}, {&(0x7f0000001a40)=""/14}], 0x0, &(0x7f0000001b00)=""/130}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096}, {&(0x7f0000002c80)=""/4096}, {&(0x7f0000003c80)=""/128}, {&(0x7f0000003d00)=""/24}, {&(0x7f0000003d40)=""/211}, {&(0x7f0000003e40)=""/113}, {&(0x7f0000003ec0)=""/96}], 0x0, &(0x7f0000003fc0)=""/27, 0xffffff39}}], 0x4000361, 0x100000002, 0x0) sendto$inet6(r0, &(0x7f0000001440)="334f0db9a851d56845dbc1298bd288bfaacf3ad692bf667fb3dea16be57152b3209145338ae299d44e3cd2f2be837067a928b424aeee51b7c3313b2b8bbd5e774646e94de5476086f542bf2f9e3be329ef2397572c8015cae0d755480c7d387b52e4b345344160dc86d42881aee397c98b1681f15be3d162febce8321d8b15f081e5ea676a80eb7cbffb56f59734d3d5719dde0c8282476859da0da1173f7e266e3871c2e9fd41bd60d0f00aa33f0bc122aed5ff4b", 0xb5, 0x4040, &(0x7f0000000200)={0xa, 0x4e22, 0x4, @mcast2, 0x3e}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x110a0000, &(0x7f0000001280)="1136c605f18830e79a055d74f1b73564412dbd667e4e9f493a677300c6c13997850253530f0bd4997920ca7917b5c6fddc22bd6117b80f596890a30a86b09b37a1e196acd124edec27c7dd7cea4f6f66308cee70280b083a8aa641ac63d5d6e9354c9fc7b5725ac580a4c53537222af70b87619b8aa40dad11e2e928adb0c81612374877797d40f017b912c9133341cfb7673ea7e22e180a1998f75d503e4059841469c7fd3a101b262dc6d1eb149e9a142be01de2de3959b2b3997aaa24c13b42385ed1e3873cd9435ad7aaca57dc8318808ce0b042fd7cc243fdca49c56a8b6568766b69a7", &(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)="462a6a3092c51ad478a6db31f79dc6462715ae527b96008f63467be41d6b1bcada") ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000001240)={&(0x7f0000000240)=""/4096, 0x1000, 0x9, 0x500000}) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r3 = getpid() sched_setaffinity(r3, 0x8, &(0x7f0000000500)=0x9) tkill(r3, 0x8) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 755.355881][T13484] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:17 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x402, 0x0) 13:16:17 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000480)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x1, 0x2, 0x5b, 0x9, 0x2, 0x3, 0x8000002, 0xd3, 0x40, 0x32f, 0x401, 0x8, 0x38, 0x1, 0x4, 0x9cfa, 0x5}, [{0x6474e551, 0xfeff, 0x9, 0x9, 0x80000000000008, 0x100000001, 0xffbfffffffffffe0, 0x6}], "014f6dca75c9748503d423e61a4ad4404ed8b860636cd679f5ddda057590d8463430de56feec40bc6f8eef2fbca2aa67773b24b6cd3f329051eb11af798e3ee1464b34bd562d242731c01a1d01e6911a772e6b073509dda7a768c5bbcfd943dc83e0ea76190822bf8aab90c9d195717d7cdd717c215e1e57a578150c0c04baf7adb8cad13fdad62892911d40cac8068794306b24851fcbedaf01afbc954f9bb3fae4a2068e2ccf53faece03f55efd0ee28a4dac53063432890855967f75da7a8744f9ad43eaa0e0beaf77aebe65b4faa858267e5f6a808048be0ce"}, 0x153) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xa00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x105000, 0x95) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) write$binfmt_elf32(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/1638], 0x666) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x8, 0x6, 0x5, 0x4d3, 0x7, "691169d19b5ef46b"}) 13:16:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xb00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 755.523714][T13510] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:18 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:18 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x502, 0xc2) 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1', "d386ffdae210d43bfd836164920dcd1b5fc67bd6ce860930853a8e89667cb837305672fa2d8aae842a999a1e9b70484a3618b5438f4671d84a07916842c236bde5b87f5fa7802f064384e644324a3fb3831c226db62f5998a56b7d28a22a0849565f083cf814ca43f79800c8a511fe708cee71fca5f5c0c412bd6626ed5291319b6b368a728079fb25f6d0934025cfa7b11ec3f1f083ed4a67aaffeaa1107863c592f1363592d17d614169cc10e3fe914f22455a01fb5cd1519951d147792786b4b66f0917af81d6a6c2ae0670ea3e8e5fc171b87b21fd32bb8eaf7341704e6397f541196b0453f82015dcc6eb02fe015569744dacad5a6f50"}, 0xfd) 13:16:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xc00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:18 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) [ 755.659360][T13538] EXT4-fs (sda1): Invalid want_extra_isize 144 13:16:18 executing program 3: clone(0xa7011de11e718ef4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() tkill(r0, 0x7) ptrace$setopts(0x4206, r0, 0x7fff, 0x2) memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\x16\xb96\x84\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9V9\xcf\xd1\xce^\xf2\xa4\xcb@\xec\xb8n\xa7\x1e\xb3\x01\x19\xe2\xed\xa1v.J\xce?\x17\xf9V)\x9b\x9b\x9c\xa71\xf6\xfe\xf3\xef\xb6\xd0\xae\xd9F[\xb8\x9d\xed\x9ey^\x8f\xd5\x806}\xb1\x97\x1ftl\xd3\a\xc6\xb6\xc0\x8f\xb1F\xf1\xa9#|r\xe0\xb3\xc5\x89\xd9\xaa\xcf\xbf\x96d\xfe\xe7K\x7f\xe1\xa4\xf4\x8e \xbdx\x19\xb9\xcb\f\xa0T\xc2#\x9a\xe1\xed\x9f{&h\xbd5\xe1F\x910]\xcf\xf4\x1f6\vM\x9c\xdeG\x18Ap{@<$T\xb3\x8e@S\xaf\xbc\x8b\x99A*\xcfX8\xf8x\xb6#\xbeD\x85\xfc', 0x0) ptrace$cont(0x18, r0, 0x5, 0x2) r1 = gettid() tkill(r1, 0x7) ptrace$setregs(0xffffffffffffffff, r1, 0x978, &(0x7f0000000000)="18ba4c554dfcf4366e839d0a7cd8db525328e31ae5a11b93f37faf6df7cfc620a4451c1bd50450940cea5ee364fb4ed23ee06c341c9d5d394d62edd03dd46aac7f23a4bb8ea7749ecf5635c6bc144cc3b6295ac32fa69cdab594dedad7ddcec52edc3bc808b585bf35848a958a940613b8c32d711777abb623517e803a5cc30417aeb511a738c9453f4c9c94a9059ac494136eb17dda3fc9d1e14f67c9c4d1c3995a34c07c39b3ad7ea99add8c798c0c7e3644ec3689c7f3fb9dbae858e74b53de24286f4fc220e25fa9cf1aefb506eb3755e1f967470a50a18446313536a7090c10b5685993acfa8a") 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:18 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:18 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x8, 0x1, @tick=0xffffffff, {0x7f, 0x18}, {0x0, 0xc0}, @queue={0x3, {0x8, 0xfff}}}], 0x1c) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x9) fallocate(r3, 0x0, 0x0, 0x0) pipe(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0xecd2369487b5c1d3) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r6 = syz_open_pts(r5, 0x0) ioctl$TCSETSF(r6, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x208080, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac06}], 0x1, 0x0) io_submit(0x0, 0x5, &(0x7f0000000580)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x401, r2, &(0x7f0000000200)="07138d11dc3e9da4d0bc132b39cdcda26addce46dc5238502000e799ec90c569121f4748aabf11617932fe6d011b1eb7a9fead4e43023b9a9410dfcc2da00af68bc77a3915f61155dbcf807bb6c2817ead24949272ed74e32259a95bf596078d205d0c8326736461e6ca", 0x6a, 0x800, 0x0, 0x1, r3}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x83b1, r1, &(0x7f0000000280)="71149472d80467267b2b673dfd9b0a2e2386e61685ea453c74b97d98892625867c4f53ac650b", 0x26, 0x400, 0x0, 0x0, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x6, r6, &(0x7f0000000300)="3e7932b5dac0ad1669095aaa6f34bcd8a044054ee7c76221b953f9f7d5f08986a2aeb1d631", 0x25, 0x2, 0x0, 0x1, r1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000380)="bde2ce84937dbd2231c43ad6783579415ef39a9b36d1e2a44ce4a52188bcb947b24f9695e359d1d3db3608a5f5c7de99b136dfbc31e289c80b364d51aca6b696ff76200be6680788b2b30deb0809a1954492a2ce49b289bcc648e2bd7d838af7abe30316362e88", 0x67, 0x141, 0x0, 0x3, r1}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x3, r7, &(0x7f0000000480)="6f7abc2b4ad0bd26faee913ea2e97a1161aec5a4f021a1ab138ffc8f3af72e766d8d3bccf23268ee32a90b6aa905b1176e03a5c54e9e68d06c92868b3b9bb2187262e9e58028009a54a19908fc222eca5eaa9fe1c0277195243b645969c2400fea5eac071c2d35c4b2c88af63881764b865c70e4ec816fb9590d91850183ba5fcec2", 0x82, 0x7f, 0x0, 0x3, r8}]) 13:16:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000040)={@desc={0x1, 0x0, @desc3}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xd00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:18 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x2000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xe00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:18 executing program 0: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:18 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:18 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x14880, 0x0) r1 = openat(r0, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 3: clone(0x1105c800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x10000, &(0x7f00000003c0)="392668546448380710aee7e0b94c8a0f3229e86a2d005a850aefd94e4a7a8fb3c50db61fab5b08fa7183bdfb080d7187bbf6d3fce3a3a3d59573a0613f54786a0d82ddf8b55f80b370a7d93e9c28886e7bbc0db23223d9afbb82d4b782f38ac816dff5fa974d974ee020f07128c4f7cd1e75200cee38c3c439069b87136520a050fa225130ab96a65555b75415c46119e9ab8e7d543c45d7c0d3d9dab8", &(0x7f0000000200), &(0x7f0000000480), &(0x7f00000004c0)="3f04d866b3042b80161b2810b93f308f2c34d3abda8642f771266d9e4dddb9dec8c40da4d09eea18a8b045193c52c9c3793194e4db532d601f7367ced1cb50e11af5011a112891f091180cac201568057388a9138b490023dbb2c39087723e1faa175efcce2805fa4c68240b7283940cb73610cc675be0b66300edab3fab78cf42e8fb0f6dd9bfe189b480911e8ead1f4d5c4c16c687576891f427c89d504db0c2074444f1e9062bb9cd91ff0275c9aa8ae8706bfa") r0 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) clone(0x82100, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="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") ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) ptrace$setregs(0xd, r1, 0x1f, &(0x7f00000000c0)="0cf1f320689c190090e26d7f39d69ada3247a3fff9593fa62c") execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 0: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xec0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x4) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\x03M\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16_\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\x88\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x00\x00.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:19 executing program 0: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 756.855520][T13636] __nla_validate_parse: 23 callbacks suppressed [ 756.855535][T13636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000001900)=[{{&(0x7f0000000300)=@un=@abs, 0x80, &(0x7f0000001480)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)}, {&(0x7f00000013c0)=""/151, 0x97}], 0x3, &(0x7f00000014c0)=""/23, 0x17}, 0xda8}, {{&(0x7f0000001500)=@pppol2tp, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001580)=""/65, 0x41}, {&(0x7f0000001600)=""/91, 0x5b}, {&(0x7f0000001680)=""/12, 0xc}, {&(0x7f00000016c0)=""/15, 0xf}, {&(0x7f0000001700)=""/142, 0x8e}], 0x5, &(0x7f0000001840)=""/172, 0xac}, 0x3}], 0x2, 0x0, &(0x7f0000001980)={0x77359400}) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='security.selinux\x00', &(0x7f00000002c0)='[\x00', 0x2, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x15, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x3}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40010}, 0x4000840) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:19 executing program 3: clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) gettid() clone(0x100000, &(0x7f0000000400)="9b8357d345682f5c5de6ca6984bc4bfb17fddf65bff50bb0c01d607326da41d1183787dceaf6db2d6f8025f0822245c369a604af83a6a557eddd28a56d8c1b50a919c55530314953670ebb980453c1dcff61b5acd6c47911370e7f4ba9caa44dc4a27ddd674db86a716f3b3d1cb3a369bcbe127d4b521815c4948918b21d4e1c232516356552a0d192787cde3cdb8154245d5a9ee026cfd018ca30b39e797661947d153062b1d54927efa61847074d3ab9ed586d2fc371262e2ec954fbbed6b7d46da578209274c09f6e381ca3ec3b79fb2d017b3b22820199b77c24787acac15a3d7c175313", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000500)="71bc0534a227986357464dcab2c0c1bc85b373e4ba078d6114fabd80ef6c40583c83e86c6ff1a5604db179b1c35c520d58b19c5785c60946a0761839feeaf12777e23b7b701956bc2566f03a809c6f12583feb4e1524ad8ca1c83272d488fde28463ac77598d400b64c1135d9a39f53f4a83e0f656ec93545a") clone(0x800, &(0x7f0000000040)="2c3b241468f92af8f4b01b66a24426990a09dcf5dd334993fff5268d47179a39cbf249c0105943f239310a166e15a12e483d849d8a0644a46f0091334e692bcf6143e69c18afcc2e3110055bbd3eea3e3d97f29e6ce22b51e68e308febdca3951094f3a52996ca1c4662fd48513f002bdbbbd5", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000300)="1165382222e7b7e37428106786add57e2bd74487200340f4bae2ac9d3c9c31feee30a8720a78ff73096c2b4baace4e126fdecf0bc3c30f21ecbfd9a0991d14232476955b3ad7c8974ae0fa056852bc504427c817236356931732f089f547aa0711e372c3ed0403bd1e273bc0278d3955aafaca43a3bf5033285c5252d1d00c61454ff3fcb0f8e664dac0d3da1dc5aa0987c50c08a4dff7f587915cc564631b7c289f47c2bcf8fc7aafcf6af5df89c2c6e83c3bfe4e1bf175f25d62fdd4c69948cba0e40e41ef2bbc5758f7c4cd1a3378781ada187646da") execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) [ 756.943567][T13636] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:19 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 756.989325][T13665] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2581 sclass=netlink_tcpdiag_socket pid=13665 comm=syz-executor.2 13:16:19 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x1100, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:19 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x5) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="03f605020306af5403140000004800000007a60000000000000000000500000000004200000000000000000000000000000000000000000000000000200055aa", 0x40, 0x1c0}]) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xa700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:19 executing program 0: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$BTRFS_IOC_INO_PATHS(r1, 0xc0389423, &(0x7f0000000300)={0x7, 0x50, [0x100000008, 0x1, 0x200000000000008, 0xfffffffffffffffe], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10000, 0x16) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000140)=0xc) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)={0xfffffffd, 0x1000, 0x3, 0x8, 0x1, "00e4d3010000000173ffffffff63225bdd00e6"}) syz_open_pts(r3, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x80, 0x7, 0xb, "d886e35bdf628ae574958f3e655093b10bbf29"}) memfd_create(&(0x7f0000000200)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) timer_settime(0x0, 0x1, &(0x7f0000000180)={{0x77359400}}, &(0x7f00000003c0)) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 757.148559][T13686] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 757.187419][T13686] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:19 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xeaffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000008, 0x100010, r1, 0x833db000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) write(r4, &(0x7f0000000040), 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:19 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x1200, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x280ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4673}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = socket(0x10, 0x3, 0xc) write(r5, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000140)={'vxcan1\x00', 0x5}) write(r5, &(0x7f0000000100)="1f0000000104ff40003b54c007110000f30501000b000200f26526c561f3ec", 0x1f) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, 0xffffffffffffffff, 0x2bce2000) dup3(r4, r5, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xefffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:19 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 757.319336][T13721] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 757.338005][T13722] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000000080300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) clone(0x42000, &(0x7f0000001300)="c8852762bf2348c47c4efd6046f6ae8672d3a57bb103e29f32a70326b13bb5077a63728ab38b75a7277fe230a85544b64b9d6eb331e5688cc3d69305b1069ceb6ffceb555648fe40cb4777651956da3b425cf5811e06e7405951bfc4d726bc01e9ef2f1fa6c41d1aa00834ceef3a4b104d327ee8791f3cb6e627ad9420aa686677539958cd581cb1d70073ededfc11d7d100566f4a050ce1c604326a905d4ce517ab8bfb2e22732ed1984925e549187e21059941bf29e17c7e17b1cd70db8c228349350ef65f2a", &(0x7f00000000c0), &(0x7f0000001400), &(0x7f0000001440)="ba40259649065bc3fcec6ee98c2148a9134881e6fc4f44371f2aac1a6484bf7cd1742e6066c33ebb6b3f20234313069a2f0b540e1bd8d06265af49624d68641a2805478206fd50184cac94b54f1f687db76f55e6a3575300cd7004487d25c3065f65271c1e9d9c1bdeb083edc0101b3bdf1157ff6e2e7e8a18a50693b70f871244cb9f0e34524a2e1d409defcfb3916526246eb83c266cf89d678758d95c17c16445731d111f381cf88bcb501b26a9a0141c740bf6b768a89fa693116938257687612a54404caf3ec0c83805e4119b30269add0b27faa52338062bf5d669dc416b6fcfa0418378cefe2377") clone(0x803800, &(0x7f0000000200)="11f1558166a79a73eefcc7eaac29f530cf2d8d8a69f05a079ea9341ad399628317c7c97cdd59eded3334e0d5fae2c60913150fa025930e1e8c29993a63b985a64a19d3eb0caf1974e7a8afe93f2415be6bb60a09a8bf1b006d537ade57fa1238f7a0ca0af5eb71e7760df7fa6d5fae0b3e98ca91ced90e5c112fc921cbd5ba95ce5be77b7d3e86223489914e73581754e7d9ec210834f5b5182dd8b200da57429566f6c5c1a494084fa0f757b0069b3a35889d05422d282dbebd7f436e39450a90b92d999c33fe0073053a883e90c5b228922942e09cbeb75cd64c2c19bd6b060bcb4a659ed521fbc77e4a", &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000300)="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") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = fsmount(r0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x1f) 13:16:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:19 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) [ 757.410984][T13722] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:19 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x1235, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000431000/0x4000)=nil, 0x4000, 0x200000a, 0x52ad1076aafa79b4, r0, 0xe03ba000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/19, 0x13}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2, 0x2, 0x8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x2000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 757.515872][T13759] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 757.528536][T13759] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 757.588705][T13773] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:20 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xfeffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x2500, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x280ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4673}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = socket(0x10, 0x3, 0xc) write(r5, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000140)={'vxcan1\x00', 0x5}) write(r5, &(0x7f0000000100)="1f0000000104ff40003b54c007110000f30501000b000200f26526c561f3ec", 0x1f) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000000, 0x10, 0xffffffffffffffff, 0x2bce2000) dup3(r4, r5, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 13:16:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000800)=[{&(0x7f0000000500)}], 0x1, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000000), 0x9) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r4, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r5 = syz_mount_image$ext4(&(0x7f0000002980)='ext2\x00', &(0x7f00000029c0)='./file1\x00', 0x1000, 0x6, &(0x7f0000004cc0)=[{&(0x7f0000002a00)="0fcc0b6f7a1da72a9e695c110a667d4cbf01048c280e53b8c050b1ab289df8e68308b968e6a01e482e17407c515fba5e32160748b1006087be01629bfbf8cbdda6b995c7f6ae4fc21373304ffb04ba71612447e16a1a835b6ba2fd9f99b395a1ae350c21b05dcb3438d220797385938e37c2eb3c160ba67ffa7c3a9702edceb7d7d24f2d4d2dce2d5df426cf18743d6f8e79146007f7c41ca62b522c3faa8fc45be8bc2be90cb6ae5ea0ecb5f8aa6f1c1e92f0c281cee30f0ae11af0ee86a0bfe82b", 0xc2, 0x80000001}, {&(0x7f0000002b00)="80634dc8cd90d57d1ce277697354d4d33727c17b66a7859c2148c3514a86a70e974b0f88dba42152136165576d38ec67dfdf4bb91e950d75e27014c706fc54e3399fa4a907fdc3", 0x47, 0x5}, {&(0x7f0000002b80)="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", 0x1000, 0x8000}, {&(0x7f0000003b80)="b7755d3996696a05b41eb62097fe984068327d5b4d1e20eb0acba1e1bca0d5e9d2eee2ac8beb73e5874664c182fee556f6cfcb821c175a2a16a87c145b9c5bd97313c0d6935ac44695f48e5cfd5c3904f0666d98b58e25b87d484293d9afe6359eab90567d5dc8c70e67af2efd224c5a2fb64538303f1783b5d9f549252efb077b3bc9db41db1cae49164d215bda880a11570c97ef0387dfa6435e0de987aaf9e92f2971823129831ed60aef072790e05178d2f192c4", 0xb6, 0x9}, {&(0x7f0000003c40)="42dd96639a28069652d816be4804c8b837cdf988fc0db466e038fa664f4ab8f707adbf156f9f3b1043ed6e6497192b671673d2b0c5757062b31c233d37d7834e835c1ac59ee2e98ea5715dbe726d19bba1d0003d2874daf7d248d37321", 0x5d, 0x5}, {&(0x7f0000003cc0)="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", 0x1000, 0x830}], 0x2000800, &(0x7f0000000840)=ANY=[@ANYBLOB='journal_checksum,mblk_io_submit,init_itable=0x0000000000000006,commit=0x0000000000000006,lazytime,resuid=', @ANYRESHEX=0xee01, @ANYBLOB=',grpid,sb=0x0000000000000006,resuid=', @ANYRESHEX, @ANYBLOB=',subj_type=#*/:/,fowner=', @ANYRESDEC=0xee00, @ANYBLOB="2c6575900fd7ee3e6ea998f4690647f5bdca639de7470a3469310c6d78811e0bdabae28ac9504a", @ANYRESDEC, @ANYBLOB=',pcr=00000000000000000058,dont_hash,\x00']) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) clone(0x2000000, &(0x7f00000000c0)="83cccfa5", &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="0cf1544894eecad7c0166f8469fba1288fc4930824673bf60f8c504387cd25b4bc8b99f0c4c28d6111d410660da98ae1bac5e42b54f667e6195d21db60ab686134b867fac2ad5f45b6b19d1f96995a670b3e83eb1e43b966845d95a6bded3a16f536aaf94ecdf30c2a5f39d39d31a9eb44e1a26e91acb4abec513051dcd8d948c9b42b0741a63225c87304d495bbc4a6d76d3a8f892a0ace662e00cd8ae150a4d7b3f76d196ff4f8b403a0a560f2e7e41b896708116831614096f0a3532c9b98f9d3233528474e2ded753991f0c7dcc68a78adf77480286d0e26178a1912df77c4") ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="98af1b11513e94110d40870cf32af9ee04ede808000080000100ac613b20001fd802ce0f0fa63cd42f4695300837651700030000009f7af6b58dcbfb7bdc802c076c4041e9b4d866032fe48d9210bc58ff50fb7ae7e8bbed219365ea18cbd14d22478c5aa4e1f72ae04953622d65e3b66e2f8aab28df800a7318aa637aa188ea74000000000000ee00"], 0x20}}, 0x0) syz_open_pts(r6, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004ec0)=0x0) sendmsg$unix(r2, &(0x7f0000005000)={&(0x7f0000000200)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000280)="2629e8baa8a8978fe4cb3eff82987dbd3ff368353f4768b77e1b54f23d40b6551567b53b27b4cc92f2271ea123266f612f99a09acbcf1c19f235d077f098683f800ebe37d47f3b274fcbb7b4fa25ac00d49bb5f8122ed61dda2f6e1252d63bd032bf315a2b13c8c92b18a0bb4a36a14daf415f4b2664076e2f401f96a34c347515e97647799e402ee841b90776ffe3f3288560aa7f0197e5d42b737cb4c00838bcb0d590d20a9fa5eaa48f90d38bb6d9c30346a2ed86ce5bffdcb2b131140d0e1b8a00df5dd2023cf8bcde000c", 0xcd}, {&(0x7f0000000380)="80b4554c627a6172752cfe190fe6aa73671917c5cd123bbe55f3f2750c3d48b41307a8a1860ee829256d0e950b5e166e9bec6220f98c8e2b6718fbababd4b8a8e05f7ef0b4652de9ccdbab5ee3abd7f600274d4750739769d33821ad1a94460ff6ce3fc053f3401a54f123bda35b34eee7ef0026f6ac25e0afcde36a2746342bd749fa764530be51c09626b0551f9f62d0cc54cae02161f397ca70bf3ec6adc85cb71e21f1e347d3", 0xa8}, {&(0x7f0000000440)="ad4e609b1e9f02e362a506ba847510122dfdf427bbccb16ee2f9dcaa58d32ffab5add54d004353a84f3a050405782d5c294a6dc6e48a7d8e4316593ac94b6e0b601ab39662ab465723f1fcbd796fef04f9ee8f8802e4ba54c7b3457f5dc8824d744de9de270972ff80b5afe8f5d4e52db13a6e251928d8a16204833203a0430e424404463e487eedb7390bac719cee90c969c1aa377623b58b9ad8e42854ddc184944ffbc1afdd6ad543a68003dd3ede27a0be64c154f50449d7f5bdb82575c5179b9ed05981afdf6f52", 0xca}, {&(0x7f0000000540)="709c572a8ce8a77e56de6b50ff6b092c31b3db86d8c5135b54bf03a31eddc0a21dfe96a849d3dcdf563901941149d9df0eecbdae00f41cc32f11f345d6bd763afb545eeed4bec2cab7409dae32c220acba458803c66534a8c98be842623503fa238be3f4db59d5219cf84bba7d1023de35e640af00863ef8a4bbd8b957de2365e2eb2a5596bc0145a30a927d87f96becb98f86a74623059eec5a01ce65f474679f8189c37431dc06ac691c7e814d95bd204862e27142a7e2c9fd69746ca428", 0xbf}, {&(0x7f0000000040)="d3e1cefade0a428f21db3d0767ab4d4fa0c1dd77cfc6c17603125e9c15dce432ddceb246f77c76052acc50a419f630dc", 0x30}], 0x5, &(0x7f0000004f00)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r3, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r4]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r5, r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, 0x0, 0xffffffffffffffff}}}], 0xf0, 0x4000}, 0x40010) execveat(r3, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x800) 13:16:20 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:20 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() process_vm_writev(0x0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x40ad00, 0x0) mmap(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x21148000) preadv(r0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/121, 0x79}, {&(0x7f00000000c0)=""/12, 0xc}, {&(0x7f0000000200)=""/194, 0xc2}, {&(0x7f0000000300)=""/66, 0x42}, {&(0x7f0000000380)=""/129, 0x81}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x6, 0x8001, 0x4080) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000440)={0x40, 0xd467, 0x9, 0x27709550, 0x9}) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x3512, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) preadv(r1, &(0x7f0000000080)=[{&(0x7f0000000200)=""/184, 0xb8}, {&(0x7f00000002c0)=""/216, 0xd8}, {&(0x7f00000003c0)=""/231, 0xe7}, {&(0x7f00000004c0)=""/194, 0xc2}], 0x4, 0x7, 0xfffffffc) preadv(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)=""/200, 0xc8}], 0x1, 0x1000, 0x401) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:20 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x4800, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0xffffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) mmap(&(0x7f0000108000/0x1000)=nil, 0x1000, 0x2000002, 0x100010, r0, 0x278000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) finit_module(r1, &(0x7f0000000040)='\x00', 0x1) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:21 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x4005132, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x0, 0x80000000) setsockopt$inet_int(r0, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) 13:16:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() process_vm_writev(0x0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:21 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\b\x00\x00\x00dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x00^T*\x04\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0xcc0b62dafa035899) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x4c00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x3f, 0x0, 0x2000000, 0xfffffd, 0xfe, "3de44bef0cae561f3a719fe156b060da72f9a8"}) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x3000000, 0x30, r2, 0x54bc6000) r3 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r4, 0x0) sendfile(r3, r4, &(0x7f0000000080)=0x1, 0x0) 13:16:21 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fork() process_vm_writev(0x0, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}, {&(0x7f0000000740)=""/126, 0x7e}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x6) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x800, 0x70bd28, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) fallocate(r0, 0x2, 0x354b, 0x45b) fchmodat(r0, &(0x7f0000000180)='./file0\x00', 0x6) r2 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x401, 0x141000) fcntl$setpipe(r2, 0x407, 0xffffffffffffffc0) truncate(&(0x7f0000000200)='./file0\x00', 0x200) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x10000, 0x0) r4 = openat(r3, &(0x7f0000000280)='./file0\x00', 0x80000, 0x16) truncate(&(0x7f00000002c0)='./file0\x00', 0x2) r5 = syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file0\x00', 0x7, 0x1, &(0x7f0000000440)=[{&(0x7f0000000380)="146726577d2b9ce2363674ec010366447f553492a88caebca29c0bebf9e7613e38e15d7792af6545e8260b44d2e5274917e2342fb7eb906f76c5f67df3f07ad9b4db3e035094316639f304f1535ff51d2f029bfa50da7d1ca7af0382dccd117084cc51f506f4e9b16be44a9e2bcd76246f63c13d2e8255c49587be78236329dbf214e7e4bcbd64db0a17877fc47009aa7ab1b4f1b6aa9234f2066e04aaf6f733d57b26238800d6a484f409e83c7f76", 0xaf, 0x7}], 0x2000420, &(0x7f0000000480)={[{@huge_within_size}, {}, {@mode={'mode', 0x3d, 0x25d}}, {@gid={'gid', 0x3d, 0xee01}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x2f, 0x7, 0x33, 0x2f, 0x32]}}}}, {@size={'size', 0x3d, [0x74, 0x38, 0x78, 0x0, 0x78, 0x25]}}], [{@dont_measure}]}) ppoll(&(0x7f0000000540)=[{r5, 0x8050}, {r4, 0x2000}], 0x2, &(0x7f0000000580)={0x77359400}, &(0x7f00000005c0)={[0x10001]}, 0x8) creat(&(0x7f0000000600)='./file0\x00', 0x0) r6 = geteuid() mount$9p_virtio(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0), 0x1000, &(0x7f0000000700)={'trans=virtio,', {[{@cache_fscache}, {@cache_fscache}, {@version_9p2000}], [{@smackfshat={'smackfshat', 0x3d, '!\\[&-.-%#)#'}}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@subj_role={'subj_role', 0x3d, '[\\'}}, {@context={'context', 0x3d, 'root'}}, {@euid_gt={'euid>', r6}}, {@obj_type={'obj_type', 0x3d, '^'}}]}}) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x956d35384a221947}, 0xc, &(0x7f0000000a80)={&(0x7f0000000800)={0x254, r1, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x254}, 0x1, 0x0, 0x0, 0x60010}, 0x240000d0) r7 = openat$incfs(r0, &(0x7f0000000b00)='.pending_reads\x00', 0x44000, 0x100) sendmsg$DEVLINK_CMD_SB_POOL_GET(r7, &(0x7f0000000d40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000b80)={0x154, r1, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6, 0x11, 0x8}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x800}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x11, 0xfe01}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0xa6d}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3}, {0x6, 0x11, 0x9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x2}}]}, 0x154}, 0x1, 0x0, 0x0, 0x4}, 0xc081) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000dc0), 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x30, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xffffffc0, 0x68}}}}, [@NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x436}, @NL80211_ATTR_NOACK_MAP={0x6, 0x95, 0x9}]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x20044080) 13:16:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6800, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, 0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x40, 0x4067a51f567e933e) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000000240)={0x1, 0x2, 0x1000, 0x6f, &(0x7f0000000080)="6acc2855edd1cfa14a887dd17be442b32fb9509763a6fd3a8e60e64a4ad13d95ddf735b0eaa321bed139ede56dd004ad9491f23e5c665415a4e37b7441d2e8589ccfe2cee5d20c770deab387130a3c52546bce08907f852d46efacedbbe49af553def363d5fdee11bdc8644c0ed556", 0x0, 0x0, &(0x7f0000000200)}) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13:16:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:21 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, 0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6c00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:21 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x200040, 0x0) fdatasync(r0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x2000000002008300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000100)='\xa1\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x9fC\x9cD\x9c\xdd\xfe\xc9', 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x3010c0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) clone(0x40000000, &(0x7f0000000280)="afe2abdd16bba14be1eb3d717bb8c71edbae9923a241577bb388e44d9a5e4faf9e94e6d20ad26f65776f47e5c594f2f7e3cbf1e5b6124935707442e32e202383b4203e48d0e34b4844afb337d3061673d66f704b0912049de72bb39cc0b474d1", &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)="6a450ce869817075cf68cd5c9a2ab6eb51b378e28eaf777c49928f74cd99ce54cf88a82c") ioctl$TCSETSF(r5, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r6 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0xfa, 0xa2, 0x2, 0x80, 0x0, 0x100000001, 0x10800, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000ff, 0x2, @perf_config_ext={0xb63, 0x5}, 0x10000, 0x5, 0x8000, 0x6, 0x4, 0x400, 0x101, 0x0, 0xffffffb3, 0x0, 0x3}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x2) poll(&(0x7f0000000200)=[{r1, 0x2001}, {r0, 0x100}, {r2, 0x21}, {r3, 0x2051}, {r5, 0x200}, {r0, 0x701}, {r1, 0x400}, {0xffffffffffffffff, 0x102c}, {r6, 0x4000}], 0x9, 0x401) r7 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r7, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) fcntl$setstatus(r7, 0x4, 0xa000) 13:16:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:21 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, 0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:22 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000300)=[{&(0x7f0000000240)="ed826ebcafc9d317c380e64b18bf035696d30df43e452c2ac4c002ad827725f5e394f30c27a5a2d477e942c30d1aeccb59ee6433a7ff22787ee558c73337761c61801372ec990d1b25d51f138beaf99ccdfc7e7a75663555b8589ad22e9c131dfaf1c318a6b39f713c3bbdd3a37b615da1e5447972af77207e73103305c2c91085210a17099329", 0x87, 0x1}, {&(0x7f00000003c0)="8d3af8db645c1a406536682e3824d2258f08be5f74aad0728ee95e683cc1cacbf54df750a1ec613944c1eac15239a566147785ea622ba0376fe99f7142e65d256de44179834438abdb6d8aaf37e591c5542f05b272c7f0ed5675a7425b1ea170c95f67ee68540ea5d769b65b5a9365ce03b96217f62441a7703072ac3ccca9245a5978d4dc58da2803cdb9942716fba8c3e788e540e3d744c7c2550e2419db11eb663848e7f58fe6d485e0b75f023fbac4fa", 0xb2, 0x100000001}, {&(0x7f0000000040)="606c5e8c8b32e8ccd11df949552709d7bd9979af43a286b3a6a17672d9db5f1f7a9a067bc024b17214a7d30de1d7fc39b763a969d77e188f", 0x38, 0x9}], 0x0, &(0x7f0000000000)={[{@fat=@check_normal}], [{@obj_type={'obj_type', 0x3d, '\x05\x00doc\x00'}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x101001, 0x0) getpgrp(r0) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) r2 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000200)='./file0\x00', 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:16:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x7400, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:22 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000600000014000200fe8000000000000000000000000000aa14000300000000000000000000e884b3f3ffffff2700070073797374656d5f753a6f626a3a"], 0x64}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100), r3) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r4, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0x30}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xa8, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010102}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:sudo_exec_t:s0\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:tpm_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40080}, 0x40004) 13:16:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}, {&(0x7f0000000680)=""/179, 0xb3}], 0x7, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x7a00, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}, {&(0x7f00000005c0)=""/176, 0xb0}], 0x6, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:22 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="2074869377aaeed63db1063c0000008abb7684a90375150c8293811e0a93873ed49abfb709196fd95b42d2246ed578e06a49a0a8545cd6f58bf5f15e0fb1e3acc39ca725e31d9c64e228c3f51949b77c1a7c88de1bdb04bcdcd0eb6abf123b81c2a748443c42769fb1aca5b2f752b9a4a9b578d4f5136553a4", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x8080}, 0x240080a5) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) clone(0x97a09400, 0x0, 0x0, 0x0, 0x0) 13:16:22 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xc00e, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}, {&(0x7f0000000500)=""/154, 0x9a}], 0x5, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:22 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x34000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:22 executing program 2: set_mempolicy(0x2, &(0x7f0000000040)=0xc5d, 0x3) r0 = memfd_create(&(0x7f0000000100)='{.#\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000080)=@v3={0x3000000, [], 0xee01}, 0x18, 0x1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000004, 0x4000010, r0, 0x731ee000) 13:16:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x194242, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000201010002400067e60290", 0x17}, {0x0, 0x0, 0x1000000000000ffc}], 0x0, &(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES64=r0, @ANYRES32, @ANYRESOCT=r1]) chdir(&(0x7f0000000040)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x400, 0x8) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x800) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r2, 0x0, 0x2) r5 = open(&(0x7f0000000000)='./bus\x00', 0x86880, 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x3f6) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x18, 0x73, 0x0, {{0x40}}}, 0x18) sendfile(r2, r5, 0x0, 0x8400fffffffa) 13:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:22 executing program 3: r0 = socket(0x28, 0x2, 0x22c) write(r0, &(0x7f0000000000)="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", 0xfc) write(r0, &(0x7f0000000100)="aadfacc92a58314ef52b50e019b5439ce44c403c21f808cc96034fba67ff85eb742a7e9f0cdbcb876e1851cd44d5f2c1cae8ed162750a7", 0x37) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000200)={&(0x7f0000000140)=""/175, 0xaf}) 13:16:22 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000012c0)=""/217, 0xd9}], 0x4, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x400300, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x36) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = dup3(r0, r0, 0x80000) pidfd_send_signal(r3, 0x3c, &(0x7f00000001c0)={0xe, 0x7fff, 0x7fffffff}, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x8) sendfile(r1, r0, 0x0, 0x7fffeffd) creat(&(0x7f0000000040)='./bus\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = openat(r4, &(0x7f0000000100)='./bus/file0\x00', 0x100, 0x1a4) connect$unix(r5, &(0x7f0000000140)=@file={0x1, './bus/file0\x00'}, 0x6e) open(&(0x7f00000006c0)='./file0\x00', 0x150000, 0x39) write$binfmt_elf64(r5, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xda, 0x4c, 0x4, 0x3, 0x0, 0x9, 0x116, 0x40, 0x3a1, 0x8, 0x0, 0x38, 0x1, 0xff, 0xfff, 0x3f}, [{0x6474e551, 0xfff, 0x1ff, 0xffffffff00000001, 0x782, 0x9, 0x5}, {0x7, 0x5, 0x3ff, 0x7ff, 0x2, 0x0, 0xb0ec, 0xfffffffffffffffc}], "b8505b1a26dd938d0da6927ed21291a2f7e1d10617be51cfa3187eb9ee0a846f8eecfb7bb49be30a468f11c58d3c7ea6e8dcceefadc4f4b1ba77155eb7ae9e7d3770c3523980dbe172aa7bea59248cb5b9cb1a02a59ff1430c2eda5d4631901ccc12fb6221452634ed5fe180494f69c12480dc53db81f1022c9e65fe0dfcb345dc0e1376618a74885277e465651938066c353d16ba6bf73525baa3659e8a94", ['\x00', '\x00', '\x00']}, 0x44f) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 13:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:23 executing program 3: msgrcv(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="000080000000000000337500"/27], 0x19, 0x1, 0x800) r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0xe0000019}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = fsmount(0xffffffffffffffff, 0x0, 0x4) ioctl$VT_RESIZE(r5, 0x5609, &(0x7f0000000000)={0x7bb, 0x80, 0xfff7}) r6 = syz_open_pts(r3, 0x420040) ioctl$TCSETSF(r6, 0x5457, &(0x7f0000000180)={0x40, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x3, "00e6d3f22202b9db00"}) r7 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r7, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r7, &(0x7f0000000080)) ppoll(&(0x7f00000000c0)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 13:16:23 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x1000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x2000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:23 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000080), 0x3, 0x200) preadv(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/232, 0xe8}, {&(0x7f00000001c0)}], 0x2, 0x9, 0x9) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) write$vga_arbiter(r2, &(0x7f0000000040)=@other={'decodes', ' ', 'mem'}, 0xc) 13:16:23 executing program 2: unshare(0x6c060000) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000140)={'filter\x00', 0x0, [0x0, 0x0, 0xfffffffe, 0x2, 0x81]}, &(0x7f00000000c0)=0x54) unshare(0x5c040b80) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000100)=0x54) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000600)={'raw\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x8]}, &(0x7f0000000680)=0x54) recvmmsg(r0, &(0x7f0000003c40)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/132, 0x84}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/250, 0xfa}], 0x3, &(0x7f0000000400)=""/228, 0xe4}, 0x800}, {{&(0x7f0000000500)=@isdn, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000580)=""/102, 0x66}, {&(0x7f00000016c0)=""/241, 0xf1}], 0x2, &(0x7f0000001800)=""/37, 0x25}, 0x5}, {{&(0x7f0000001840)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002d40)=[{&(0x7f00000018c0)=""/74, 0x4a}, {&(0x7f0000001940)=""/88, 0x58}, {&(0x7f00000019c0)=""/209, 0xd1}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/173, 0xad}, {&(0x7f0000002b80)=""/145, 0x91}, {&(0x7f0000002c40)=""/197, 0xc5}], 0x7, &(0x7f0000002dc0)=""/69, 0x45}, 0x20}, {{&(0x7f0000002e40)=@hci, 0x80, &(0x7f0000003400)=[{&(0x7f0000002ec0)=""/159, 0x9f}, {&(0x7f0000002f80)=""/90, 0x5a}, {&(0x7f0000003000)=""/4, 0x4}, {&(0x7f0000003040)=""/192, 0xc0}, {&(0x7f0000003100)=""/204, 0xcc}, {&(0x7f0000003200)=""/194, 0xc2}, {&(0x7f0000003300)=""/248, 0xf8}], 0x7}}, {{&(0x7f0000003480)=@generic, 0x80, &(0x7f0000003840)=[{&(0x7f0000003500)=""/17, 0x11}, {&(0x7f0000003540)=""/8, 0x8}, {&(0x7f0000003580)=""/129, 0x81}, {&(0x7f0000003640)=""/196, 0xc4}, {&(0x7f0000003740)=""/133, 0x85}, {&(0x7f0000003800)=""/53, 0x35}], 0x6}, 0x86a}, {{&(0x7f00000038c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000003b80)=[{&(0x7f0000003940)=""/235, 0xeb}, {&(0x7f0000003a40)=""/179, 0xb3}, {&(0x7f0000003b00)=""/86, 0x56}], 0x3, &(0x7f0000003bc0)=""/117, 0x75}, 0x8}], 0x6, 0x10020, &(0x7f0000003dc0)) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000003e00)={'filter\x00', 0x0, [0x80000001, 0x6, 0x2, 0x4, 0x9a]}, &(0x7f0000003e80)=0x54) 13:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:23 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x3000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 760.818863][T14071] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem 13:16:23 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:23 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x90}}]}) 13:16:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x4000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={{0x14}, [@NFT_MSG_DELCHAIN={0x44, 0x5, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0x3}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xfffffffffffffffd}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}, @NFTA_CHAIN_POLICY={0x8, 0x5, 0x1, 0x0, 0xdc0805b8f69b947c}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x5, 0x0, 0x0, {0xc, 0x0, 0x6}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}}, @NFT_MSG_DELTABLE={0x70, 0x2, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x12c, 0xb, 0xa, 0x24965a6119a0d665, 0x0, 0x0, {0x2, 0x0, 0x4}, [@NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x5}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0xffffffff}, @NFTA_SET_USERDATA={0xe5, 0xd, 0x1, 0x0, "653842e3976f54301d48f5ed7e83222e1e93e1371c127a91b2b2e1c44080cec7b8ccad4f38e410f493584cc997088d377bcf7e9ace0ab3707a4122d344504f779af157495157412724e021d85e2ec576d2d57d96647d1d3b93146ec75143914795300ff6abcba8cebcda5dc169645cc33d78cf1963e47fff2aca63f20617d09dcd2f47d0bfe4f0ef6a32a6b394219cf8b0199c49d09a6ede384fb6a574a07aad8810e32cf55d0c39d5fa6403f702898a8fa2a47060357aef16745007fb4357da33e29e2f0477863cfa08372956569163349ddea843181d9f6af637a736a8fb3db5"}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x80}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x228}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="5500000018007f5f00fe01b2a4a2809302060000fd000001020b00000a0003003500281014000000190005407fffffff0022de1338d54400009b84136ef75afb83de4411001600c43ab82200000000f2ff00000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff0600000001000000000000002500000019001600040001000500001f00000606040000000000000000", 0x39}], 0x1) [ 760.860332][T14086] pci 0000:00:05.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 760.957756][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2565 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 760.972461][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2578 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 760.986655][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2562 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 13:16:23 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 761.000918][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 761.024683][T14106] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 761.033604][T14106] netlink: 'syz-executor.3': attribute type 5 has an invalid length. [ 761.058947][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2565 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 761.073198][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2578 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 761.087397][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2562 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 [ 761.102879][T14102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2571 sclass=netlink_route_socket pid=14102 comm=syz-executor.3 13:16:24 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) vmsplice(r2, &(0x7f0000000200)=[{&(0x7f0000000040)="f939cd77b730a42dcd47f242911227456ebdc4ec1155bbe8b04aa6ea4662d637f3429735c083c16caa397b2f9663c619cd5d491c22050160d7134beb924be430cd28e599b3be15e29d9fde033c9550b478a7b61c71c38e80805a7062651506d817c5e1e2216d9f6f7e7d7bd880b2a7c698a7239bd4d3f854ced715f6dd48360f5ac1e81b8376b3b631f6b37bd77bf27423391155ac95fbe8d750d714b8b52f1cac14408f1fdcd7c4fb2a144b8f9392baa835d4b1268cf38bee4bebaf7d817310f3aed2829d67c2ea594b7f8a025872ffd677e398ff31c302b3f217085c4849ec6db624c4a0c24cb5", 0xe8}, {&(0x7f0000000140)="0ed2dd22d2a858f14e2be386b674f01c01bb8b38b9f73247b73a2078bf1cbd5c6aa29ef939bd3ee5597a58edc854ad3b03e1dd3c6a9a3aa085c9c8292974bdd84279e61e600ac78fdc7a7284d7caf79d5e031cd36fc77004fed27df6f3b20f702c9005e7c9d05436ab346363b8a8212d3be90da24a47ef8d9b886ed1b1f1d1727d5b9e5b4db47dc11fd46e4b4b957c179a", 0x91}], 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001c00", 0x6) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4bfdc, 0x0) 13:16:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {0x0}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x5000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:24 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:24 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400", 0x6}], 0x1) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600), 0x10000000000000cd) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) mmap(&(0x7f0000275000/0x3000)=nil, 0x3000, 0x2000001, 0x2010, r3, 0xe13a2000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 13:16:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {0x0}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:24 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) setrlimit(0x6, &(0x7f0000000000)={0x2633, 0x4}) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) setuid(0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000040)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000500)=ANY=[@ANYRES32=r3, @ANYRES32=0x0, @ANYRES16, @ANYRES32=r3, @ANYRESDEC, @ANYRES32=r0, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB="000000000000000000000000000000d25b9d048a15ddb13856dfbcce8a987526a7c0354b43ffb7b05b2c4141597a69a3a7958c7f32b58cab2ecbf97efdda", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c00002f2782000000ef16d89a49377911bed88155f5300f6cd4d19040670f397757ab26cf549dd6fee2fee1aa4a853de639041fc9d25e18d8d7cbf5671b0ce24e3c5c912a76799f5fc6c8cc7a6b01b0f92952e0118f2a463712ef8c2af072d66ba81dd090d564099ccf7007a55055674256757df2fd9797876b92dbf9620af12a5c20ce53779e263a5c2bc2f7bf358b8c92ae9fbf49789ca2273fd00c69533b9c8dcb9ed60461", @ANYRES16=r1, @ANYRES32=0x0, @ANYRESDEC=r2, @ANYRES32=r4], 0xb0, 0x8095}], 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x3, 0x0, 0x1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x20, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, 0xffffffffffffffff) open(0x0, 0x141042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x6, 0x9, 0x6, 0x6, 0xbb87, 0x9, 0x100000001, 0x2, 0x1}, 0x0) getpgid(r0) 13:16:24 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {0x0}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:25 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x6c, 0x0, 0x1, 0x40b, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x3}}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x100a}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @private}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x6c}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x40c40, 0x58) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 13:16:25 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000000071b20000040000000000e1000000"], 0x14}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) flistxattr(r0, &(0x7f0000000080)=""/43, 0x2b) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r1, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000580)=""/11, 0xb}], 0x2, &(0x7f0000000600)=""/76, 0x4c}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104, 0x68}, {&(0x7f0000004140)=""/244, 0xf4}, {&(0x7f00000008c0)=""/230, 0xe6}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/70, 0x46}, {&(0x7f0000001a40)=""/14, 0xe}], 0x6, &(0x7f0000000180)=""/136, 0x88}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/128, 0x80}, {&(0x7f0000003d00)=""/24, 0x18}, {&(0x7f0000003d40)=""/211, 0xd3}, {&(0x7f0000003e40)=""/113, 0x71}, {&(0x7f0000003ec0)=""/96, 0x60}], 0x7, &(0x7f0000003fc0)=""/27, 0x1b}}], 0x3, 0x100000002, 0x0) setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000), 0x4) listen(r0, 0x0) accept$inet6(r0, 0x0, 0x0) 13:16:25 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x7000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 762.625286][T14175] __nla_validate_parse: 33 callbacks suppressed [ 762.625302][T14175] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 762.649180][T14174] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:25 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x8000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 762.682219][T14175] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 762.766586][T14198] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 762.786914][T14200] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:25 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:25 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {0x0}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x9000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:25 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0x6) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000040)={0x7, 0x200}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000004c0)) sendfile(r1, r2, 0x0, 0x80000001) 13:16:25 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {0x0}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 763.544416][T14229] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 763.544766][T14226] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 763.573245][T14230] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:26 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 763.601997][T14229] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xa000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {0x0}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 763.689395][T14244] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 763.722194][T14251] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:26 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 0 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 763.746081][T14255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 763.777812][T14255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000001200)='attr\x00') syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r4, 0x0, &(0x7f0000000080)='.\x00'}, 0x0) io_uring_enter(r1, 0x43b1, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r1, 0x29fe, 0x0, 0x0, 0x0, 0x0) 13:16:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xb000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 763.849736][T14269] FAULT_INJECTION: forcing a failure. [ 763.849736][T14269] name failslab, interval 1, probability 0, space 0, times 0 [ 763.863943][T14269] CPU: 0 PID: 14269 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 763.876671][T14269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.887298][T14269] Call Trace: [ 763.890687][T14269] dump_stack+0x137/0x19d [ 763.895302][T14269] should_fail+0x23c/0x250 [ 763.900741][T14269] ? getname_flags+0x84/0x3d0 [ 763.906054][T14269] __should_failslab+0x81/0x90 [ 763.911618][T14269] should_failslab+0x5/0x20 [ 763.917381][T14269] kmem_cache_alloc+0x46/0x2f0 [ 763.923038][T14269] getname_flags+0x84/0x3d0 [ 763.927946][T14269] do_mkdirat+0x3b/0x200 [ 763.932203][T14269] ? ksys_write+0x157/0x180 [ 763.937729][T14269] __x64_sys_mkdir+0x32/0x40 [ 763.943112][T14269] do_syscall_64+0x4a/0x90 [ 763.947944][T14269] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 763.954346][T14269] RIP: 0033:0x4656e7 [ 763.958793][T14269] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 763.979493][T14269] RSP: 002b:00007f6a580defa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 763.988811][T14269] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x2000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 763.997468][T14269] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 764.006093][T14269] RBP: 00007f6a580df040 R08: 0000000000000000 R09: 00000000000884a0 [ 764.014251][T14269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 764.022702][T14269] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 764.037894][T14278] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:26 executing program 2: set_mempolicy(0x4003, &(0x7f0000000040)=0xa, 0x5) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/rt6_stats\x00') r0 = open(&(0x7f0000000000)='./file0\x00', 0x404800, 0x8) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0xe, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 13:16:26 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 764.063356][T14277] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xc000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:26 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 764.169770][T14269] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 764.182484][T14298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:26 executing program 0 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) read(r0, &(0x7f0000000000)=""/76, 0x4c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) syz_mount_image$tmpfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@uid={'uid', 0x3d, r1}}]}) 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:26 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 764.225052][T14298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xd000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 764.335619][T14323] FAULT_INJECTION: forcing a failure. [ 764.335619][T14323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 764.349311][T14323] CPU: 1 PID: 14323 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 764.360433][T14323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.371719][T14323] Call Trace: [ 764.375178][T14323] dump_stack+0x137/0x19d [ 764.380048][T14323] should_fail+0x23c/0x250 [ 764.385963][T14323] should_fail_usercopy+0x16/0x20 [ 764.392767][T14323] strncpy_from_user+0x21/0x250 [ 764.398600][T14323] getname_flags+0xb8/0x3d0 [ 764.403587][T14323] do_mkdirat+0x3b/0x200 [ 764.408709][T14323] ? ksys_write+0x157/0x180 [ 764.413765][T14323] __x64_sys_mkdir+0x32/0x40 [ 764.418460][T14323] do_syscall_64+0x4a/0x90 [ 764.423738][T14323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 764.430460][T14323] RIP: 0033:0x4656e7 [ 764.434990][T14323] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.457399][T14323] RSP: 002b:00007f6a580defa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 764.466080][T14323] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 764.474662][T14323] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 13:16:26 executing program 3: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:26 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) [ 764.482809][T14323] RBP: 00007f6a580df040 R08: 0000000000000000 R09: 00000000000884a0 [ 764.491827][T14323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 764.500604][T14323] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 764.517516][T14327] tmpfs: Bad value for 'uid' 13:16:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xe000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:27 executing program 0 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 764.541076][T14323] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x34000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:27 executing program 3: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 764.626523][T14345] FAULT_INJECTION: forcing a failure. [ 764.626523][T14345] name failslab, interval 1, probability 0, space 0, times 0 [ 764.639869][T14345] CPU: 0 PID: 14345 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 764.650896][T14345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.662005][T14345] Call Trace: [ 764.665759][T14345] dump_stack+0x137/0x19d [ 764.670240][T14345] should_fail+0x23c/0x250 [ 764.674843][T14345] ? __se_sys_mount+0x4e/0x2e0 [ 764.679866][T14345] __should_failslab+0x81/0x90 [ 764.684909][T14345] should_failslab+0x5/0x20 [ 764.689704][T14345] __kmalloc_track_caller+0x64/0x340 [ 764.695575][T14345] ? strnlen_user+0x137/0x1c0 [ 764.701846][T14345] strndup_user+0x73/0x120 [ 764.707482][T14345] __se_sys_mount+0x4e/0x2e0 [ 764.712509][T14345] ? do_mkdirat+0x69/0x200 [ 764.717359][T14345] ? ksys_write+0x157/0x180 [ 764.722150][T14345] __x64_sys_mount+0x63/0x70 [ 764.726811][T14345] do_syscall_64+0x4a/0x90 [ 764.731389][T14345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 764.737731][T14345] RIP: 0033:0x467afa [ 764.742417][T14345] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 764.766400][T14345] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 764.780528][T14345] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 764.794663][T14345] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 764.804379][T14345] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 764.813396][T14345] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 764.822525][T14345] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x400300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:27 executing program 3: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}, {&(0x7f0000000cc0)=""/174, 0xae}], 0x7, 0x0) 13:16:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x10000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:27 executing program 0 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300110468fe0700000000007400ff3f020000003b0a00010000000019002b000a00080014a4ee1ee438d2fd000000000000007200", 0x39}], 0x1) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r1, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36}, {&(0x7f0000000580)=""/11}], 0x0, &(0x7f0000000600)=""/76}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104}, {&(0x7f0000004140)=""/244}, {&(0x7f00000008c0)=""/230}, {&(0x7f00000009c0)=""/4096}, {&(0x7f00000019c0)=""/70}, {&(0x7f0000001a40)=""/14}], 0x0, &(0x7f0000001b00)=""/130}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096}, {&(0x7f0000002c80)=""/4096}, {&(0x7f0000003c80)=""/128}, {&(0x7f0000003d00)=""/24}, {&(0x7f0000003d40)=""/211}, {&(0x7f0000003e40)=""/113}, {&(0x7f0000003ec0)=""/96}], 0x0, &(0x7f0000003fc0)=""/27, 0xffffff39}}], 0x4000361, 0x100000002, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_generic(r3, &(0x7f0000004340)={&(0x7f0000001c40)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000004300)={&(0x7f0000004240)={0xb4, 0x16, 0x202, 0x70bd25, 0x25dfdbff, {0xf}, [@nested={0x12, 0x1, 0x0, 0x1, [@generic='B\t', @typed={0xb, 0x49, 0x0, 0x0, @str='/}@-/&\x00'}]}, @generic="229b464f3f270f6feee3ce2c3209610d77ebc4e735567bf1b4672a726eba011ab60ea995443d93f347ccef21a54e180f67cc80eb0a9333263618ea6cfb96f373d5ebdf4172b03a468133f45c5b4083c17c5a9c2948d2ab36b1ee02f051bcf4b868aafcf14804e28dcce18994ca0714a43fcccf8cf2562149fb93ec2a074b4cefca21e7b66c238d94a924db22"]}, 0xb4}, 0x1, 0x0, 0x0, 0x2048010}, 0x4) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0xfc94) bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4}, 0x14) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x6, 0xce, 0x6, 0xffffec47, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @empty, 0x20, 0x8000, 0x7, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'geneve1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000d80)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000200)={0xb40, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x254, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xcc, 0x5, "c3000e522a16336cf36e849a6aacfebf629b3dcda2e1d195fdba421b226d843bc88002583c10cc7f5e6b7c37d55259d18ec46524a13463d34430bd84ad0765216f059b33b1bcfc36d686ded982fd981146301a266d085c419fb1ddc7dec9e2985e37f3cbd5bdfc52e3283353fb223828a5017c5eb53516c4a7cfc448862594a4d08509f7047af26489a730b52183c696f7fc335fc3789db42023501e91b4d79af15f7a372f4352413d9cb1083be20c0bb4309e0ebce1f34ccc89bdb297760474f5eb45111af97492"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fff}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_BITS={0x120, 0x3, 0x0, 0x1, [{0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '!)+(@:\']-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '/##-(]%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ')!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':}($\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '--\a{\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '@\\^:@-%}([\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, '[{)\xff.]-/}(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '(<,.)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x44, 0x5, "18247a5dfdaccc8ae4f3be306cdca5406788ba0639c22fd3f0a18d2afb365198b500580f00e327e28e7595051d5f356785465f846f31fa40b1ab87844679ce21"}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1b8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xdf, 0x4, "d8b59e98f1aacd385a074c10b05c84072a9b40cfe95ec014c9eff668912b9dbcfb1b7289f9477f1699ee5e6cede0ddb5f7e0de804f998905c3089a692516c13e8f9d9d02b9856ba829d432ca370206470b0c518b8106128ca947766e508f1f6230cbf38c4cea8a39f58242d5e3310b7e019c72431fa2f39aefcd2d852855fa9ab6b348f1a805fe961b75f10a7680920737b629e13749f0f248db1d037d962bae2eba31f4bae37340f97226b5bbcdf028031206c930c247db1a7941798b5d6f844ab22dc46859f1b1c3623f5689d2144533aae8315201526a3cf1df"}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "b4c32ccefa179a9dbf14aef4de740b406d480621f5b7c360bbf6072f32bc0c4d4275d1309c09a68e2a6d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xfffffffd}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x9}, @ETHTOOL_A_BITSET_MASK={0x56, 0x5, "bab271f86063d7a8ee7d24913d1752f882d518c82e36a7776fbd5ff49325565695ad2379c3271f4a466bb76e3a9f42362ecd98c39c20b3fbe8dc47024a957d26c5113dd9ee0d37464fe55974143660c5daf4"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_VALUE={0x32, 0x4, "eafa8c54f7bb92cea06e2fc0437b64b6e371e362021a1bf564547867c180da013a27f82a7516ef68ef0676ff69ba"}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x124, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x110, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x608}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '+$\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x12, 0x2, '-+!\\+{(&![%:+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')+:/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '}!:*\xb0-*,)\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffc}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x120, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffb}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'&]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, ')$}[*{\\&:!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xf, 0x2, ']!#^]^,@,[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd0f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*{\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x52, 0x5, "90eea986c83e76de555fd4a84588983a3a34e9c710d863687e2390a874fc8ac43510ce43ea0539fa8fa27af96e0532ec6015c2bed8f819bca068f6b227137ed3e423d86847b85c8a96be346f63d3"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x3b0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4d, 0x5, "94ed664e2334f5830038cd8686d60901e29c288b16448aae28f0c9bd293fe36453c151d8ad114f9fa2306f05100388f50968b067b4fa6bd8d5c57b37c3ddf5c7e6586aecd207dc1fff"}, @ETHTOOL_A_BITSET_VALUE={0xfb, 0x4, "c531cca05027f51ae02b0d5759712a11cdb35493d258654b40df38d2e2de7316338ac21f773e55ef092ad20c99b612c3132171d13998cd082aea2d557b745c5bb5dbda3a03964204c73dc96ad8d711806eac426581c928fbc5ca261ec6db46f2a56badf40dddbccad01b3c988818daac9bba0337635404fdce433df82f05b9e4c6a31ab26a5d6c120c6acfdfa18cfdf9ba83ffd478c87caf24d0a44e21486c70aaeda8916cffeb70577027c468a4c0f59bb7a3bab8d945be4656d4c8f084d9ce3b0655a991159c2f656d26500838bc7477e1881ba15d72ac2725ca06de1dd1327ed3a3910dd1a7e3e3d9ac80cc079f5786e72a352b3954"}, @ETHTOOL_A_BITSET_VALUE={0xd6, 0x4, "96aa0f314ce16964ab69753bc6266cf41b2f1db61fa7990806797539d018af0fc80fb991445d56b88d0096d94c5181a5467c2f40ba88c156aaad25f548cdd79b260dacf5ca5571e585d525082746a9ac121c58246d9e6b4ece968ee711d76f96d6a3b5948cbf829eaed8157427b5ba4febf25dd14c83c0b81d203701482b67823de74556018e2e8de8f3f2240acc1823aedd7b3c273f48da3a0072cbe1b4446ca3bdc990f5dd15d8cac7237c8a7669bce0506877fe9a5058bd19ee46511c702dcace1fc81e09f1343a35a2cf2e157702a205"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xac, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '}^\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x856}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb6e}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']^*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, ',*-[,,,\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')*$,\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_BITSET_BITS={0xd8, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '/}@-/&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x108f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ':\'-\x05\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '**\x06&!\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ef3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '$,-\'+*\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0xb40}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 13:16:27 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 765.193746][T14365] FAULT_INJECTION: forcing a failure. [ 765.193746][T14365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 765.209673][T14365] CPU: 1 PID: 14365 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 765.221633][T14365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.227919][T14373] netlink: 'syz-executor.2': attribute type 8 has an invalid length. 13:16:27 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 765.233057][T14365] Call Trace: [ 765.233071][T14365] dump_stack+0x137/0x19d [ 765.249813][T14365] should_fail+0x23c/0x250 [ 765.254621][T14365] should_fail_usercopy+0x16/0x20 [ 765.259835][T14365] _copy_from_user+0x1c/0xd0 [ 765.265080][T14365] strndup_user+0xb0/0x120 [ 765.269891][T14365] __se_sys_mount+0x4e/0x2e0 [ 765.275228][T14365] ? do_mkdirat+0x69/0x200 [ 765.280362][T14365] ? ksys_write+0x157/0x180 [ 765.285484][T14365] __x64_sys_mount+0x63/0x70 13:16:27 executing program 3: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 765.290548][T14365] do_syscall_64+0x4a/0x90 [ 765.295259][T14365] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 765.301872][T14365] RIP: 0033:0x467afa [ 765.305888][T14365] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 765.328543][T14365] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:27 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, 0x0, 0x0, 0x0) 13:16:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x11000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 765.337898][T14365] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 765.348034][T14365] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 765.358005][T14365] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 765.366628][T14365] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 765.375569][T14365] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:27 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, 0x0, 0x0, 0x0) 13:16:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x12000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 765.478941][T14377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14377 comm=syz-executor.2 13:16:28 executing program 0 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 765.638294][T14414] FAULT_INJECTION: forcing a failure. [ 765.638294][T14414] name failslab, interval 1, probability 0, space 0, times 0 [ 765.652103][T14414] CPU: 1 PID: 14414 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 765.663298][T14414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.674439][T14414] Call Trace: [ 765.678271][T14414] dump_stack+0x137/0x19d [ 765.682988][T14414] should_fail+0x23c/0x250 [ 765.688398][T14414] __should_failslab+0x81/0x90 [ 765.693915][T14414] ? __se_sys_mount+0xf2/0x2e0 [ 765.699596][T14414] should_failslab+0x5/0x20 [ 765.705449][T14414] kmem_cache_alloc_trace+0x49/0x310 [ 765.712153][T14414] ? _copy_from_user+0x94/0xd0 [ 765.717183][T14414] __se_sys_mount+0xf2/0x2e0 [ 765.722125][T14414] ? do_mkdirat+0x69/0x200 [ 765.726649][T14414] ? ksys_write+0x157/0x180 [ 765.732720][T14414] __x64_sys_mount+0x63/0x70 [ 765.737555][T14414] do_syscall_64+0x4a/0x90 [ 765.742324][T14414] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 765.748780][T14414] RIP: 0033:0x467afa [ 765.753392][T14414] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 765.774952][T14414] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 765.787465][T14414] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 765.796554][T14414] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 765.806179][T14414] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 765.814782][T14414] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 765.822926][T14414] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 766.059724][T14377] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 766.076485][T14380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14380 comm=syz-executor.2 13:16:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f00000003c0)={[{@jqfmt_vfsv1}]}) open(&(0x7f0000000040)='./file0\x00', 0x200480, 0x81) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, 0x0, 0x0, 0x0) 13:16:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x20000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:28 executing program 0 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/187, 0xbb}], 0x6, 0x0) 13:16:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.255715][T14434] FAULT_INJECTION: forcing a failure. [ 766.255715][T14434] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.270877][T14434] CPU: 1 PID: 14434 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 766.281634][T14434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.293291][T14434] Call Trace: [ 766.296845][T14434] dump_stack+0x137/0x19d 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.301655][T14434] should_fail+0x23c/0x250 [ 766.306717][T14434] should_fail_usercopy+0x16/0x20 [ 766.312302][T14434] _copy_from_user+0x1c/0xd0 [ 766.317173][T14434] __se_sys_mount+0x115/0x2e0 [ 766.322306][T14434] ? ksys_write+0x157/0x180 [ 766.327173][T14434] __x64_sys_mount+0x63/0x70 [ 766.332391][T14434] do_syscall_64+0x4a/0x90 [ 766.337165][T14434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 766.343450][T14434] RIP: 0033:0x467afa 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.347450][T14434] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 766.368803][T14434] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 766.379059][T14434] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 766.387499][T14434] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 766.397053][T14434] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 13:16:28 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000a75000/0x4000)=nil, 0x4000, 0x7, 0x31, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14000166, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="002eaaea981c878c6655159dd6f765d10ae85bdeb43d1008ead18fe9946b38fa4ad9ceba0ccd060000bda17f3c9c9005cb01c0a93b21c359915e6a773bfd82d57ef8cd88dc860bf0c56c731b88cc9ec27daa2b6e6c21e0e4402ef7e6a328b032fd3ab72d6001fb2ef8c8037978b28f66425e32e378101fc37c3137f906a0f0af4e6ce1a2cb87dae2af0c03fd59cadaa4b27e465e3cc61ab44faf07eb94174cff631a1860753ae752ea00237054fd8a2140568f93d55a4dc9030551ac7e9e5500d2389e6634eeaecd452f232f40"]) 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}, {&(0x7f0000000b40)=""/142, 0x8e}], 0x5, 0x0) [ 766.406315][T14434] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 766.415156][T14434] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:28 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x25000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:28 executing program 0 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}, {&(0x7f00000000c0)=""/6, 0x6}], 0x4, 0x0) 13:16:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x2a8c80, 0x110) r3 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x1fcd) [ 766.490225][T14434] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:29 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x35120000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:29 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.595978][T14482] FAULT_INJECTION: forcing a failure. [ 766.595978][T14482] name failslab, interval 1, probability 0, space 0, times 0 [ 766.610388][T14482] CPU: 1 PID: 14482 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 766.621558][T14482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.633219][T14482] Call Trace: [ 766.636765][T14482] dump_stack+0x137/0x19d [ 766.641367][T14482] should_fail+0x23c/0x250 13:16:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x3, 0x0) 13:16:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}], 0x2, 0x0) [ 766.646316][T14482] ? getname_flags+0x84/0x3d0 [ 766.651555][T14482] __should_failslab+0x81/0x90 [ 766.656521][T14482] should_failslab+0x5/0x20 [ 766.661308][T14482] kmem_cache_alloc+0x46/0x2f0 [ 766.668022][T14482] getname_flags+0x84/0x3d0 [ 766.672724][T14482] ? should_fail+0xd6/0x250 [ 766.677709][T14482] user_path_at_empty+0x28/0x50 [ 766.682738][T14482] __se_sys_mount+0x209/0x2e0 [ 766.688315][T14482] ? ksys_write+0x157/0x180 13:16:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}], 0x2, 0x0) [ 766.693281][T14482] __x64_sys_mount+0x63/0x70 [ 766.698482][T14482] do_syscall_64+0x4a/0x90 [ 766.703350][T14482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 766.711662][T14482] RIP: 0033:0x467afa [ 766.716263][T14482] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 766.739409][T14482] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 766.748975][T14482] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 766.759117][T14482] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 766.767637][T14482] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 766.779829][T14482] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 13:16:29 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.794568][T14482] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:29 executing program 0 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x48000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:29 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 766.926391][T14517] FAULT_INJECTION: forcing a failure. [ 766.926391][T14517] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.941881][T14517] CPU: 0 PID: 14517 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 766.953294][T14517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.964669][T14517] Call Trace: [ 766.968659][T14517] dump_stack+0x137/0x19d [ 766.973625][T14517] should_fail+0x23c/0x250 [ 766.978650][T14517] should_fail_usercopy+0x16/0x20 [ 766.984270][T14517] strncpy_from_user+0x21/0x250 [ 766.991436][T14517] getname_flags+0xb8/0x3d0 [ 766.996232][T14517] ? should_fail+0xd6/0x250 [ 767.001467][T14517] user_path_at_empty+0x28/0x50 [ 767.006975][T14517] __se_sys_mount+0x209/0x2e0 [ 767.012038][T14517] ? ksys_write+0x157/0x180 [ 767.017282][T14517] __x64_sys_mount+0x63/0x70 [ 767.022922][T14517] do_syscall_64+0x4a/0x90 [ 767.028271][T14517] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 767.035116][T14517] RIP: 0033:0x467afa [ 767.039211][T14517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.063121][T14517] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.073632][T14517] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 767.082678][T14517] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 767.091668][T14517] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 767.100285][T14517] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 767.112053][T14517] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}], 0x2, 0x0) 13:16:29 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x4c000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:29 executing program 0 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:29 executing program 2: syz_open_dev$tty20(0xc, 0x4, 0x1) r0 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x7) io_uring_enter(r0, 0x90e, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r5, 0x0) preadv(r5, &(0x7f0000000680)=[{&(0x7f0000000240)=""/202, 0xca}, {&(0x7f00000003c0)=""/172, 0xac}, {&(0x7f0000000480)=""/112, 0x70}, {&(0x7f0000000500)=""/85, 0x55}, {&(0x7f0000000580)=""/227, 0x3f}, {&(0x7f00000000c0)=""/11, 0xb}], 0x6, 0xa61, 0x0) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a5ea4a7ad401c0ef"}) [ 767.477943][T14530] FAULT_INJECTION: forcing a failure. [ 767.477943][T14530] name failslab, interval 1, probability 0, space 0, times 0 [ 767.493789][T14530] CPU: 0 PID: 14530 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 767.505819][T14530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.518074][T14530] Call Trace: [ 767.521714][T14530] dump_stack+0x137/0x19d [ 767.526565][T14530] should_fail+0x23c/0x250 [ 767.531822][T14530] __should_failslab+0x81/0x90 [ 767.537705][T14530] ? alloc_fs_context+0x46/0x500 [ 767.543957][T14530] should_failslab+0x5/0x20 [ 767.549908][T14530] kmem_cache_alloc_trace+0x49/0x310 [ 767.556308][T14530] alloc_fs_context+0x46/0x500 [ 767.561991][T14530] ? security_capable+0x91/0xa0 [ 767.568527][T14530] fs_context_for_reconfigure+0x42/0x50 [ 767.575271][T14530] path_mount+0x1212/0x1ce0 [ 767.581894][T14530] __se_sys_mount+0x23d/0x2e0 [ 767.588861][T14530] __x64_sys_mount+0x63/0x70 [ 767.594204][T14530] do_syscall_64+0x4a/0x90 [ 767.599255][T14530] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 767.606934][T14530] RIP: 0033:0x467afa [ 767.611471][T14530] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.634926][T14530] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.644436][T14530] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 767.652987][T14530] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 767.661511][T14530] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 13:16:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {0x0}], 0x3, 0x0) 13:16:30 executing program 0 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 767.670878][T14530] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 767.680789][T14530] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 767.708172][T14531] __nla_validate_parse: 17 callbacks suppressed [ 767.708186][T14531] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 767.784684][T14551] FAULT_INJECTION: forcing a failure. [ 767.784684][T14551] name failslab, interval 1, probability 0, space 0, times 0 [ 767.800944][T14551] CPU: 0 PID: 14551 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 767.812441][T14551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.825126][T14551] Call Trace: [ 767.828505][T14551] dump_stack+0x137/0x19d [ 767.833579][T14551] should_fail+0x23c/0x250 [ 767.839053][T14551] __should_failslab+0x81/0x90 [ 767.844039][T14551] ? legacy_init_fs_context+0x2d/0x70 [ 767.849978][T14551] should_failslab+0x5/0x20 [ 767.854884][T14551] kmem_cache_alloc_trace+0x49/0x310 [ 767.860547][T14551] ? kmem_cache_alloc_trace+0x215/0x310 [ 767.866640][T14551] ? alloc_fs_context+0x46/0x500 [ 767.872403][T14551] legacy_init_fs_context+0x2d/0x70 [ 767.878115][T14551] alloc_fs_context+0x419/0x500 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x60000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:30 executing program 2: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00', 0x0, 0x0, 0x0, [0x9, 0xffff, 0x3, 0x2, 0xad7e, 0x7ff]}, &(0x7f0000000440)=0x78) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000340)={'ip6_vti0\x00', @ifru_mtu}) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4a081, 0x21) setuid(r3) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x1281000, &(0x7f0000000100)={[{@huge_never}, {@huge_within_size}, {@uid={'uid', 0x3d, r1}}, {@mode={'mode', 0x3d, 0xffffffffffff3bf2}}], [{@euid_gt={'euid>', 0xee01}}, {@uid_gt={'uid>', r3}}]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5421, &(0x7f00000004c0)=0x567db0fb) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), 0x2004, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, 'trans=fd,'}}], [], 0xf}}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x20000, 0x0) 13:16:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {0x0}], 0x3, 0x0) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000940)=""/216, 0xd8}, {0x0}], 0x3, 0x0) [ 767.883967][T14551] fs_context_for_reconfigure+0x42/0x50 [ 767.889963][T14551] path_mount+0x1212/0x1ce0 [ 767.894691][T14551] __se_sys_mount+0x23d/0x2e0 [ 767.900731][T14551] __x64_sys_mount+0x63/0x70 [ 767.905984][T14551] do_syscall_64+0x4a/0x90 [ 767.910975][T14551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 767.917135][T14551] RIP: 0033:0x467afa [ 767.922029][T14551] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.944499][T14551] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.954519][T14551] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 767.963150][T14551] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 767.972863][T14551] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 767.982181][T14551] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 767.990972][T14551] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 768.010652][T14568] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) pwritev2(r0, &(0x7f0000000180)=[{&(0x7f00000002c0)='Y', 0x1}], 0x1, 0x0, 0x0, 0x12) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) fspick(r1, &(0x7f00000000c0)='./file0/file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/36, 0x24}], 0x1, 0xfffffffe, 0x8) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000140)={0xa, r0, 0x0, 0x0, 0x0, 0x5300000000000000}) r4 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0x0) pidfd_getfd(r2, r4, 0x0) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:30 executing program 0 (fault-call:2 fault-nth:10): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x68000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) [ 768.213996][T14597] FAULT_INJECTION: forcing a failure. [ 768.213996][T14597] name failslab, interval 1, probability 0, space 0, times 0 [ 768.228909][T14597] CPU: 0 PID: 14597 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 768.239278][T14597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.250910][T14597] Call Trace: [ 768.254741][T14597] dump_stack+0x137/0x19d [ 768.259525][T14597] should_fail+0x23c/0x250 [ 768.264673][T14597] ? ext4_remount+0x53/0x1840 [ 768.270044][T14597] __should_failslab+0x81/0x90 [ 768.275148][T14597] should_failslab+0x5/0x20 [ 768.279939][T14597] __kmalloc_track_caller+0x64/0x340 [ 768.286398][T14597] kstrdup+0x31/0x70 [ 768.290820][T14597] ext4_remount+0x53/0x1840 [ 768.296437][T14597] ? __cond_resched+0x11/0x40 [ 768.302383][T14597] ? __dentry_kill+0x456/0x4e0 [ 768.307150][T14597] ? shrink_dentry_list+0x54e/0x580 [ 768.312429][T14597] ? list_lru_count_node+0x28/0x30 [ 768.317819][T14597] ? shrink_dcache_sb+0x29d/0x2d0 [ 768.323191][T14597] ? ext4_statfs+0x6b0/0x6b0 [ 768.328392][T14597] legacy_reconfigure+0x8e/0xa0 [ 768.333504][T14597] reconfigure_super+0x2d3/0x4f0 [ 768.338978][T14597] path_mount+0x1442/0x1ce0 [ 768.343845][T14597] __se_sys_mount+0x23d/0x2e0 [ 768.348816][T14597] __x64_sys_mount+0x63/0x70 [ 768.353703][T14597] do_syscall_64+0x4a/0x90 [ 768.358472][T14597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 768.364466][T14597] RIP: 0033:0x467afa [ 768.368369][T14597] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.389897][T14597] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 768.399027][T14597] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 13:16:30 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) [ 768.407404][T14597] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 768.415807][T14597] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 768.424112][T14597] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 768.432417][T14597] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 [ 768.450042][T14606] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:30 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:30 executing program 0 (fault-call:2 fault-nth:11): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 768.577435][T14623] FAULT_INJECTION: forcing a failure. [ 768.577435][T14623] name failslab, interval 1, probability 0, space 0, times 0 [ 768.591345][T14623] CPU: 0 PID: 14623 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 768.602442][T14623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.613187][T14623] Call Trace: [ 768.616567][T14623] dump_stack+0x137/0x19d [ 768.621014][T14623] should_fail+0x23c/0x250 [ 768.625445][T14623] ? match_int+0x4b/0xf0 [ 768.631207][T14623] __should_failslab+0x81/0x90 [ 768.636132][T14623] should_failslab+0x5/0x20 [ 768.640813][T14623] __kmalloc_track_caller+0x64/0x340 [ 768.646512][T14623] ? simple_strtoul+0x8a/0xb0 [ 768.651452][T14623] kmemdup_nul+0x27/0x70 [ 768.656059][T14623] match_int+0x4b/0xf0 [ 768.660608][T14623] parse_options+0x3df/0x1860 [ 768.666146][T14623] ? __kmalloc_track_caller+0x23b/0x340 [ 768.672078][T14623] ext4_remount+0x3eb/0x1840 13:16:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f00000002c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040805490ed271f8f8e2d2efa31af2c00b3f4637fb6d8b9add7cae7eef3d950bdf8a25fb22abbdb29a71fb9e2baee2ecb56c7ba7e50a4cd00da8a44c6601fad144bf7888c50c7f4764922d7e67060e9eb06641d868d9d3e2c5aba04220c13a1ed9b016901231df6577e03bc9873666ea30e0ca084efe01dd1e5f3c808c422ea92cd59c1c645c0d4bd85f7451dcbb4360c9ddba64ac427489416be17d9d8d5e0f0af8d0e2a1ea3b68fcdc84a31a59761dde5c395b0b264f867df6431f106db60d9600e108c1534e866d6b20317f6e6710ef3e8c6c07955ef6168c182575a6c83b765ae92e4c0a3455cc102e5e1c51b7dbd655354dc6bfeb1ca0ada40fa5ae03cc742aa21", 0x121, 0x4e0}], 0x2800, &(0x7f00000000c0)=ANY=[]) 13:16:31 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x6c000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x3, 0x0) [ 768.678161][T14623] ? ext4_statfs+0x6b0/0x6b0 [ 768.683881][T14623] legacy_reconfigure+0x8e/0xa0 [ 768.689234][T14623] reconfigure_super+0x2d3/0x4f0 [ 768.694795][T14623] path_mount+0x1442/0x1ce0 [ 768.700014][T14623] __se_sys_mount+0x23d/0x2e0 [ 768.704841][T14623] __x64_sys_mount+0x63/0x70 [ 768.709547][T14623] do_syscall_64+0x4a/0x90 [ 768.714943][T14623] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 768.721354][T14623] RIP: 0033:0x467afa 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x3, 0x0) [ 768.725826][T14623] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.747277][T14623] RSP: 002b:00007f6a580defa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 768.756117][T14623] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 768.764475][T14623] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 13:16:31 executing program 3 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 768.773787][T14623] RBP: 00007f6a580df040 R08: 00007f6a580df040 R09: 0000000020000040 [ 768.784928][T14623] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 768.793365][T14623] R13: 0000000020000000 R14: 00007f6a580df000 R15: 00000000200001c0 13:16:31 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000440)) [ 768.831579][T14645] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 768.852889][T14648] FAULT_INJECTION: forcing a failure. [ 768.852889][T14648] name failslab, interval 1, probability 0, space 0, times 0 [ 768.866843][T14648] CPU: 0 PID: 14648 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000840)=""/253, 0xfd}, {0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x3, 0x0) 13:16:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 768.877731][T14648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.888310][T14648] Call Trace: [ 768.891586][T14648] dump_stack+0x137/0x19d [ 768.896213][T14648] should_fail+0x23c/0x250 [ 768.900721][T14648] ? getname_flags+0x84/0x3d0 [ 768.905408][T14648] __should_failslab+0x81/0x90 [ 768.910401][T14648] should_failslab+0x5/0x20 [ 768.915766][T14648] kmem_cache_alloc+0x46/0x2f0 [ 768.921671][T14648] getname_flags+0x84/0x3d0 [ 768.926827][T14648] do_mkdirat+0x3b/0x200 13:16:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x9}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r3, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36}, {&(0x7f0000000580)=""/11}], 0x0, &(0x7f0000000600)=""/76}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104}, {&(0x7f0000004140)=""/244}, {&(0x7f00000008c0)=""/230}, {&(0x7f00000009c0)=""/4096}, {&(0x7f00000019c0)=""/70}, {&(0x7f0000001a40)=""/14}], 0x0, &(0x7f0000001b00)=""/130}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096}, {&(0x7f0000002c80)=""/4096}, {&(0x7f0000003c80)=""/128}, {&(0x7f0000003d00)=""/24}, {&(0x7f0000003d40)=""/211}, {&(0x7f0000003e40)=""/113}, {&(0x7f0000003ec0)=""/96}], 0x0, &(0x7f0000003fc0)=""/27, 0xffffff39}}], 0x4000361, 0x100000002, 0x0) read(r1, &(0x7f0000000300)=""/147, 0x93) setsockopt(r3, 0x361, 0x1400000, &(0x7f0000000200)="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", 0xfc) write(r2, &(0x7f0000000000)="240000001a00110214f9f4072a09040011000000000200000002000008000f0003000000", 0x86) [ 768.931642][T14648] ? ksys_write+0x157/0x180 [ 768.937300][T14648] __x64_sys_mkdir+0x32/0x40 [ 768.942436][T14648] do_syscall_64+0x4a/0x90 [ 768.948026][T14648] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 768.955301][T14648] RIP: 0033:0x4656e7 [ 768.959403][T14648] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.980427][T14648] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 768.989979][T14648] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 768.998696][T14648] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 769.008155][T14648] RBP: 00007fc125a61040 R08: 0000000000000000 R09: 00000000000884a0 [ 769.017181][T14648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 13:16:31 executing program 0 (fault-call:2 fault-nth:12): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x20000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 769.025634][T14648] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 769.043093][T14645] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x74000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 769.134682][T14675] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 769.147444][T14682] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 769.158398][T14675] FAULT_INJECTION: forcing a failure. [ 769.158398][T14675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 769.173143][T14675] CPU: 0 PID: 14675 Comm: syz-executor.0 Tainted: G W 5.13.0-rc1-syzkaller #0 13:16:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 769.185037][T14675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.195556][T14675] Call Trace: [ 769.199477][T14675] dump_stack+0x137/0x19d [ 769.204668][T14675] should_fail+0x23c/0x250 [ 769.209647][T14675] should_fail_usercopy+0x16/0x20 [ 769.215469][T14675] _copy_to_user+0x1c/0x90 [ 769.220011][T14675] simple_read_from_buffer+0xab/0x120 [ 769.225711][T14675] proc_fail_nth_read+0xf6/0x140 [ 769.230712][T14675] ? rw_verify_area+0x136/0x250 [ 769.236010][T14675] ? proc_fault_inject_write+0x200/0x200 [ 769.242437][T14675] vfs_read+0x154/0x5d0 [ 769.247098][T14675] ? __fget_light+0x21b/0x260 [ 769.252270][T14675] ? __cond_resched+0x11/0x40 [ 769.257046][T14675] ksys_read+0xce/0x180 [ 769.262378][T14675] __x64_sys_read+0x3e/0x50 [ 769.267321][T14675] do_syscall_64+0x4a/0x90 [ 769.272052][T14675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 769.279017][T14675] RIP: 0033:0x41935c 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 769.283295][T14675] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 769.306862][T14675] RSP: 002b:00007f6a580df170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 769.316334][T14675] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 769.325613][T14675] RDX: 000000000000000f RSI: 00007f6a580df1e0 RDI: 0000000000000003 [ 769.334311][T14675] RBP: 00007f6a580df1d0 R08: 0000000000000000 R09: 0000000020000040 [ 769.343853][T14675] R10: 00000000000884a0 R11: 0000000000000246 R12: 0000000000000002 [ 769.352961][T14675] R13: 00007fff7baa8f3f R14: 00007f6a580df300 R15: 0000000000022000 [ 769.375803][T14682] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:31 executing program 3 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{0x0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x40000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:31 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 769.406959][T14648] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 769.488236][T14709] FAULT_INJECTION: forcing a failure. [ 769.488236][T14709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 769.494252][T14708] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 769.503609][T14709] CPU: 1 PID: 14709 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 769.522099][T14709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.533445][T14709] Call Trace: [ 769.537486][T14709] dump_stack+0x137/0x19d [ 769.542376][T14709] should_fail+0x23c/0x250 [ 769.546975][T14709] should_fail_usercopy+0x16/0x20 [ 769.552835][T14709] strncpy_from_user+0x21/0x250 [ 769.558183][T14709] getname_flags+0xb8/0x3d0 [ 769.563672][T14709] do_mkdirat+0x3b/0x200 [ 769.568044][T14709] ? ksys_write+0x157/0x180 [ 769.572969][T14709] __x64_sys_mkdir+0x32/0x40 [ 769.578736][T14709] do_syscall_64+0x4a/0x90 [ 769.583600][T14709] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 769.590161][T14709] RIP: 0033:0x4656e7 [ 769.594428][T14709] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 769.616655][T14709] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 769.626499][T14709] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 769.637530][T14709] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 769.647005][T14709] RBP: 00007fc125a61040 R08: 0000000000000000 R09: 00000000000884a0 [ 769.655574][T14709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 769.664855][T14709] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 769.695444][T14709] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:32 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r0, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36}, {&(0x7f0000000580)=""/11}], 0x0, &(0x7f0000000600)=""/76}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104}, {&(0x7f0000004140)=""/244}, {&(0x7f00000008c0)=""/230}, {&(0x7f00000009c0)=""/4096}, {&(0x7f00000019c0)=""/70}, {&(0x7f0000001a40)=""/14}], 0x0, &(0x7f0000001b00)=""/130}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096}, {&(0x7f0000002c80)=""/4096}, {&(0x7f0000003c80)=""/128}, {&(0x7f0000003d00)=""/24}, {&(0x7f0000003d40)=""/211}, {&(0x7f0000003e40)=""/113}, {&(0x7f0000003ec0)=""/96}], 0x0, &(0x7f0000003fc0)=""/27, 0xffffff39}}], 0x4000361, 0x100000002, 0x0) sendmsg$AUDIT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3e8, 0x61a0cbdfc6f0a521, 0x70bd2b, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20000004}, 0x800) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6900) ftruncate(r1, 0x800) r2 = perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f00000001c0), 0x102, 0x0) sendfile(r3, r2, &(0x7f0000000200)=0x10001, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) socketpair(0x3, 0x4, 0x20, &(0x7f0000000180)) sendfile(r1, r4, 0x0, 0xffffffff) 13:16:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x7a000000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:32 executing program 5 (fault-call:4 fault-nth:0): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:32 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:32 executing program 3 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 770.491791][T14729] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 770.499240][T14725] FAULT_INJECTION: forcing a failure. [ 770.499240][T14725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 770.516638][T14725] CPU: 0 PID: 14725 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 770.527688][T14725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.541550][T14725] Call Trace: [ 770.544931][T14725] dump_stack+0x137/0x19d [ 770.549527][T14725] should_fail+0x23c/0x250 [ 770.554330][T14725] should_fail_usercopy+0x16/0x20 [ 770.559721][T14725] _copy_from_user+0x1c/0xd0 [ 770.565356][T14725] iovec_from_user+0xc4/0x2d0 [ 770.570385][T14725] __import_iovec+0x49/0x270 [ 770.575440][T14725] ? try_charge+0x36/0x9c0 [ 770.580279][T14725] ? cgroup_rstat_updated+0x60/0x1c0 [ 770.586076][T14725] import_iovec+0x69/0x80 [ 770.590773][T14725] process_vm_rw+0xb8/0x4e0 [ 770.595458][T14725] ? kstrtouint_from_user+0x104/0x130 [ 770.601533][T14725] ? do_anonymous_page+0x411/0x8b0 [ 770.606707][T14725] ? fsnotify_perm+0x59/0x2e0 [ 770.611647][T14725] ? __fsnotify_parent+0x32f/0x430 [ 770.616937][T14725] ? get_pid_task+0x8b/0xc0 [ 770.621642][T14725] ? vfs_write+0x50c/0x770 [ 770.627038][T14725] ? __fget_light+0x21b/0x260 [ 770.632071][T14725] ? __cond_resched+0x11/0x40 [ 770.636990][T14725] ? fput+0x2d/0x130 [ 770.641109][T14725] __x64_sys_process_vm_writev+0x76/0x90 [ 770.646996][T14725] do_syscall_64+0x4a/0x90 [ 770.652115][T14725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 770.658227][T14725] RIP: 0033:0x4665d9 [ 770.662556][T14725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 770.684007][T14725] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 770.695706][T14725] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 770.704266][T14725] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014b3 [ 770.713144][T14725] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 770.722427][T14725] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 770.730884][T14725] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 770.740452][T14726] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 770.752927][T14728] FAULT_INJECTION: forcing a failure. [ 770.752927][T14728] name failslab, interval 1, probability 0, space 0, times 0 [ 770.769988][T14728] CPU: 0 PID: 14728 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 770.784872][T14728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.796344][T14728] Call Trace: [ 770.800242][T14728] dump_stack+0x137/0x19d [ 770.805105][T14728] should_fail+0x23c/0x250 [ 770.809839][T14728] ? __se_sys_mount+0x4e/0x2e0 [ 770.814761][T14728] __should_failslab+0x81/0x90 [ 770.820696][T14728] should_failslab+0x5/0x20 [ 770.825660][T14728] __kmalloc_track_caller+0x64/0x340 [ 770.831358][T14728] ? strnlen_user+0x137/0x1c0 [ 770.836847][T14728] strndup_user+0x73/0x120 [ 770.842159][T14728] __se_sys_mount+0x4e/0x2e0 [ 770.847198][T14728] ? do_mkdirat+0x69/0x200 [ 770.852259][T14728] ? ksys_write+0x157/0x180 [ 770.856946][T14728] __x64_sys_mount+0x63/0x70 [ 770.861675][T14728] do_syscall_64+0x4a/0x90 [ 770.866278][T14728] ? irqentry_exit_to_user_mode+0x5/0x20 [ 770.872660][T14728] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 770.879874][T14728] RIP: 0033:0x467afa [ 770.884118][T14728] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 770.905087][T14728] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 770.914931][T14728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 770.923264][T14728] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 770.932845][T14728] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 13:16:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xeaffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 770.943276][T14728] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 770.952413][T14728] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 770.973845][T14738] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 770.980760][T14739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1000 sclass=netlink_route_socket pid=14739 comm=syz-executor.2 13:16:33 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x9effffff, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 770.981273][T14729] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xc00e0000, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xefffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 771.063288][T14747] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 771.084038][T14750] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 771.110427][T14753] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 771.599268][T14763] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1000 sclass=netlink_route_socket pid=14763 comm=syz-executor.2 13:16:34 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:34 executing program 3 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:34 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xefffffff, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:34 executing program 5 (fault-call:4 fault-nth:1): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 772.127424][T14767] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 772.148008][T14777] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 772.155275][T14776] FAULT_INJECTION: forcing a failure. [ 772.155275][T14776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.160871][T14774] FAULT_INJECTION: forcing a failure. [ 772.160871][T14774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.170773][T14776] CPU: 1 PID: 14776 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 772.197867][T14776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.208645][T14776] Call Trace: [ 772.212104][T14776] dump_stack+0x137/0x19d [ 772.217275][T14776] should_fail+0x23c/0x250 [ 772.221780][T14776] should_fail_usercopy+0x16/0x20 [ 772.227078][T14776] _copy_from_user+0x1c/0xd0 [ 772.231942][T14776] strndup_user+0xb0/0x120 [ 772.236436][T14776] __se_sys_mount+0x4e/0x2e0 [ 772.241297][T14776] ? do_mkdirat+0x69/0x200 [ 772.245899][T14776] ? ksys_write+0x157/0x180 [ 772.250749][T14776] __x64_sys_mount+0x63/0x70 [ 772.255828][T14776] do_syscall_64+0x4a/0x90 [ 772.261070][T14776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 772.268305][T14776] RIP: 0033:0x467afa [ 772.272645][T14776] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 772.295627][T14776] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 772.304989][T14776] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 772.313035][T14776] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 13:16:34 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x7ac7, &(0x7f0000000040)={0x0, 0xfe0f, 0x3b, 0x0, 0x167}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r7 = syz_open_pts(r6, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000180)={0x0, 0x0, 0x101, 0x7fffffff, 0xc, "93039f4c0fb37ee6918552a50da6c325cc6595"}) ioctl$TCSETSF(r7, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) poll(&(0x7f0000000140)=[{r1, 0x1208}, {r3, 0x10}, {r5, 0x2000}, {r7, 0x8}], 0x4, 0x1000) ioctl$TIOCGSID(r0, 0x5429, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) 13:16:34 executing program 3 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 772.321604][T14776] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 772.330787][T14776] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 772.339796][T14776] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 772.348444][T14774] CPU: 0 PID: 14774 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 772.360025][T14774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.372820][T14774] Call Trace: 13:16:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xf0ffffff, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 772.377075][T14774] dump_stack+0x137/0x19d [ 772.382943][T14774] should_fail+0x23c/0x250 [ 772.388013][T14774] should_fail_usercopy+0x16/0x20 [ 772.394330][T14774] _copy_from_user+0x1c/0xd0 [ 772.398953][T14774] iovec_from_user+0xc4/0x2d0 [ 772.404836][T14774] ? import_iovec+0x69/0x80 [ 772.410310][T14774] process_vm_rw+0x120/0x4e0 [ 772.415311][T14774] ? kstrtouint_from_user+0x104/0x130 [ 772.421865][T14774] ? do_anonymous_page+0x411/0x8b0 [ 772.427848][T14774] ? fsnotify_perm+0x59/0x2e0 [ 772.432960][T14774] ? __fsnotify_parent+0x32f/0x430 [ 772.439473][T14774] ? get_pid_task+0x8b/0xc0 [ 772.444792][T14774] ? vfs_write+0x50c/0x770 [ 772.449975][T14774] ? __fget_light+0x21b/0x260 [ 772.456776][T14774] ? __cond_resched+0x11/0x40 [ 772.463801][T14774] ? fput+0x2d/0x130 [ 772.469498][T14774] __x64_sys_process_vm_writev+0x76/0x90 [ 772.477713][T14774] do_syscall_64+0x4a/0x90 [ 772.483212][T14774] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 772.492009][T14774] RIP: 0033:0x4665d9 [ 772.496567][T14774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 772.520652][T14774] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 772.531249][T14774] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 772.540691][T14774] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014b6 [ 772.549827][T14774] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 772.560198][T14774] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 13:16:34 executing program 5 (fault-call:4 fault-nth:2): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 772.569243][T14774] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:35 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 772.623406][T14790] FAULT_INJECTION: forcing a failure. [ 772.623406][T14790] name failslab, interval 1, probability 0, space 0, times 0 [ 772.638327][T14790] CPU: 0 PID: 14790 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 772.642975][T14795] FAULT_INJECTION: forcing a failure. [ 772.642975][T14795] name failslab, interval 1, probability 0, space 0, times 0 [ 772.649474][T14790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.649488][T14790] Call Trace: [ 772.649496][T14790] dump_stack+0x137/0x19d [ 772.649520][T14790] should_fail+0x23c/0x250 [ 772.689008][T14790] __should_failslab+0x81/0x90 [ 772.695020][T14790] ? __se_sys_mount+0xf2/0x2e0 [ 772.700940][T14790] should_failslab+0x5/0x20 [ 772.706528][T14790] kmem_cache_alloc_trace+0x49/0x310 [ 772.713202][T14790] ? _copy_from_user+0x94/0xd0 [ 772.718510][T14790] __se_sys_mount+0xf2/0x2e0 [ 772.723900][T14790] ? do_mkdirat+0x69/0x200 [ 772.728539][T14790] ? ksys_write+0x157/0x180 [ 772.733466][T14790] __x64_sys_mount+0x63/0x70 [ 772.740336][T14790] do_syscall_64+0x4a/0x90 [ 772.745877][T14790] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 772.752554][T14790] RIP: 0033:0x467afa [ 772.756971][T14790] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 772.781533][T14790] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 772.795681][T14790] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 772.806854][T14790] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 772.816598][T14790] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 772.826243][T14790] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 772.836351][T14790] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 772.847055][T14795] CPU: 1 PID: 14795 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 772.860129][T14795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:16:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xffffff7f, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:35 executing program 3 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 772.871454][T14795] Call Trace: [ 772.875267][T14795] dump_stack+0x137/0x19d [ 772.880044][T14795] should_fail+0x23c/0x250 [ 772.885189][T14795] ? __anon_vma_prepare+0x41/0x2d0 [ 772.891364][T14795] __should_failslab+0x81/0x90 [ 772.898957][T14795] should_failslab+0x5/0x20 [ 772.904512][T14795] kmem_cache_alloc+0x46/0x2f0 [ 772.909924][T14795] ? cgroup_rstat_updated+0x60/0x1c0 [ 772.915624][T14795] __anon_vma_prepare+0x41/0x2d0 [ 772.921470][T14795] ? ext4_page_mkwrite+0xf20/0xf20 [ 772.927303][T14795] handle_mm_fault+0x1749/0x1a70 [ 772.932961][T14795] ? pud_huge+0x9/0x20 [ 772.937920][T14795] ? follow_page_mask+0x3f2/0x1040 [ 772.944314][T14795] __get_user_pages+0x947/0xee0 [ 772.950095][T14795] __get_user_pages_remote+0x13a/0x5b0 [ 772.956388][T14795] pin_user_pages_remote+0x58/0x80 [ 772.962542][T14795] process_vm_rw_single_vec+0x17d/0x460 [ 772.969861][T14795] process_vm_rw+0x347/0x4e0 [ 772.976198][T14795] ? do_anonymous_page+0x411/0x8b0 [ 772.983717][T14795] ? fsnotify_perm+0x59/0x2e0 [ 772.989184][T14795] ? __fsnotify_parent+0x32f/0x430 [ 772.995278][T14795] ? get_pid_task+0x8b/0xc0 [ 773.000560][T14795] ? vfs_write+0x50c/0x770 [ 773.005705][T14795] ? __fget_light+0x21b/0x260 [ 773.010996][T14795] ? __cond_resched+0x11/0x40 [ 773.017085][T14795] ? fput+0x2d/0x130 [ 773.021602][T14795] __x64_sys_process_vm_writev+0x76/0x90 [ 773.027910][T14795] do_syscall_64+0x4a/0x90 [ 773.033208][T14795] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 773.039533][T14795] RIP: 0033:0x4665d9 [ 773.045614][T14795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 773.067420][T14795] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 773.076196][T14795] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 773.085635][T14795] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014b9 [ 773.095012][T14795] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 773.103916][T14795] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 773.112786][T14795] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 773.134841][T14803] __nla_validate_parse: 7 callbacks suppressed [ 773.134880][T14803] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 773.159554][T14813] FAULT_INJECTION: forcing a failure. [ 773.159554][T14813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 773.173853][T14813] CPU: 1 PID: 14813 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 773.185064][T14813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.195842][T14813] Call Trace: [ 773.199174][T14813] dump_stack+0x137/0x19d [ 773.203745][T14813] should_fail+0x23c/0x250 [ 773.208499][T14813] should_fail_usercopy+0x16/0x20 [ 773.214205][T14813] _copy_from_user+0x1c/0xd0 [ 773.219315][T14813] __se_sys_mount+0x115/0x2e0 [ 773.224155][T14813] ? ksys_write+0x157/0x180 [ 773.228743][T14813] __x64_sys_mount+0x63/0x70 [ 773.234392][T14813] do_syscall_64+0x4a/0x90 [ 773.239423][T14813] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 773.245787][T14813] RIP: 0033:0x467afa [ 773.250296][T14813] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 773.271088][T14813] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:35 executing program 5 (fault-call:4 fault-nth:3): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:35 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 773.279921][T14813] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 773.288754][T14813] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 773.297407][T14813] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 773.306506][T14813] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 773.315288][T14813] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 773.324412][T14802] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 773.355612][T14820] FAULT_INJECTION: forcing a failure. [ 773.355612][T14820] name failslab, interval 1, probability 0, space 0, times 0 [ 773.371044][T14820] CPU: 1 PID: 14820 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 773.382625][T14820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.393991][T14820] Call Trace: [ 773.397279][T14820] dump_stack+0x137/0x19d [ 773.402024][T14820] should_fail+0x23c/0x250 [ 773.407492][T14820] ? __anon_vma_prepare+0x92/0x2d0 [ 773.413449][T14820] __should_failslab+0x81/0x90 [ 773.418860][T14820] should_failslab+0x5/0x20 [ 773.424411][T14820] kmem_cache_alloc+0x46/0x2f0 [ 773.430956][T14820] ? __anon_vma_prepare+0x41/0x2d0 [ 773.436265][T14820] __anon_vma_prepare+0x92/0x2d0 [ 773.442875][T14820] ? ext4_page_mkwrite+0xf20/0xf20 [ 773.449487][T14820] handle_mm_fault+0x1749/0x1a70 [ 773.455159][T14820] ? pud_huge+0x9/0x20 [ 773.459809][T14820] ? follow_page_mask+0x3f2/0x1040 [ 773.466050][T14820] __get_user_pages+0x947/0xee0 [ 773.473604][T14820] __get_user_pages_remote+0x13a/0x5b0 [ 773.480340][T14820] pin_user_pages_remote+0x58/0x80 [ 773.486974][T14820] process_vm_rw_single_vec+0x17d/0x460 [ 773.493104][T14820] process_vm_rw+0x347/0x4e0 [ 773.498149][T14820] ? do_anonymous_page+0x411/0x8b0 [ 773.504638][T14820] ? fsnotify_perm+0x59/0x2e0 [ 773.510186][T14820] ? __fsnotify_parent+0x32f/0x430 [ 773.517114][T14820] ? get_pid_task+0x8b/0xc0 [ 773.522634][T14820] ? vfs_write+0x50c/0x770 [ 773.528687][T14820] ? __fget_light+0x21b/0x260 [ 773.533955][T14820] ? __cond_resched+0x11/0x40 [ 773.539597][T14820] ? fput+0x2d/0x130 [ 773.543914][T14820] __x64_sys_process_vm_writev+0x76/0x90 [ 773.551647][T14820] do_syscall_64+0x4a/0x90 [ 773.556551][T14820] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 773.563894][T14820] RIP: 0033:0x4665d9 [ 773.568819][T14820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 773.590624][T14820] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 13:16:36 executing program 2: openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getrlimit(0x1, &(0x7f0000000140)) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f00000005c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r3, 0x10e, 0x8, 0x0, 0x0) 13:16:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xffffff9e, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:36 executing program 3 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 773.600981][T14820] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 773.610623][T14820] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014bc [ 773.619565][T14820] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 773.628164][T14820] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 773.637619][T14820] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:36 executing program 5 (fault-call:4 fault-nth:4): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:36 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 773.676399][T14830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 773.707569][T14837] FAULT_INJECTION: forcing a failure. [ 773.707569][T14837] name failslab, interval 1, probability 0, space 0, times 0 [ 773.722734][T14837] CPU: 1 PID: 14837 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 773.727237][T14841] FAULT_INJECTION: forcing a failure. [ 773.727237][T14841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 773.734078][T14837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.734095][T14837] Call Trace: [ 773.734104][T14837] dump_stack+0x137/0x19d [ 773.769146][T14837] should_fail+0x23c/0x250 [ 773.774489][T14837] ? getname_flags+0x84/0x3d0 [ 773.782173][T14837] __should_failslab+0x81/0x90 [ 773.787498][T14837] should_failslab+0x5/0x20 [ 773.792517][T14837] kmem_cache_alloc+0x46/0x2f0 [ 773.797552][T14837] getname_flags+0x84/0x3d0 [ 773.802420][T14837] ? should_fail+0xd6/0x250 [ 773.806996][T14837] user_path_at_empty+0x28/0x50 [ 773.812253][T14837] __se_sys_mount+0x209/0x2e0 [ 773.817296][T14837] ? ksys_write+0x157/0x180 [ 773.822492][T14837] __x64_sys_mount+0x63/0x70 [ 773.827588][T14837] do_syscall_64+0x4a/0x90 [ 773.832090][T14837] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 773.838496][T14837] RIP: 0033:0x467afa [ 773.842537][T14837] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 773.865691][T14837] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 773.875012][T14837] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 773.883596][T14837] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 773.892370][T14837] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 773.900424][T14837] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 773.908802][T14837] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 773.917939][T14841] CPU: 0 PID: 14841 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 773.928635][T14841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.939948][T14841] Call Trace: [ 773.943751][T14841] dump_stack+0x137/0x19d [ 773.948245][T14841] should_fail+0x23c/0x250 [ 773.953458][T14841] __alloc_pages+0x102/0x320 [ 773.958650][T14841] alloc_pages_vma+0x391/0x660 [ 773.964014][T14841] ? __anon_vma_prepare+0x236/0x2d0 [ 773.969549][T14841] ? ext4_page_mkwrite+0xf20/0xf20 [ 773.974848][T14841] handle_mm_fault+0xb9c/0x1a70 [ 773.980077][T14841] ? pud_huge+0x9/0x20 [ 773.984822][T14841] ? follow_page_mask+0x3f2/0x1040 [ 773.990543][T14841] __get_user_pages+0x947/0xee0 [ 773.995786][T14841] __get_user_pages_remote+0x13a/0x5b0 [ 774.001697][T14841] pin_user_pages_remote+0x58/0x80 [ 774.007464][T14841] process_vm_rw_single_vec+0x17d/0x460 [ 774.013088][T14841] process_vm_rw+0x347/0x4e0 [ 774.017935][T14841] ? do_anonymous_page+0x411/0x8b0 [ 774.023499][T14841] ? fsnotify_perm+0x59/0x2e0 [ 774.028413][T14841] ? __fsnotify_parent+0x32f/0x430 [ 774.034262][T14841] ? get_pid_task+0x8b/0xc0 [ 774.039020][T14841] ? vfs_write+0x50c/0x770 [ 774.044141][T14841] ? __fget_light+0x21b/0x260 [ 774.049019][T14841] ? __cond_resched+0x11/0x40 [ 774.054719][T14841] ? fput+0x2d/0x130 [ 774.059000][T14841] __x64_sys_process_vm_writev+0x76/0x90 [ 774.065581][T14841] do_syscall_64+0x4a/0x90 [ 774.070782][T14841] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 774.077541][T14841] RIP: 0033:0x4665d9 [ 774.081838][T14841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 774.104337][T14841] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 774.114114][T14841] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 13:16:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:36 executing program 3 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 774.122887][T14841] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014bf [ 774.132237][T14841] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 774.140709][T14841] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 774.149469][T14841] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 [ 774.166110][T14830] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 774.199817][T14848] FAULT_INJECTION: forcing a failure. [ 774.199817][T14848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 774.215484][T14848] CPU: 0 PID: 14848 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 774.220175][T14850] EXT4-fs: 6 callbacks suppressed [ 774.220189][T14850] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xffffffef, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:36 executing program 5 (fault-call:4 fault-nth:5): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 774.227891][T14848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.227908][T14848] Call Trace: [ 774.227915][T14848] dump_stack+0x137/0x19d [ 774.227940][T14848] should_fail+0x23c/0x250 [ 774.227957][T14848] should_fail_usercopy+0x16/0x20 [ 774.271373][T14848] strncpy_from_user+0x21/0x250 [ 774.277235][T14848] getname_flags+0xb8/0x3d0 [ 774.282014][T14848] ? should_fail+0xd6/0x250 [ 774.287644][T14848] user_path_at_empty+0x28/0x50 [ 774.293079][T14848] __se_sys_mount+0x209/0x2e0 13:16:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 774.298773][T14848] ? ksys_write+0x157/0x180 [ 774.303600][T14848] __x64_sys_mount+0x63/0x70 [ 774.309970][T14848] do_syscall_64+0x4a/0x90 [ 774.315482][T14848] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 774.321910][T14848] RIP: 0033:0x467afa [ 774.326283][T14848] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 774.348968][T14848] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 774.359515][T14848] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 774.370416][T14848] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 774.379140][T14848] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 774.389854][T14848] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 774.390604][T14864] FAULT_INJECTION: forcing a failure. [ 774.390604][T14864] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 774.402083][T14848] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 774.421576][T14866] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 774.428275][T14864] CPU: 1 PID: 14864 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 774.449988][T14864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.462435][T14864] Call Trace: [ 774.466348][T14864] dump_stack+0x137/0x19d [ 774.471437][T14864] should_fail+0x23c/0x250 [ 774.476199][T14864] __alloc_pages+0x102/0x320 [ 774.482474][T14864] alloc_pages+0x21d/0x310 [ 774.487289][T14864] ? ext4_page_mkwrite+0xf20/0xf20 [ 774.493033][T14864] pte_alloc_one+0x29/0xb0 [ 774.497614][T14864] ? mem_cgroup_charge+0x39/0xa0 [ 774.502722][T14864] ? ext4_page_mkwrite+0xf20/0xf20 [ 774.508921][T14864] handle_mm_fault+0x1255/0x1a70 [ 774.515480][T14864] ? pud_huge+0x9/0x20 [ 774.520322][T14864] ? follow_page_mask+0x3f2/0x1040 [ 774.525424][T14864] __get_user_pages+0x947/0xee0 [ 774.530664][T14864] __get_user_pages_remote+0x13a/0x5b0 [ 774.536768][T14864] pin_user_pages_remote+0x58/0x80 [ 774.542273][T14864] process_vm_rw_single_vec+0x17d/0x460 [ 774.548808][T14864] process_vm_rw+0x347/0x4e0 [ 774.554426][T14864] ? do_anonymous_page+0x411/0x8b0 [ 774.562013][T14864] ? fsnotify_perm+0x59/0x2e0 [ 774.566771][T14864] ? __fsnotify_parent+0x32f/0x430 [ 774.572412][T14864] ? get_pid_task+0x8b/0xc0 [ 774.578412][T14864] ? vfs_write+0x50c/0x770 [ 774.583411][T14864] ? __fget_light+0x21b/0x260 [ 774.589586][T14864] ? __cond_resched+0x11/0x40 [ 774.595381][T14864] ? fput+0x2d/0x130 [ 774.599579][T14864] __x64_sys_process_vm_writev+0x76/0x90 [ 774.606070][T14864] do_syscall_64+0x4a/0x90 [ 774.610957][T14864] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 774.618631][T14864] RIP: 0033:0x4665d9 [ 774.622952][T14864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:16:37 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xffffffbd}, {&(0x7f0000000300)="66530700ae897094e71b0fa1f147a8378f3657090086db93aa6ed9cbc6a9e00b9e626aa995d66b90c80715a567dafe306f08f54e1b35a24afc9984d6e610c53318fd861ff11495d58553d8c11c606e137347bfba5b513a63d13f122ccd3baf184fca6fe5347f26a566833fe1f9c73899301d879b51000000000000000000006f2e44ef2502ce3aa941c43aa20abc67ecfef536ed16eb8badc6a3478e0d0cd0b0c80dec4592b57c981a70f4e98012aba40abe827ae48e2d7a276658125ce7840485080fc70c235c4320ebacdd93b359f02892f7208b7822c413d961d2f8ae16cb7b963a845775eea000001e000000000000ff00000000000000000000000fada379c5fe4cedf5c6e38c4d896420000000000000001b5bc640fac014f98ab8d6d1cf8586ffdc690a986d4923d37b5fdc62cc2626c69c842f413a1cf4f7d2ea47ae426d13af40806661f4420f10562b05dc0be4ca0339947e5012419b36712bae5235ebb2da99fec54668a34523bedbab1c1b68204ba9cea9215a1d914371c62f7d9c55ef0462917c6ef8cdc723b6b05cabdb01f310c10c76543eca57a794db3f91d5264860f1eefcf8891051312abf3465", 0x1b0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) ptrace$cont(0x7, r0, 0x7, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) tkill(r0, 0x2a) 13:16:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x1000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 774.646612][T14864] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 774.655683][T14864] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 774.664979][T14864] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014c2 [ 774.673679][T14864] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 774.682589][T14864] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 774.691339][T14864] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:37 executing program 3 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:37 executing program 2: unshare(0x8020600) r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f0000000080), 0x100000001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$NFNL_MSG_CTHELPER_DEL(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x2, 0x9, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x20}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x80000000}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8094}, 0x40080) [ 774.718300][T14869] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 774.734648][T14866] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 774.760358][T14875] FAULT_INJECTION: forcing a failure. [ 774.760358][T14875] name failslab, interval 1, probability 0, space 0, times 0 [ 774.774631][T14875] CPU: 1 PID: 14875 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 774.790408][T14875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.802992][T14875] Call Trace: [ 774.806981][T14875] dump_stack+0x137/0x19d [ 774.812762][T14875] should_fail+0x23c/0x250 [ 774.817655][T14875] __should_failslab+0x81/0x90 [ 774.823096][T14875] ? alloc_fs_context+0x46/0x500 [ 774.828920][T14875] should_failslab+0x5/0x20 [ 774.833830][T14875] kmem_cache_alloc_trace+0x49/0x310 [ 774.840618][T14875] alloc_fs_context+0x46/0x500 [ 774.845707][T14875] ? security_capable+0x91/0xa0 [ 774.850984][T14875] fs_context_for_reconfigure+0x42/0x50 [ 774.856711][T14875] path_mount+0x1212/0x1ce0 [ 774.861943][T14875] __se_sys_mount+0x23d/0x2e0 [ 774.867070][T14875] __x64_sys_mount+0x63/0x70 [ 774.872357][T14875] do_syscall_64+0x4a/0x90 [ 774.877843][T14875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 774.884384][T14875] RIP: 0033:0x467afa [ 774.888800][T14875] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:16:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0xfffffff0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 774.911119][T14875] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 774.920843][T14875] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 774.929242][T14875] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 774.938242][T14875] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 774.947360][T14875] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 774.956862][T14875] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:37 executing program 5 (fault-call:4 fault-nth:6): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:37 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x40030000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:37 executing program 3 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 774.970056][T14879] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 775.026662][T14893] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 775.035534][T14894] FAULT_INJECTION: forcing a failure. [ 775.035534][T14894] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 775.044339][T14897] FAULT_INJECTION: forcing a failure. [ 775.044339][T14897] name failslab, interval 1, probability 0, space 0, times 0 [ 775.050008][T14894] CPU: 0 PID: 14894 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 775.074948][T14894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.086283][T14894] Call Trace: [ 775.090386][T14894] dump_stack+0x137/0x19d [ 775.096381][T14894] should_fail+0x23c/0x250 [ 775.101880][T14894] __alloc_pages+0x102/0x320 [ 775.109280][T14894] alloc_pages+0x21d/0x310 [ 775.114930][T14894] pte_alloc_one+0x29/0xb0 [ 775.120332][T14894] __pte_alloc+0x2f/0x210 [ 775.125072][T14894] finish_fault+0x138/0x2e0 [ 775.129687][T14894] handle_mm_fault+0x13d8/0x1a70 [ 775.135727][T14894] ? pud_huge+0x9/0x20 [ 775.139967][T14894] ? follow_page_mask+0x3f2/0x1040 [ 775.145685][T14894] __get_user_pages+0x947/0xee0 [ 775.150805][T14894] __get_user_pages_remote+0x13a/0x5b0 [ 775.157313][T14894] pin_user_pages_remote+0x58/0x80 [ 775.163075][T14894] process_vm_rw_single_vec+0x17d/0x460 [ 775.170356][T14894] process_vm_rw+0x347/0x4e0 [ 775.175226][T14894] ? do_anonymous_page+0x411/0x8b0 [ 775.181230][T14894] ? fsnotify_perm+0x59/0x2e0 [ 775.186084][T14894] ? __fsnotify_parent+0x32f/0x430 [ 775.191652][T14894] ? get_pid_task+0x8b/0xc0 [ 775.197115][T14894] ? vfs_write+0x50c/0x770 [ 775.202228][T14894] ? __fget_light+0x21b/0x260 [ 775.207536][T14894] ? __cond_resched+0x11/0x40 [ 775.212959][T14894] ? fput+0x2d/0x130 [ 775.217696][T14894] __x64_sys_process_vm_writev+0x76/0x90 [ 775.224137][T14894] do_syscall_64+0x4a/0x90 [ 775.229865][T14894] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 775.236476][T14894] RIP: 0033:0x4665d9 [ 775.241115][T14894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 775.266035][T14894] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 775.276379][T14894] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 775.285635][T14894] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014c5 [ 775.294132][T14894] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 775.304218][T14894] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 775.313930][T14894] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 [ 775.324157][T14897] CPU: 1 PID: 14897 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 775.335547][T14897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.349214][T14897] Call Trace: [ 775.352588][T14897] dump_stack+0x137/0x19d [ 775.357540][T14897] should_fail+0x23c/0x250 [ 775.362328][T14897] __should_failslab+0x81/0x90 [ 775.367809][T14897] ? legacy_init_fs_context+0x2d/0x70 [ 775.373326][T14897] should_failslab+0x5/0x20 [ 775.379447][T14897] kmem_cache_alloc_trace+0x49/0x310 [ 775.385707][T14897] ? kmem_cache_alloc_trace+0x215/0x310 [ 775.392711][T14897] ? alloc_fs_context+0x46/0x500 [ 775.398963][T14897] legacy_init_fs_context+0x2d/0x70 [ 775.404659][T14897] alloc_fs_context+0x419/0x500 [ 775.410354][T14897] fs_context_for_reconfigure+0x42/0x50 [ 775.416604][T14897] path_mount+0x1212/0x1ce0 [ 775.421793][T14897] __se_sys_mount+0x23d/0x2e0 [ 775.426842][T14897] __x64_sys_mount+0x63/0x70 [ 775.431898][T14897] do_syscall_64+0x4a/0x90 [ 775.436537][T14897] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 775.443125][T14897] RIP: 0033:0x467afa [ 775.447358][T14897] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 775.469152][T14897] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:37 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 775.479227][T14897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 775.488828][T14897] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 775.497312][T14897] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 775.505892][T14897] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 775.514837][T14897] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:37 executing program 3 (fault-call:2 fault-nth:10): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 775.541625][T14901] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 775.562323][T14878] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 775.566356][T14906] FAULT_INJECTION: forcing a failure. [ 775.566356][T14906] name failslab, interval 1, probability 0, space 0, times 0 [ 775.591308][T14906] CPU: 1 PID: 14906 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 775.603836][T14906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.614748][T14906] Call Trace: [ 775.619499][T14906] dump_stack+0x137/0x19d [ 775.624491][T14906] should_fail+0x23c/0x250 [ 775.631144][T14906] ? ext4_remount+0x53/0x1840 [ 775.636039][T14906] __should_failslab+0x81/0x90 [ 775.640224][T14910] FAULT_INJECTION: forcing a failure. [ 775.640224][T14910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 775.641663][T14906] should_failslab+0x5/0x20 [ 775.661791][T14906] __kmalloc_track_caller+0x64/0x340 [ 775.667246][T14906] kstrdup+0x31/0x70 [ 775.671410][T14906] ext4_remount+0x53/0x1840 [ 775.676360][T14906] ? __cond_resched+0x11/0x40 [ 775.681630][T14906] ? __dentry_kill+0x456/0x4e0 [ 775.687389][T14906] ? shrink_dentry_list+0x54e/0x580 [ 775.693185][T14906] ? list_lru_count_node+0x28/0x30 [ 775.698971][T14906] ? shrink_dcache_sb+0x29d/0x2d0 [ 775.704609][T14906] ? ext4_statfs+0x6b0/0x6b0 [ 775.709744][T14906] legacy_reconfigure+0x8e/0xa0 [ 775.715626][T14906] reconfigure_super+0x2d3/0x4f0 [ 775.721473][T14906] path_mount+0x1442/0x1ce0 [ 775.725999][T14906] __se_sys_mount+0x23d/0x2e0 [ 775.731093][T14906] __x64_sys_mount+0x63/0x70 [ 775.735861][T14906] do_syscall_64+0x4a/0x90 [ 775.740752][T14906] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 775.747306][T14906] RIP: 0033:0x467afa [ 775.752073][T14906] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 775.777194][T14906] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:37 executing program 5 (fault-call:4 fault-nth:7): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:37 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 775.787141][T14906] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 775.795905][T14906] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 775.804920][T14906] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 775.813544][T14906] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 775.821613][T14906] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 775.831930][T14910] CPU: 0 PID: 14910 Comm: syz-executor.5 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 775.839237][T14907] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 775.844604][T14910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.844627][T14910] Call Trace: [ 775.844634][T14910] dump_stack+0x137/0x19d [ 775.871859][T14910] should_fail+0x23c/0x250 [ 775.876289][T14910] should_fail_usercopy+0x16/0x20 [ 775.882080][T14910] copy_page_from_iter+0x2bf/0x560 [ 775.887717][T14910] process_vm_rw_single_vec+0x294/0x460 [ 775.893974][T14910] process_vm_rw+0x347/0x4e0 [ 775.899433][T14910] ? do_anonymous_page+0x411/0x8b0 [ 775.905393][T14910] ? fsnotify_perm+0x59/0x2e0 [ 775.911282][T14910] ? __fsnotify_parent+0x32f/0x430 [ 775.916878][T14910] ? get_pid_task+0x8b/0xc0 [ 775.921793][T14910] ? vfs_write+0x50c/0x770 [ 775.926501][T14910] ? __fget_light+0x21b/0x260 [ 775.931495][T14910] ? __cond_resched+0x11/0x40 [ 775.936387][T14910] ? fput+0x2d/0x130 [ 775.940846][T14910] __x64_sys_process_vm_writev+0x76/0x90 [ 775.946906][T14910] do_syscall_64+0x4a/0x90 [ 775.951717][T14910] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 775.959348][T14910] RIP: 0033:0x4665d9 [ 775.963500][T14910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:16:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x2}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:38 executing program 3 (fault-call:2 fault-nth:11): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 775.986455][T14910] RSP: 002b:00007f29c06d3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 775.996146][T14910] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 [ 776.005290][T14910] RDX: 0000000000000003 RSI: 00000000200007c0 RDI: 00000000000014c8 [ 776.014691][T14910] RBP: 00007f29c06d31d0 R08: 0000000000000002 R09: 0000000000000000 [ 776.024402][T14910] R10: 0000000020000d80 R11: 0000000000000246 R12: 0000000000000001 [ 776.032803][T14910] R13: 00007ffd646b5e8f R14: 00007f29c06d3300 R15: 0000000000022000 13:16:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x9) fallocate(r1, 0x0, 0x0, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004800)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000006800050000000016d0010200f5a64f00", @ANYRES32, @ANYBLOB="043e04"], 0x1c}], 0x1}, 0x0) write$binfmt_misc(r3, &(0x7f00000001c0)=ANY=[], 0x1000000c8) splice(r2, 0x0, r4, 0x0, 0x10014, 0x0) 13:16:38 executing program 5 (fault-call:4 fault-nth:8): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 776.062726][T14918] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 776.079253][T14923] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 776.109960][T14927] FAULT_INJECTION: forcing a failure. [ 776.109960][T14927] name failslab, interval 1, probability 0, space 0, times 0 [ 776.124414][T14927] CPU: 1 PID: 14927 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 776.135546][T14927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.146386][T14927] Call Trace: [ 776.150617][T14927] dump_stack+0x137/0x19d [ 776.155219][T14927] should_fail+0x23c/0x250 [ 776.159924][T14927] __should_failslab+0x81/0x90 [ 776.165568][T14927] ? ext4_register_li_request+0x102/0x690 [ 776.171562][T14927] should_failslab+0x5/0x20 [ 776.178367][T14927] kmem_cache_alloc_trace+0x49/0x310 [ 776.185098][T14927] ? __flush_work+0x492/0x530 [ 776.190721][T14927] ext4_register_li_request+0x102/0x690 [ 776.196571][T14927] ext4_remount+0xf31/0x1840 [ 776.201259][T14927] ? ext4_statfs+0x6b0/0x6b0 [ 776.206293][T14927] legacy_reconfigure+0x8e/0xa0 [ 776.211512][T14927] reconfigure_super+0x2d3/0x4f0 [ 776.217495][T14927] path_mount+0x1442/0x1ce0 [ 776.222099][T14927] __se_sys_mount+0x23d/0x2e0 [ 776.226974][T14927] __x64_sys_mount+0x63/0x70 [ 776.231645][T14927] do_syscall_64+0x4a/0x90 [ 776.236495][T14927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 776.242542][T14927] RIP: 0033:0x467afa [ 776.246605][T14927] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.268090][T14927] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 776.276929][T14927] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 776.286836][T14927] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 776.295262][T14927] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 13:16:38 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:38 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 776.304080][T14927] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 776.312790][T14927] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 776.342845][T14927] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:38 executing program 3 (fault-call:2 fault-nth:12): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x5}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 776.360794][T14942] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 776.390917][T14948] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 776.416564][T14953] FAULT_INJECTION: forcing a failure. [ 776.416564][T14953] name failslab, interval 1, probability 0, space 0, times 0 [ 776.430184][T14953] CPU: 0 PID: 14953 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 776.441719][T14953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.453182][T14953] Call Trace: [ 776.456469][T14953] dump_stack+0x137/0x19d [ 776.460999][T14953] should_fail+0x23c/0x250 [ 776.465755][T14953] __should_failslab+0x81/0x90 [ 776.470921][T14953] ? ext4_register_li_request+0x2b0/0x690 [ 776.476832][T14953] should_failslab+0x5/0x20 [ 776.481360][T14953] kmem_cache_alloc_trace+0x49/0x310 [ 776.487073][T14953] ? ext4_register_li_request+0x102/0x690 [ 776.493161][T14953] ? prandom_u32+0xfc/0x180 [ 776.497849][T14953] ext4_register_li_request+0x2b0/0x690 [ 776.504305][T14953] ext4_remount+0xf31/0x1840 [ 776.509025][T14953] ? ext4_statfs+0x6b0/0x6b0 [ 776.514417][T14953] legacy_reconfigure+0x8e/0xa0 [ 776.519534][T14953] reconfigure_super+0x2d3/0x4f0 [ 776.524789][T14953] path_mount+0x1442/0x1ce0 [ 776.530217][T14953] __se_sys_mount+0x23d/0x2e0 [ 776.535228][T14953] __x64_sys_mount+0x63/0x70 [ 776.540675][T14953] do_syscall_64+0x4a/0x90 [ 776.545408][T14953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 776.551304][T14953] RIP: 0033:0x467afa [ 776.555532][T14953] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.575846][T14953] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 776.584909][T14953] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 776.593430][T14953] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 776.601820][T14953] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 13:16:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xd8}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 776.611381][T14953] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 776.619686][T14953] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 776.638292][T14956] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x6}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 776.667808][T14955] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0x200002c5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x7}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0xfff, 0xa, &(0x7f0000000780)=[{&(0x7f00000000c0)="67453872ccd779fc0eb07979ad1f9274bb7f7a4c652a676ce0abe9793f372c05511a33bf6d0f41e77b5a64adfa12328c64769027ceb1344394b7175c7a0ca217c9ac27d83ea831f3f77fdb42f4d67b6f49305f3683c6aaa8150fd7d2781b3e7a8d39694c219d88286092fa1a5e1000072737c75de6f1659c89faa6bbb6586fbb642a45615384eeabe1e9cf62a2faf91dff1be3c5", 0x94, 0xa0000000000}, {&(0x7f0000000180)="655f164d2b711e29d7f3eb872e3de11d2576b0d33440bcfd2a92c4541ac22076f21b23a819c7867602b6ba0deeeb02a4c0c9c096bc6f9f1e422e382b254c8d408f46eff687166ea15de10bf63a3e01c76600df1004620dbaaea666558f8d70e9a347bd40cc7dda3ef6a346248e376356df45ff5fea56bb575d9562c7be056805c52a3de85b445a5710784036", 0x8c, 0x6}, {&(0x7f0000000280)="19495d35a1ed8172c0cd14e045c75192d72507d4db413ed14acfc22e7d6b29635edaefc1e39ff62b4b9ae8a3994f071e3063633a153660ef28d5f89669c6b289fab75aa1167a3b63300bec8cca4569fa94f5f8a32e5a", 0x56, 0x3f}, {&(0x7f0000000300)="3d6fd7668f10d850bc417abdffb473aa9d62df5ba7c8427b29650c62c569b066e7e710763d72aaabd7fae383ad1fbcfd128e93f5217fec4b59b301cc5f999a01bdc216db94d65fac39640baffa5048a311768954104e858fcfb2436afe15c31e32114e2b560ee38ed7a906448c7549caf765d59aac96de3da1c47c229f150fc47fb3383adf4ee01eee0ebcfa3df28f2e0541d8403844e02b09c1d907249affe40d9ca6259806cd4e1a44dfd06eeee2e9315c6b3aba556953b0831bab6c631894555dc5855b11d2eb3c25933ad1ae48ff90a8964cbc985c9b04dbc51396c32cc4c29eaab0c9657ca3419b114f37ce96cc03a32e77", 0xf4, 0x20000000005}, {&(0x7f0000000400)="b9e69ffdd1ce70251cc754639e557eb81a658f2f18bee996afa53741cb483c1dbdb2d52fe2f4cec215de6d72ea91383ddedbe0a72bf421505d97dafad20b69f4fee1be20c4254a55f1dc13e589d5545abd82b8085566e708782f19c50b8d22346e51f44966a22c594e826f4929b77878e9f66474da6c5e836d552e02ce1605e6e762b2ebfa9e2ca69298d628a391bb879d989130", 0x94, 0x9}, {&(0x7f0000000b40)="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", 0x170, 0xffffffff}, {&(0x7f00000005c0)="c17dd4c0dfffdad9c8f98894071eb0fe893122c811852282579388e7363293eef583741095108e3fff388df30fe7a1cdc64e16c1c6e40a41cc9a980c7b0bd2120029c00a24aa84be824c990f56e19fe628cfcf6b0fd2a59d942661af", 0x5c, 0x9}, {&(0x7f0000001600)="baeea470a427ccc499ea20dffa8937bb3796854537803bca05c7173ffa0653437b0bd528f801b976ccbaf9786f495087bab98209e24d3d303fd7164246ec6e7ad30bcaf4ce5a7c5f1295e1d0493a0de595f0efdf3248ddf5ba8483c69fecbd08fa61a8b80ffd25b668a2df6d96d4542244a2cc73cc1b96d03c21c5f8f68b7e370a4d83d52a2ae3ada46d789d6b305becf3cec9d3b2be6ac6920951a793b58a98676e89b07caacda2b61efad2bf7d11da6c9bdad2e543bdf7695328e2d549de23fedbf70ef7d6b1500a9f3f88fad6fefba3295b1c1c6234a6dfe8594d43fa1f9d9930100ec2ba44848f70efe53e708396163826799ac36934fbc142dc3e13cf616841377537591cc3f941d2d941c204cc0c9cf43f9c82218c6397a671a5bb3ab01ab2099f9c658ea211b9a8061a8fb9690a71f2ae6e4d849b0ea1a9bb72a508c97b22b551b2225dc9c54f82ec1768c80e3e25c1e30499b673f0c28a292fc5395f89ae1dad42f5290a0e1571ed73bdcfc210d43f6692b55bf1cdf7e1cb53e3d4b83bfad5969550ee0bcfea1254a1eb03783013e0b8be4e6bca4575260a140309b37f38fc36ea95e32b1e94e69fb9ebe786c37d3decc3e3dba2eb58b12cf96bf9034e7eb038d4fd9a3fbf907b433bef8cd84335afa3398a158f998e4d854d37249583aa94de68254268c8a4874015c68220b45e1b829d869581d7353c4ca7bb45447515120042934cfe3c1a7141656f359773ed64b9cdcae103fa2cd5c1cec43714621d2b333fd50f159c4a397337f3d2fc77febd4a6b37fe9b1d1d8bba07434fc38db4f5b131bae793f2f04190e4417473d84ec853e6d8830d6b6b23ac7625c482fce295650bd15d505d11a284b3678170f60ef4542e7ec02fd226556cf3c7004bcde5fc37674c2c27abc76f5114a46a8f71bd04b8e4d3802de2e62d59411065d684fb08af123aae7d602645704521e89ea36e182f7fc78b9dafa15a858b77f4e2e86c364ce9e89a4345cac647004e8e3ea51af27d546bced660858972ceba279625c60ad9cd1c37bafd122cb8b5a82418644d7d469cd3ecd4721a4b1bf6a05eea8f3d0f982d6b284c9fd208fbc9b996b1df4fe7f844008bb65164fd478a449233726bfc5b907e1beca339b4cf97cdbfdb3ebd394795737beefef6987d6d56916b2d870c7f05afbb8d0b0d02ca2b8ad966fcb42d90749befe35535cc7fa3b3a3ddb410c4ffad029c7d4e3e44646f7af1d11ef02132e72d5ec0e804824740ed179b23ffad90babd20d2e87a2d6ffcac300abcbf946a84ebe73bc85583e1f61d6de6b2270fb7da429d467c65d344c2091ea3fc45df0d48c9ae9f40ea4f74357f81724dc11b5b25a8d299b3218fce425b3904b628d2c80245d9683a2695192ad506c9397bb188cd42769dc173da2b5ed23257aa067fc82838e67d2f231d40bcbf5ca351618468dc80fe0a6959ba0507dd262267cc2ad27b080e13a451fe0166c3bce52f9088bcf6de3f4b47cda73936161cd669210e35e6a60eb57bf0bf0206bb624385d29ca26dd7dc44928636ae43f07745ca480aaa059a3093c34759aa8670cf4f7b0fb47023c1992bfdc67631efd84a17ca18ca91ca8e0596a924ff1329a78f54ee4a246007f642fa0b2277ba3b12ea8e9ae04a18c8b9583eef733434b34c70bebeb270c5256c7fda2b0ae667236b9046347a7af6905d4f09b2a011496a868c1b8692aaeadea51a0bb0e26f03dcb6f0788041164ad9e5d7a4bf098e829543a606e9b25f3a152f6c852faa77aabd946477873e33955b4d6f5984eecd1c3cc3a9b752b2b59103d7b646a374936362a55dff1169900330671dadacc4de457cfbbf0f8e9d1914bb164c53dd6a98ff4ff4026200210ddc27c4b5a0d0d13f76f35dad419c74fbdc521d600bc7a7a875ab2bd4c791031939755aac4e5fdea12d4ea1db0682d9e137162ee7d066cc4323631c21ae9f6308f970af77eb8ffb0d0076820cbc82c7745a10e57ba9d05ef396e0e882cd122892b9d483e440f0a49fe511cc7e1716a7604fc88447634cf23e60bf8cb26d72ec42e561144fd40ff889891bc6484557f97a28f92cdb9e47f60581c45b57ab0ca7c492183c66030f3329b0f1f35113772ed2d107fab7c01eec788a2fc54d62c67e1de425fc6a35dbb28c6ec72b7a179f97f50dd8f894ecbf57338f255a67a5fc32bffe5ab176f631f3e9c8e2e317abc12dc4b6ac0201d1cf3b9221a0b5ff763761661b59957f86797384c2d456be3cddb1a9da1e9e617614abfc9d4825b557481b3c2415389a8f2fe5e7643407ce2529166bf5b9736416a719e3a80b75c442d3adac5d4024428b2264ceaae61f02513e2720fed8affabeb836344416925876de90fd5a001e9af6998f61fa52432c07a0aecaff90b0c877c62752e2d688114860205166eaf9170baba69cc4d08edc2e7c275d66a7fa3f4d9b852a796265de135e218b45b7ffc385c2470a2e2853af46f53008cc885a37722587ed65c3db82ecf4c1479b8b5f39a73353202bd6a0830c1537444250a5d6963fc11aafd95872af92198e856b2802468cd1a09d16b275ee37a71c9ea475bd27d9a0f6c57fd25b98edd7779e9b84a6c0da5dbe286547bce928979b7b4bc51bae30f11e425739cd467a114705288ef8e564e1c73961f1dd0809fdad40fbcb7f3e04c24849099207df8fba199c5dd62111da865f5fa3cb8552e0ecc168738c771ff6ba631d9fe98102724c0347c28d50cb8ff8ad27a2c3d4f5eada6c4f78612a629d41040c25270bbe0bb9e740593dff27556855a184b18f942241576895d1ca7dd7efc9ffe0f23c7b918420cd151ee5ce48a885a0fb6f2260dad27c9b2b32a893e4b6deea17aa21c16f87e9dc506d9b2816c46dff3141f3989355110f1fd3c3859971b3e0b8890df6f9571da556a079e68fc94a3576219dc9a80d4287b247c6493d915264f96e5d8295fc3934db0a78cd5b0251e7b9d0e5d3c6c0a97f985344c5ad53e8ededb2aa8267457bc178b6faf661bd60e66dd1506cde6f1f20febd7ab73d9771ed93c997d93ac9fb08f172c1b032ed8b2b2d213ec80d5370c69e5ea8f04d6da80015a341bcb347081afdf212f1937b7d38745e255fb41c2722e6230364778c96f54d571b1c1127ff818713f0594885a63913f44d35d476afa0b4be53a7403811601648f46341ce9e978cd75cece2a599b01ee2447ba3b183f97d10dc9e057ced9c3254e501f1d72d7dbac628412345b0312e43b2c17039877a8d18e5624f69a74387428a53b8e5bbfb0837de6f2b3536846e95b78a1d56bdc4a095ed146bb942ad9b5435fbeb3352f98675cc899147bf7bb8a8b452b29ec9c28f127d9d54496814c33bbdda940e5b34ded1fa7818ce7fbf8e71bfbfbaac88cc664f4d3ab77b6c393ee081e2866cf58a4800030689dd34879f09b7ce8057679f7dae999b5129b30afd89b92ba085f10c4a451f834e0b950d47d28d69534fc353e018a143e3b1bdd47141a49f70fc214fb0df0968463ec5f8e72a60241abe67fb4d0752f41b91cfb0cc1ad4dcefee130d77d5d02d2d9f98b52b9b9bd44f0236122303f753a646c33999a0e5b6c7a7f94586cddc6c96b2a38f600749d0dc5e26a5dee429c6832751d6593901bd7b577ae0b88d3f3acba40a2bf517d7ac95104d50ccd3b4b65ef5351676aa10480f3e24d3e2866435bdf05a3d1cbdb50fce68cf7d2c2e09b03f6f32d626d96a23d99c7b192f2b3a9461c1489955b6d3502fa61e7a07a25793e9ccae37489b67b816d751de6ce035dc0302b0e25bdcaa29efc9f3a8d20e4a4097db422df6fc8c4dcbba8c42aaf57bf49ea2106cdbe35c7feb4a048a5f8f0bcdd636f983c0f154f5afcf103c0ada0e020043982ba6c1ae820f8f1c200d2a9746ffb82c59c17e039aed15c7596d0fb784e2a7bcfcd10ae3e12f60b4b16b1fc61d9bd69fae586c584f1c581d340536f58ace237e3797bfff99d3eec9e0698a3253f82da8f1e77b235af7dcdfaeb9cf3d714c2a6164caa66ed6342af72e9f0b348073dc052174e97a187a34a7d92729bf975cf8a553f9bb26b4fa9237a1e4bf2469b1aa8d8d9102bfa6e7fbe5894454702cf5f0a1601ad89adb5d61160932158d8afd0805cfdcdf0a8c35eaa127b1e61182c91f501dccff25850fd49bf17359f4a19645af4b3790d7955d42c2791d9e98db885757fad6ab4f3eec947c1b542793d03d06b6d3a798bdf18e467ee35c5907239b55f587f47fb00fa1379c778b5715c67d6d7dd60b27a435ee051a6420103120243440cb63794d84f154b5440807aa09ad95b2b9868a358366216cfff78ba2152930e4e780e5d6ac9edfacfd4da67ad83c8cf8ef793c5f7095f53e7abf73f27992be25901b489f3e195fd82cb50bc359021bda2d7f9e825ec447376e046f39621f0b9130bd0fbec91bb147cbdd1e7c66dd20323ff4df71ed5bf4d7be6fc02bbb1c553aed94dbd29c040ea1c46d6d1bf45447c6fa9a1c951632d841ce96714f592f0834fae6b38ca09c823b6efa669c7078fe36c7c8dd4835c433a87d77d78fb292f183cc09eca0a6fd2dc0eea8274fd84bba2e7dd341cf29da67aeac478fbcf592859f0c8a7be8ed97acc18685b3edf1ef4a8d3e235c38c7e6f3150857c13318c82d50d8b3b55194fee2adec736a51c9fc666236c8efc7193e7e97603a83fb48abbe018d9ce20a21cd6aabcc8e0258794c23b3a4d8d5db857caf1bb6d75ca97a1bd4b79fb128bf6effb1154ba457b9f131be17e60f1fe28d53e0b8463c6d90a600be18ac37627fb2be78f9a38ecb8dd438bfbae99c155fda2238e64c01d2a94b8a5b58c9fef37845dc25d44148a21424e8c5462268b835ca78e4bd5a93abde681eb5ac90a008f2ca402a06e1dacaf1c335342aa9e461cc07d4445b6397b9fdf9691d523082ee9143c7fbd58c3d9c41405d1f7e15cfc89388a1e3b60443195345c8ec1a48556e1c2c8af170e0c1d51ab9fe98557bec94071ed739d3736d9736b71140675a3d49e1479c81e589624b62ca5e777987698b4bafd6c15ccb8b0b46da20536038e1172db3aebb9aec87ce54394e6292a9265ad498684c4d08259526f4ce42aaa72489e47cbd1826a70ded2226e899abc2c7565eae741a15355cd677de26718a7b605da4d4e20925c04de6773d3bb2779e376de5e6d32b77f02f31e0b6041ca63acf72c2febace3534f37cabe5d7824bd2065d630d3a1b9f94b43a1ba7e20d55616a08f64f29501173665704e083f9e22b2e2267b61178980a51142c11cfc664e7b8a22be7b91c0f3981141fdb199b5d460ff4dced379fb9444c68575e96970c13f0a265979742a724715f0da78c8fe7b564eb844e04ccc00652102e49c232933c2f7834a3a013a7cdd90a08aeb648073037867ea67b44ff5c61f1fef4bbe24482740a3149dc96af04f2dae491944ed0347ab040081a5c67e17c44c3e6bfed6f1c240f476b4529d3d3bb1386163f5c80ce045c50ca70d3207d684106ea5438715e7818ea5d90210689a0ae9f744488a7526a2876e25279695f44492e23fb3d401481418eb3517ff705f387aa2dd9b8c17f0fabf83eadd6850d909cf6c7b98e21fcfac5cc63bf506644ec6e2c4d66faf464814d964a2fe2964de1f6fd059f9ca61a8eaed5262e0b1c27d6dee865d189b001fd187d4d209f69110c2b60aa3771655b3a8839b9120ce001e7618c4023dcba75cc266cdd7c549d3bcf4fc72c5c381f87bd56b5c5780bad9ad044d3637eecdb779dfb7f09e8fc763e87d70371cb0878891ec9c945", 0x1000, 0x6}, {&(0x7f0000000640)="5b143af8134b0792d22c939bf31d451fac7eaf9626a296ddcbf98b3c28b696fec17f14695bb12c2d1fa4189c406af1cb9756", 0x32, 0x3}, {&(0x7f0000000680)="4c555c83c9cb0c6462cdbfdbe9c3c8c11eeced9194e688bfc8a5c0896a98db249ded66f12d98827c868ee6666f55daf6ff9e871d9a197c796f8460e508f328b556d37d93fab3c3de606551e8535973417dd586c31a644c52bef07555c22522785454a2e333583338b8163add877394a851a5fb4b58b795ed8278c38073bf16381c55d45c8db710372c82436bb99d9674d4b2a0953c02086f4d783e247ec275962e8dc70392d4304b263f644eaa250cc73e1116ffaffd56a22ae2d4941ac8e33826f735f853a7b21d0d294f887dfbb701e55b951da55101c8f3204de8b5b09f2a15d4b70c522becac3c6564fb", 0xec}], 0x2000000, &(0x7f0000000880)={[], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@smackfshat}]}) preadv(r1, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/165, 0xa5}, {&(0x7f0000000a00)=""/240, 0xf0}], 0x2, 0x9, 0x7fff) r2 = syz_open_dev$evdev(&(0x7f0000000240), 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80104592, &(0x7f0000001500)=""/237) 13:16:39 executing program 3 (fault-call:2 fault-nth:13): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 776.974270][T14988] FAULT_INJECTION: forcing a failure. [ 776.974270][T14988] name failslab, interval 1, probability 0, space 0, times 0 [ 776.993117][T14988] CPU: 0 PID: 14988 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 777.006363][T14988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.016874][T14988] Call Trace: [ 777.020512][T14988] dump_stack+0x137/0x19d [ 777.025164][T14988] should_fail+0x23c/0x250 [ 777.030071][T14988] ? ext4_journalled_writepage_callback+0x120/0x120 [ 777.037045][T14988] __should_failslab+0x81/0x90 [ 777.042330][T14988] ? __kthread_create_on_node+0x7a/0x290 [ 777.048564][T14988] should_failslab+0x5/0x20 [ 777.054046][T14988] kmem_cache_alloc_trace+0x49/0x310 [ 777.060531][T14988] ? strcmp+0x23/0x50 [ 777.065004][T14988] ? ext4_journalled_writepage_callback+0x120/0x120 [ 777.072683][T14988] __kthread_create_on_node+0x7a/0x290 [ 777.078538][T14988] ? parse_options+0x14b4/0x1860 [ 777.083854][T14988] ? ext4_journalled_writepage_callback+0x120/0x120 [ 777.091316][T14988] kthread_create_on_node+0x72/0xa0 [ 777.096949][T14988] ? kmem_cache_alloc_trace+0x215/0x310 [ 777.103644][T14988] ? ext4_register_li_request+0x403/0x690 [ 777.110049][T14988] ext4_register_li_request+0x426/0x690 [ 777.115904][T14988] ext4_remount+0xf31/0x1840 [ 777.121285][T14988] ? ext4_statfs+0x6b0/0x6b0 [ 777.126153][T14988] legacy_reconfigure+0x8e/0xa0 [ 777.131093][T14988] reconfigure_super+0x2d3/0x4f0 [ 777.136560][T14988] path_mount+0x1442/0x1ce0 [ 777.141339][T14988] __se_sys_mount+0x23d/0x2e0 [ 777.146678][T14988] __x64_sys_mount+0x63/0x70 [ 777.151567][T14988] do_syscall_64+0x4a/0x90 [ 777.156619][T14988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 777.163906][T14988] RIP: 0033:0x467afa [ 777.167969][T14988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.189045][T14988] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 777.199999][T14988] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 777.208489][T14988] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 13:16:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x8}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:39 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) r1 = socket(0x28, 0x800, 0x7) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000280)=@buf={0x18, &(0x7f0000000240)="c3b70b6b777c01223a8267c59f077648e88cbbd2cf785b5e"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0x7, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@mcast1, 0x56}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000100)={'ip_vti0\x00', @ifru_mtu}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r1, 0x9, 0x80000}) [ 777.217533][T14988] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 777.226479][T14988] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 777.235183][T14988] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0x7ffff000}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x9}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:39 executing program 3 (fault-call:2 fault-nth:14): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0x13}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 777.310290][T14988] EXT4-fs: error -12 creating inode table initialization thread 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0xa}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 777.396255][T15025] FAULT_INJECTION: forcing a failure. [ 777.396255][T15025] name failslab, interval 1, probability 0, space 0, times 0 [ 777.410228][T15025] CPU: 0 PID: 15025 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 777.422713][T15025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.433588][T15025] Call Trace: [ 777.437123][T15025] dump_stack+0x137/0x19d 13:16:39 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 777.441741][T15025] should_fail+0x23c/0x250 [ 777.447354][T15025] ? mempool_alloc_slab+0x16/0x20 [ 777.452849][T15025] __should_failslab+0x81/0x90 [ 777.458200][T15025] should_failslab+0x5/0x20 [ 777.463041][T15025] kmem_cache_alloc+0x46/0x2f0 [ 777.468607][T15025] mempool_alloc_slab+0x16/0x20 [ 777.474095][T15025] ? mempool_free+0x130/0x130 [ 777.478973][T15025] mempool_alloc+0x8c/0x300 [ 777.483934][T15025] ? enqueue_entity+0x47b/0x650 [ 777.489199][T15025] bio_alloc_bioset+0xcc/0x480 [ 777.494960][T15025] submit_bh_wbc+0x130/0x330 [ 777.500107][T15025] ? ext4_update_super+0x71c/0x740 [ 777.505852][T15025] __sync_dirty_buffer+0x136/0x1e0 [ 777.511339][T15025] ext4_commit_super+0x1e3/0x270 [ 777.516958][T15025] ext4_remount+0xfc0/0x1840 [ 777.521713][T15025] ? ext4_statfs+0x6b0/0x6b0 [ 777.527410][T15025] legacy_reconfigure+0x8e/0xa0 [ 777.532474][T15025] reconfigure_super+0x2d3/0x4f0 [ 777.538102][T15025] path_mount+0x1442/0x1ce0 [ 777.543184][T15025] __se_sys_mount+0x23d/0x2e0 [ 777.548496][T15025] __x64_sys_mount+0x63/0x70 [ 777.553653][T15025] do_syscall_64+0x4a/0x90 [ 777.559394][T15025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 777.566064][T15025] RIP: 0033:0x467afa [ 777.570470][T15025] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.590980][T15025] RSP: 002b:00007fc125a60fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 777.599745][T15025] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 777.608711][T15025] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 777.617897][T15025] RBP: 00007fc125a61040 R08: 00007fc125a61040 R09: 0000000020000040 [ 777.626376][T15025] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 777.634792][T15025] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:40 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) r1 = socket(0x28, 0x800, 0x7) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000280)=@buf={0x18, &(0x7f0000000240)="c3b70b6b777c01223a8267c59f077648e88cbbd2cf785b5e"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0x7, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@mcast1, 0x56}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000100)={'ip_vti0\x00', @ifru_mtu}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r1, 0x9, 0x80000}) 13:16:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xe4}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:40 executing program 3 (fault-call:2 fault-nth:15): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:40 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0xb}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0xc}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x2000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 778.198052][T15075] FAULT_INJECTION: forcing a failure. [ 778.198052][T15075] name failslab, interval 1, probability 0, space 0, times 0 [ 778.216847][T15075] CPU: 0 PID: 15075 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 778.228849][T15075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.239693][T15075] Call Trace: [ 778.243012][T15075] dump_stack+0x137/0x19d [ 778.247334][T15075] should_fail+0x23c/0x250 [ 778.251975][T15075] ? __alloc_file+0x2e/0x1a0 [ 778.256820][T15075] __should_failslab+0x81/0x90 [ 778.261687][T15075] should_failslab+0x5/0x20 [ 778.266186][T15075] kmem_cache_alloc+0x46/0x2f0 [ 778.272068][T15075] __alloc_file+0x2e/0x1a0 [ 778.276469][T15075] alloc_empty_file+0xcd/0x1c0 [ 778.281966][T15075] path_openat+0x6a/0x20b0 [ 778.286529][T15075] ? ext4_remount+0x1643/0x1840 [ 778.292714][T15075] do_filp_open+0xd9/0x1f0 [ 778.297300][T15075] ? __virt_addr_valid+0x15a/0x1a0 [ 778.303546][T15075] ? __check_object_size+0x253/0x310 [ 778.309102][T15075] ? _find_next_bit+0x16a/0x190 [ 778.314737][T15075] ? alloc_fd+0x388/0x3e0 [ 778.319589][T15075] do_sys_openat2+0xa3/0x250 [ 778.324294][T15075] ? __se_sys_mount+0x261/0x2e0 [ 778.329379][T15075] __x64_sys_openat+0xef/0x110 [ 778.334256][T15075] do_syscall_64+0x4a/0x90 [ 778.338845][T15075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 778.344904][T15075] RIP: 0033:0x4196c4 [ 778.348899][T15075] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 778.369473][T15075] RSP: 002b:00007fc125a60f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 778.378642][T15075] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 [ 778.386965][T15075] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 13:16:40 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:40 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0x200003f6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 778.395230][T15075] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 778.403691][T15075] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 778.411887][T15075] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 13:16:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0xe}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:41 executing program 2: r0 = socket(0x400000000010, 0x2, 0x0) r1 = socket(0x28, 0x800, 0x7) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000280)=@buf={0x18, &(0x7f0000000240)="c3b70b6b777c01223a8267c59f077648e88cbbd2cf785b5e"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f00000000c0)=0x7, 0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@mcast1, 0x56}) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000b0000000000", 0x24) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000100)={'ip_vti0\x00', @ifru_mtu}) vmsplice(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r1, 0x9, 0x80000}) 13:16:41 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x12, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0xf}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0x7fffef3b}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:41 executing program 3 (fault-call:2 fault-nth:16): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 779.072697][T15121] FAULT_INJECTION: forcing a failure. [ 779.072697][T15121] name failslab, interval 1, probability 0, space 0, times 0 [ 779.085842][T15121] CPU: 0 PID: 15121 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 779.096392][T15121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.107134][T15121] Call Trace: [ 779.110707][T15121] dump_stack+0x137/0x19d [ 779.115340][T15121] should_fail+0x23c/0x250 13:16:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x10}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x20000096}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 779.120134][T15121] ? security_file_alloc+0x30/0x190 [ 779.125572][T15121] __should_failslab+0x81/0x90 [ 779.130458][T15121] should_failslab+0x5/0x20 [ 779.135380][T15121] kmem_cache_alloc+0x46/0x2f0 [ 779.140425][T15121] security_file_alloc+0x30/0x190 [ 779.145802][T15121] __alloc_file+0x83/0x1a0 [ 779.150652][T15121] alloc_empty_file+0xcd/0x1c0 [ 779.155620][T15121] path_openat+0x6a/0x20b0 [ 779.161257][T15121] ? ext4_remount+0x1643/0x1840 [ 779.166257][T15121] do_filp_open+0xd9/0x1f0 13:16:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 779.170691][T15121] ? __virt_addr_valid+0x15a/0x1a0 [ 779.175894][T15121] ? __check_object_size+0x253/0x310 [ 779.181788][T15121] ? _find_next_bit+0x16a/0x190 [ 779.186817][T15121] ? alloc_fd+0x388/0x3e0 [ 779.191432][T15121] do_sys_openat2+0xa3/0x250 [ 779.196388][T15121] ? __se_sys_mount+0x261/0x2e0 [ 779.201625][T15121] __x64_sys_openat+0xef/0x110 [ 779.206595][T15121] do_syscall_64+0x4a/0x90 [ 779.211126][T15121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 779.217282][T15121] RIP: 0033:0x4196c4 [ 779.221444][T15121] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 779.242341][T15121] RSP: 002b:00007fc125a60f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 779.251187][T15121] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 [ 779.259761][T15121] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 13:16:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x7fffee45}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:41 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 779.267804][T15121] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 779.276038][T15121] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 779.284963][T15121] R13: 0000000020000000 R14: 00007fc125a61000 R15: 00000000200001c0 [ 779.301452][T15149] EXT4-fs: 18 callbacks suppressed [ 779.301467][T15149] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 779.371937][T15160] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 779.380668][T15162] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x11}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:42 executing program 3 (fault-call:2 fault-nth:17): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xa700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:42 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x25, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:42 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x187, &(0x7f0000000440), &(0x7f00006d5000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) write(r1, &(0x7f0000000080)="9472e5add0430c6c7ae258881fc8c7db7a6d592fc20f01343bd954e2f10d611553a40dae3f008c8ec4b1b6362ddd14f949b4da6ff690b97797e602e09b", 0x3d) syz_io_uring_setup(0x75c8, &(0x7f0000000300), &(0x7f0000ffd000/0x1000)=nil, &(0x7f000022e000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r6, 0x0, &(0x7f0000000100)=""/53, 0x35}, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r5, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@caif=@dgm={0x25, 0xe48e, 0x9}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="5e24af4e0f5ff220d404fc0e5ed8d9a4c4bc37cb7c7f303116d325476fec4332432e22d6c0f129e21ff86083e93aba", 0x2f}], 0x1, &(0x7f0000000680)=[{0x1010, 0x6, 0xef, "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"}, {0x1010, 0x1, 0xafb, "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"}], 0x2020}, 0x0, 0x0, 0x1, {0x0, r7}}, 0xfffffff9) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r8, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r1, 0x3a28, 0x0, 0x0, 0x0, 0x0) shutdown(r8, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, 0x0, 0x1) 13:16:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x12}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 779.953099][T15173] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 779.971971][T15180] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 779.972956][T15182] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:42 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xeaffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 780.018557][T15178] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 780.042227][T15178] FAULT_INJECTION: forcing a failure. [ 780.042227][T15178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 780.055770][T15178] CPU: 0 PID: 15178 Comm: syz-executor.3 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 780.066266][T15178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.076954][T15178] Call Trace: [ 780.080326][T15178] dump_stack+0x137/0x19d [ 780.084926][T15178] should_fail+0x23c/0x250 [ 780.089762][T15178] should_fail_usercopy+0x16/0x20 [ 780.095325][T15178] _copy_to_user+0x1c/0x90 [ 780.099813][T15178] simple_read_from_buffer+0xab/0x120 [ 780.106117][T15178] proc_fail_nth_read+0xf6/0x140 [ 780.111782][T15178] ? rw_verify_area+0x136/0x250 [ 780.117515][T15178] ? proc_fault_inject_write+0x200/0x200 [ 780.124027][T15178] vfs_read+0x154/0x5d0 [ 780.128178][T15178] ? __fget_light+0x21b/0x260 [ 780.133191][T15178] ? __cond_resched+0x11/0x40 [ 780.138118][T15178] ksys_read+0xce/0x180 [ 780.142719][T15178] __x64_sys_read+0x3e/0x50 [ 780.147468][T15178] do_syscall_64+0x4a/0x90 [ 780.152189][T15178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 780.159308][T15178] RIP: 0033:0x41935c [ 780.163292][T15178] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 780.184751][T15178] RSP: 002b:00007fc125a61170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 780.195335][T15178] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041935c [ 780.204647][T15178] RDX: 000000000000000f RSI: 00007fc125a611e0 RDI: 0000000000000003 13:16:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xc5}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 780.214201][T15178] RBP: 00007fc125a611d0 R08: 0000000000000000 R09: 0000000020000040 [ 780.222954][T15178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 780.232234][T15178] R13: 00007fff11c2c38f R14: 00007fc125a61300 R15: 0000000000022000 13:16:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xefffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:42 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0x211}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 780.267080][T15205] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 780.288587][T15210] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:42 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:42 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x13}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 780.394947][T15235] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 780.407751][T15237] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:43 executing program 2: rseq(&(0x7f00000001c0), 0x20, 0x0, 0x0) clone(0xa90e0e80, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x14}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xfeffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0x6c0}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xa18}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 2: setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x83274000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x0, 0x0) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0xffffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 780.981717][T15303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xe3}], 0x2, 0x0) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 781.041445][T15303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x2}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0x139}], 0x2, 0x0) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 781.184060][T15348] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x3}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0x5c0}], 0x2, 0x0) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 781.341265][T15379] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x4}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xb11}], 0x2, 0x0) 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 781.509652][T15409] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:43 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0x200003e4}], 0x2, 0x0) [ 781.553623][T15409] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x5}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:43 executing program 2: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:43 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 2: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 781.668139][T15443] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x6}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x8, 0x0) 13:16:44 executing program 2: mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 781.807423][T15467] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x22, 0x0) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 781.868138][T15467] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x7}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x6) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x8}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xc) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x9}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x10) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x12) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0xa}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xef) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0xb}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0xc}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x12, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x1b4) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1100, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0xd}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:44 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x600) 13:16:44 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1200, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0xe}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', 0x0, 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xc00) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x10}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x25, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x11}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x1200) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2500, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x12}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x2000) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x25}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x3f00) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x60, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xb401) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x2000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x48}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xefff) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x4c}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x60}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xffef) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:45 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:45 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x100000) 13:16:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x68}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x34000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:45 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', 0x0, 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x200000) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x6c}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x400300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x74}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x1000000) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x7a}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x6000000) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x2}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xc000000) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x3}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x12000000) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, 0x0) 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 784.376207][T15982] EXT4-fs: 131 callbacks suppressed [ 784.376222][T15982] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x4}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x3f000000) [ 784.452126][T15999] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x5}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 784.493171][T15997] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 784.519400][T16011] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 784.530869][T16007] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:46 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x6}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:46 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:46 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xb4010000) [ 784.597285][T16024] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 784.622244][T16026] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 784.631603][T16027] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:46 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x7}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 784.664111][T16031] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 784.703132][T16039] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:47 executing program 2 (fault-call:2 fault-nth:0): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:47 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:47 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xefffffff) [ 784.823165][T16059] FAULT_INJECTION: forcing a failure. [ 784.823165][T16059] name failslab, interval 1, probability 0, space 0, times 0 [ 784.837350][T16059] CPU: 0 PID: 16059 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 784.849750][T16059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.861119][T16059] Call Trace: [ 784.864507][T16059] dump_stack+0x137/0x19d [ 784.869303][T16059] should_fail+0x23c/0x250 [ 784.873962][T16059] ? getname_flags+0x84/0x3d0 [ 784.878977][T16059] __should_failslab+0x81/0x90 [ 784.884166][T16059] should_failslab+0x5/0x20 [ 784.889227][T16059] kmem_cache_alloc+0x46/0x2f0 [ 784.894345][T16059] getname_flags+0x84/0x3d0 [ 784.899224][T16059] do_mkdirat+0x3b/0x200 [ 784.903927][T16059] ? ksys_write+0x157/0x180 [ 784.908454][T16059] __x64_sys_mkdir+0x32/0x40 [ 784.913686][T16059] do_syscall_64+0x4a/0x90 [ 784.918481][T16059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 784.924537][T16059] RIP: 0033:0x4656e7 [ 784.928512][T16059] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 784.950264][T16059] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 784.958921][T16059] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 13:16:47 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 784.969905][T16059] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 784.979724][T16059] RBP: 00007f0be9525040 R08: 0000000000000000 R09: 00000000000884a0 [ 784.988857][T16059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 784.997599][T16059] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:47 executing program 2 (fault-call:2 fault-nth:1): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 785.021879][T16070] __nla_validate_parse: 44 callbacks suppressed [ 785.021895][T16070] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:47 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 785.070597][T16064] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 785.088918][T16080] FAULT_INJECTION: forcing a failure. [ 785.088918][T16080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.102717][T16080] CPU: 1 PID: 16080 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 785.113404][T16080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.124368][T16080] Call Trace: [ 785.127953][T16080] dump_stack+0x137/0x19d [ 785.132598][T16080] should_fail+0x23c/0x250 [ 785.137265][T16080] should_fail_usercopy+0x16/0x20 [ 785.142536][T16080] strncpy_from_user+0x21/0x250 [ 785.147930][T16080] getname_flags+0xb8/0x3d0 [ 785.153439][T16080] do_mkdirat+0x3b/0x200 [ 785.157880][T16080] ? ksys_write+0x157/0x180 [ 785.162828][T16080] __x64_sys_mkdir+0x32/0x40 13:16:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x8}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xffffffef) 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 785.169083][T16080] do_syscall_64+0x4a/0x90 [ 785.174096][T16080] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 785.181505][T16080] RIP: 0033:0x4656e7 [ 785.185721][T16080] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.207280][T16080] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 785.216946][T16080] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004656e7 [ 785.225370][T16080] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000000 [ 785.233813][T16080] RBP: 00007f0be9525040 R08: 0000000000000000 R09: 00000000000884a0 [ 785.242591][T16080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000040 [ 785.250933][T16080] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:47 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:47 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:47 executing program 2 (fault-call:2 fault-nth:2): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 785.278762][T16093] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x10000000000000) 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 785.339219][T16093] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 785.364794][T16110] FAULT_INJECTION: forcing a failure. [ 785.364794][T16110] name failslab, interval 1, probability 0, space 0, times 0 13:16:47 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 785.378936][T16110] CPU: 1 PID: 16110 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 785.390145][T16110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.400848][T16110] Call Trace: [ 785.404604][T16110] dump_stack+0x137/0x19d [ 785.409822][T16110] should_fail+0x23c/0x250 [ 785.414791][T16110] ? __se_sys_mount+0x4e/0x2e0 [ 785.420180][T16110] __should_failslab+0x81/0x90 [ 785.425137][T16110] should_failslab+0x5/0x20 [ 785.429917][T16110] __kmalloc_track_caller+0x64/0x340 13:16:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x9}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x20000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 785.435956][T16110] ? strnlen_user+0x137/0x1c0 [ 785.441573][T16110] strndup_user+0x73/0x120 [ 785.446092][T16110] __se_sys_mount+0x4e/0x2e0 [ 785.451050][T16110] ? do_mkdirat+0x69/0x200 [ 785.455850][T16110] ? ksys_write+0x157/0x180 [ 785.460998][T16110] __x64_sys_mount+0x63/0x70 [ 785.465686][T16110] do_syscall_64+0x4a/0x90 [ 785.470373][T16110] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 785.477008][T16110] RIP: 0033:0x467afa [ 785.481013][T16110] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.501751][T16110] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.510505][T16110] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 785.520220][T16110] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 785.528192][T16110] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 13:16:47 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:47 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 785.536776][T16110] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 785.545190][T16110] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 [ 785.569811][T16123] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:47 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x20000000000000) 13:16:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:47 executing program 2 (fault-call:2 fault-nth:3): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 785.634446][T16121] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:47 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1100, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xa}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 785.709684][T16145] FAULT_INJECTION: forcing a failure. [ 785.709684][T16145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.723829][T16145] CPU: 1 PID: 16145 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 785.734590][T16145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.745338][T16145] Call Trace: [ 785.748877][T16145] dump_stack+0x137/0x19d [ 785.753545][T16145] should_fail+0x23c/0x250 [ 785.758563][T16145] should_fail_usercopy+0x16/0x20 [ 785.763683][T16145] _copy_from_user+0x1c/0xd0 [ 785.768365][T16145] strndup_user+0xb0/0x120 [ 785.773250][T16145] __se_sys_mount+0x4e/0x2e0 [ 785.782212][T16145] ? do_mkdirat+0x69/0x200 [ 785.787413][T16145] ? ksys_write+0x157/0x180 [ 785.792876][T16145] __x64_sys_mount+0x63/0x70 [ 785.798551][T16145] do_syscall_64+0x4a/0x90 [ 785.803173][T16145] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 785.809423][T16145] RIP: 0033:0x467afa [ 785.813663][T16145] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.835203][T16145] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.843931][T16145] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 13:16:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x40000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 785.853037][T16145] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 785.861093][T16145] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 785.869070][T16145] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 785.877233][T16145] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x100000000000000) 13:16:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 785.904258][T16158] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:48 executing program 2 (fault-call:2 fault-nth:4): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:48 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1200, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 786.019528][T16178] FAULT_INJECTION: forcing a failure. [ 786.019528][T16178] name failslab, interval 1, probability 0, space 0, times 0 [ 786.033447][T16178] CPU: 1 PID: 16178 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 786.044126][T16178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.055054][T16178] Call Trace: [ 786.058672][T16178] dump_stack+0x137/0x19d [ 786.063545][T16178] should_fail+0x23c/0x250 [ 786.068414][T16178] __should_failslab+0x81/0x90 [ 786.073361][T16178] ? __se_sys_mount+0xf2/0x2e0 [ 786.078658][T16178] should_failslab+0x5/0x20 [ 786.083930][T16178] kmem_cache_alloc_trace+0x49/0x310 [ 786.090402][T16178] ? _copy_from_user+0x94/0xd0 [ 786.095274][T16178] __se_sys_mount+0xf2/0x2e0 [ 786.100049][T16178] ? do_mkdirat+0x69/0x200 [ 786.104662][T16178] ? ksys_write+0x157/0x180 [ 786.109432][T16178] __x64_sys_mount+0x63/0x70 [ 786.114469][T16178] do_syscall_64+0x4a/0x90 [ 786.119493][T16178] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 786.125380][T16178] RIP: 0033:0x467afa [ 786.129374][T16178] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.150150][T16178] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 786.159369][T16178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 13:16:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x600000000000000) 13:16:48 executing program 2 (fault-call:2 fault-nth:5): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xeaffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 786.167798][T16178] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 786.176713][T16178] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 786.185727][T16178] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 786.194105][T16178] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 [ 786.206910][T16153] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.259824][T16198] FAULT_INJECTION: forcing a failure. [ 786.259824][T16198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.276508][T16198] CPU: 1 PID: 16198 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 786.287619][T16198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.298378][T16198] Call Trace: [ 786.301907][T16198] dump_stack+0x137/0x19d [ 786.306456][T16198] should_fail+0x23c/0x250 [ 786.311585][T16198] should_fail_usercopy+0x16/0x20 [ 786.316891][T16198] _copy_from_user+0x1c/0xd0 [ 786.321973][T16198] __se_sys_mount+0x115/0x2e0 [ 786.326922][T16198] ? ksys_write+0x157/0x180 [ 786.331511][T16198] __x64_sys_mount+0x63/0x70 [ 786.337136][T16198] do_syscall_64+0x4a/0x90 [ 786.341976][T16198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 786.348656][T16198] RIP: 0033:0x467afa [ 786.352712][T16198] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.375541][T16198] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 786.385646][T16198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 786.394816][T16198] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 13:16:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xb}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:48 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:48 executing program 2 (fault-call:2 fault-nth:6): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 786.403405][T16198] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 786.412143][T16198] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 786.420704][T16198] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 [ 786.439194][T16204] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xc00000000000000) 13:16:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xefffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xc}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:48 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:48 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 786.571728][T16226] FAULT_INJECTION: forcing a failure. [ 786.571728][T16226] name failslab, interval 1, probability 0, space 0, times 0 [ 786.585847][T16226] CPU: 1 PID: 16226 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 786.597970][T16226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.599360][T16233] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 786.609128][T16226] Call Trace: [ 786.609139][T16226] dump_stack+0x137/0x19d [ 786.609163][T16226] should_fail+0x23c/0x250 [ 786.609181][T16226] ? getname_flags+0x84/0x3d0 [ 786.636679][T16226] __should_failslab+0x81/0x90 [ 786.641723][T16226] should_failslab+0x5/0x20 [ 786.646405][T16226] kmem_cache_alloc+0x46/0x2f0 [ 786.651885][T16226] getname_flags+0x84/0x3d0 [ 786.656737][T16226] ? should_fail+0xd6/0x250 [ 786.662111][T16226] user_path_at_empty+0x28/0x50 [ 786.667340][T16226] __se_sys_mount+0x209/0x2e0 [ 786.672188][T16226] ? ksys_write+0x157/0x180 [ 786.676796][T16226] __x64_sys_mount+0x63/0x70 [ 786.681828][T16226] do_syscall_64+0x4a/0x90 [ 786.686770][T16226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 786.693031][T16226] RIP: 0033:0x467afa [ 786.697285][T16226] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.718050][T16226] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 786.726797][T16226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 786.735123][T16226] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 786.744315][T16226] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 786.753971][T16226] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 786.762827][T16226] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:49 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xd}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x1200000000000000) 13:16:49 executing program 2 (fault-call:2 fault-nth:7): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:49 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xe}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 786.901896][T16251] FAULT_INJECTION: forcing a failure. [ 786.901896][T16251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.916511][T16251] CPU: 1 PID: 16251 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 786.927365][T16251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.938219][T16251] Call Trace: [ 786.941586][T16251] dump_stack+0x137/0x19d [ 786.946023][T16251] should_fail+0x23c/0x250 [ 786.950800][T16251] should_fail_usercopy+0x16/0x20 [ 786.955869][T16251] strncpy_from_user+0x21/0x250 [ 786.961507][T16251] getname_flags+0xb8/0x3d0 [ 786.966532][T16251] ? should_fail+0xd6/0x250 [ 786.971048][T16251] user_path_at_empty+0x28/0x50 [ 786.976214][T16251] __se_sys_mount+0x209/0x2e0 [ 786.981202][T16251] ? ksys_write+0x157/0x180 [ 786.985793][T16251] __x64_sys_mount+0x63/0x70 [ 786.991465][T16251] do_syscall_64+0x4a/0x90 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x3f00000000000000) 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xb401000000000000) 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 786.996156][T16251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 787.002717][T16251] RIP: 0033:0x467afa [ 787.006918][T16251] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 787.027073][T16251] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 787.036485][T16251] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xefffffffffffffff) 13:16:49 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:49 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2500, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 787.045133][T16251] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 787.053552][T16251] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 787.061795][T16251] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 787.070661][T16251] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x10}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:49 executing program 2 (fault-call:2 fault-nth:8): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:49 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xffffffff00000000) 13:16:49 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0xffffffffffffffef) [ 787.232487][T16307] FAULT_INJECTION: forcing a failure. [ 787.232487][T16307] name failslab, interval 1, probability 0, space 0, times 0 [ 787.246193][T16307] CPU: 1 PID: 16307 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 787.256635][T16307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.267305][T16307] Call Trace: [ 787.271123][T16307] dump_stack+0x137/0x19d [ 787.275756][T16307] should_fail+0x23c/0x250 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x11}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 787.280533][T16307] __should_failslab+0x81/0x90 [ 787.285655][T16307] ? alloc_fs_context+0x46/0x500 [ 787.290841][T16307] should_failslab+0x5/0x20 [ 787.295456][T16307] kmem_cache_alloc_trace+0x49/0x310 [ 787.301310][T16307] alloc_fs_context+0x46/0x500 [ 787.306476][T16307] ? security_capable+0x91/0xa0 [ 787.311369][T16307] fs_context_for_reconfigure+0x42/0x50 [ 787.317923][T16307] path_mount+0x1212/0x1ce0 [ 787.322708][T16307] __se_sys_mount+0x23d/0x2e0 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 787.328635][T16307] __x64_sys_mount+0x63/0x70 [ 787.333586][T16307] do_syscall_64+0x4a/0x90 [ 787.338852][T16307] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 787.345736][T16307] RIP: 0033:0x467afa [ 787.349902][T16307] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 787.371003][T16307] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x1, 0x0, '\x00', [{0x8edf, 0x5c, 0x8, 0x539, 0x7, 0x101}, {0x1, 0x0, 0x8, 0x8, 0xfffffffffffffffd, 0x4}], ['\x00']}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x12}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 787.380132][T16307] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 787.388299][T16307] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 787.396507][T16307] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 787.404848][T16307] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 787.413259][T16307] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:49 executing program 2 (fault-call:2 fault-nth:9): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:49 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x25}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 787.539899][T16352] FAULT_INJECTION: forcing a failure. [ 787.539899][T16352] name failslab, interval 1, probability 0, space 0, times 0 [ 787.555987][T16352] CPU: 1 PID: 16352 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 787.567337][T16352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.578095][T16352] Call Trace: [ 787.581709][T16352] dump_stack+0x137/0x19d [ 787.586228][T16352] should_fail+0x23c/0x250 [ 787.592062][T16352] __should_failslab+0x81/0x90 [ 787.597541][T16352] ? legacy_init_fs_context+0x2d/0x70 [ 787.603320][T16352] should_failslab+0x5/0x20 [ 787.607981][T16352] kmem_cache_alloc_trace+0x49/0x310 [ 787.613676][T16352] ? kmem_cache_alloc_trace+0x215/0x310 [ 787.619682][T16352] ? alloc_fs_context+0x46/0x500 [ 787.624958][T16352] legacy_init_fs_context+0x2d/0x70 [ 787.630501][T16352] alloc_fs_context+0x419/0x500 [ 787.635872][T16352] fs_context_for_reconfigure+0x42/0x50 [ 787.641505][T16352] path_mount+0x1212/0x1ce0 [ 787.646227][T16352] __se_sys_mount+0x23d/0x2e0 [ 787.652639][T16352] __x64_sys_mount+0x63/0x70 [ 787.657390][T16352] do_syscall_64+0x4a/0x90 [ 787.662163][T16352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 787.668490][T16352] RIP: 0033:0x467afa [ 787.673069][T16352] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 787.693628][T16352] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 787.702217][T16352] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 787.710265][T16352] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 787.718867][T16352] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 787.727003][T16352] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x104) r2 = openat(r1, &(0x7f0000000140)='./file0\x00', 0x80000, 0x9) r3 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000c80), 0x2, 0x0) ioctl$FIONCLEX(r3, 0x5450) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000c40)) truncate(&(0x7f0000000c00)='./file0\x00', 0x7fff) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = fork() ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000180)={0x0, 0x0, [0x4, 0x0, 0x39c5, 0x1ff, 0x7, 0x7]}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) preadv(r5, &(0x7f0000000b80)=[{&(0x7f0000000400)=""/185, 0xb9}, {&(0x7f00000004c0)=""/145, 0x91}, {&(0x7f0000000580)=""/160, 0xa0}, {&(0x7f0000000640)=""/135, 0x87}, {&(0x7f0000000700)=""/205, 0xcd}, {&(0x7f0000000800)=""/204, 0xcc}, {&(0x7f0000000900)=""/24, 0x18}, {&(0x7f0000000b40)=""/31, 0x1f}], 0x8, 0x10001, 0x0) process_vm_writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x0, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 787.735132][T16352] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x48}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x12000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:50 executing program 2 (fault-call:2 fault-nth:10): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="e9e81ea508042a2d", 0x8, 0x101}, {&(0x7f0000000400)="5f5e97f3b2536afaba4f0be7a9e22e450d4915f79c17ea7997784b2c6a4fe1bbd970d0f22cb10b37ce43f2dbea54f939ad645171d8d19a0a1be6c976de05b6324052bdbb03b494297f4c9a1613c1604dffe201d0bd947a1e86844227df19a33acd376c02b15dca3ca2d5ba3391df880c5ee63858d8beb8e967538972600ca1e2d9e3bac17b120dae936426924077ac1d8529677433782f1cb48d1849420d682a1ea308748ce4005a8aedc7d71b432cdd01516dde141dfd2eb0c5b6bbb2169931a36023b3bc1a7585ae66a0d46e8c83fef601c4b5a75f4994772d8903", 0xdc}], 0x21e080, &(0x7f00000006c0)={[{@huge_never}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x74, 0x25, 0x65, 0xb, 0x39]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x6b, 0x78, 0x70, 0x8, 0x67, 0x6d, 0x2d, 0x32]}}, {@gid={'gid', 0x3d, 0xee00}}, {@gid={'gid', 0x3d, r1}}, {@uid={'uid', 0x3d, r3}}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x35, 0x2d, 0x2d]}}}}, {@uid={'uid', 0x3d, r4}}], [{@uid_eq={'uid', 0x3d, r5}}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fsname={'fsname', 0x3d, '&'}}, {@dont_appraise}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = fork() process_vm_writev(r6, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x4c}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 787.938840][T16388] FAULT_INJECTION: forcing a failure. [ 787.938840][T16388] name failslab, interval 1, probability 0, space 0, times 0 [ 787.953019][T16388] CPU: 0 PID: 16388 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 787.963747][T16388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.974865][T16388] Call Trace: [ 787.978434][T16388] dump_stack+0x137/0x19d [ 787.983133][T16388] should_fail+0x23c/0x250 [ 787.987899][T16388] ? ext4_remount+0x53/0x1840 [ 787.992777][T16388] __should_failslab+0x81/0x90 [ 787.997830][T16388] should_failslab+0x5/0x20 [ 788.002608][T16388] __kmalloc_track_caller+0x64/0x340 [ 788.008178][T16388] kstrdup+0x31/0x70 [ 788.013221][T16388] ext4_remount+0x53/0x1840 [ 788.017941][T16388] ? __cond_resched+0x11/0x40 [ 788.023507][T16388] ? __dentry_kill+0x456/0x4e0 [ 788.029082][T16388] ? shrink_dentry_list+0x54e/0x580 [ 788.034622][T16388] ? list_lru_count_node+0x28/0x30 [ 788.040802][T16388] ? shrink_dcache_sb+0x29d/0x2d0 [ 788.046643][T16388] ? ext4_statfs+0x6b0/0x6b0 [ 788.051421][T16388] legacy_reconfigure+0x8e/0xa0 [ 788.056745][T16388] reconfigure_super+0x2d3/0x4f0 [ 788.062085][T16388] path_mount+0x1442/0x1ce0 [ 788.067745][T16388] __se_sys_mount+0x23d/0x2e0 [ 788.072951][T16388] __x64_sys_mount+0x63/0x70 [ 788.077702][T16388] do_syscall_64+0x4a/0x90 [ 788.082432][T16388] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 788.088930][T16388] RIP: 0033:0x467afa [ 788.092999][T16388] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 788.114287][T16388] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 788.123587][T16388] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x1000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) getpriority(0x0, 0x0) vmsplice(r0, &(0x7f0000000c00)=[{&(0x7f00000000c0)="715c253ef44545e80c9d6a14b55708537ceeb29db740d7b2bc7405c3fab4b1c3bea45b66d33f0e3d837169bd675b860393471e89f35ca5a485dc3995237d044ec5ec7d2a07bddf0e39d8f8659d1153b37bbe6bf694186d22e1d0babc7bb009d1b7b95d72f6ab730694447777f0637187fbf9f0ba99bbd0ce9736b1c2367c19bd0f17ec0382460ac575dfd97a6e53ce328525f4f15b06ce9cf1aac5a5cd43c613dc95e1a13c75", 0xa6}, {&(0x7f0000000400)="bfff92439c80a161558560b9410300733082d6db240b342e06c7a285cb68303402c6ac3bc55b48b5713c36dfd555125a843a4d2396efe61aac2ba6e27729ec12a4179c0385375c6bc09f5cea34bacee589a9906b7d16280e351ee44fad497c67c72c65742fdc72ecbe543474e5f6791fc4a02bf6f5045771502e6321559b48591e1a2541046107954c8a005322d39a47e825706a0a8afa8fd14c98c299b9d9d5386083b3b5951749f58a0c97320dfb8533d51df7c3e2d93ac273891ce91849625036b170114a81bc4dd3d3e2", 0xcc}, {&(0x7f0000000180)="fccb8fef6dc8ce4ad6e157b170c006149e6f286fbd1a2e76ae40ce0d7dbd3e056390a3ece355b2e417bddba3b9e931c020ade60a", 0x34}, {&(0x7f0000000500)="837578003d85ef757398e68b1addc12fcddef1ce824124b182ed57c2c31951d43179c6e0390bd9113e4c3e8f8db8b9982a093b5980d6dc8c15eab32db84327c3c402d20d7649a059ac85151a3ce1aee4dcdf51aa5fd3a20024ce04a8a64e3f98", 0x60}, {&(0x7f0000000580)="895abe8c63a6338d0b7f50c4060db6f356ef8b54f5cc6cb5d1cfee069a92aa3aa5083e2d1358dd01a2e5a3cb9ba55159cd3e6ea9753725ff2b267ec5d264d812ccdbc4e5560e2c65fdf72a265b06746e337e52dd1a1998f0478a75ff175fc8ed602bc9f39bd5bd6713316621d4092618b4a613f1cc08a66588f64af4cb6292f46a4a0d16658cf1d7054becc168f4632b6bd6ca5ccb77de5cf640fd37082da383b370bb270c1291db6961bacd92183cd2ebf6e8f9f50ab80f5d7b7e4f482bc6cfab683e11f249b89f1af83f320fe4", 0xce}, {&(0x7f0000000680)="637f169f871d26b9fde087eb1e4ffd2db587a5787dbfb059fbfb0a3a9f59e4744aec4cc8266b85a75ed96150453264b264a1d6a3745451db83cb5973c77c63700e2527bc97a8fa3a4745ac0cbb7ff32936c5e0675051a602f565deedb53fd6e08880671926fdf59da66bda270766f1b5b77328785bc0ce8f97a395ede19af6f61b890d61bdd658cb7226079848c5c9a3a86449563add381c3d80795689aff6508280653cf4f4d88d5535c7296a55b01807c8e68c13f0cbd6f300d5ee5b33de8d2de4c7ef3bc4515bb801", 0xca}, {&(0x7f0000000800)="e9ee380209d85851aab379ed04e01143f0170ccf59d3706e62c88cd972054f4f650fa6cd856d2df1d547fecb434c991f0d1e811c28442591b8e00ed8126ea9bd2417734720be1c0217c1139c52936b03db2aa1e69eb866992aa6bb1dbd5c8db0185a21f93962bf610df79f851f092e2f3701e6f389525891cb1614f4d59f8bed8d5c9c7ce7376509d63888f201ded615f7d874001351f652047f5f451c29a2f0874d4c2a28d9149f3b17327f544fb70659", 0xb1}, {&(0x7f0000000b40)="5a744c46606875ddd63b0b88af2351b5a7ecb4954be2d81b362d144f3b1cb82efd5a16c3efaf080b441a0c01c455ff8eaf93be1af696be3021d16d7ac322ee86b13e1eb1121cf154b8d33ac76effba51123ad51ba0c24985df5d894e201c6d8adf24f2f041f23eefed1c3fd9315142d6c3f4a92ed676f9f2fb470e75671ab5b9bf5175d3575d3e49bf", 0x89}, {&(0x7f00000001c0)="1378698f328ed01769bd2cfb997b620de98fee3ea4ec35fa5f0d0211d45bc10f868f9a5c0daacbf775940775", 0x2c}, {&(0x7f00000008c0)="ca82035009f22e6c78706b721dd46835f5ffe36925047b9b1030e60f5426e484d45358bf1c9387be83308f35697aecfc2613248dfba58bceb6025d7b5a4f57c9fcd4fb973976f1ff7f24e3760be0a595ea6b0b76f15ffde8a1973bec40374a0287eb203176dd64845d9085291dc843e8944264527d", 0x75}], 0xa, 0xa) 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x60}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 788.131893][T16388] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 788.140219][T16388] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 788.148747][T16388] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 788.156923][T16388] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:50 executing program 2 (fault-call:2 fault-nth:11): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/149, 0x95}, {&(0x7f0000000400)=""/180, 0xb4}, {&(0x7f0000000180)=""/100, 0x64}, {&(0x7f00000004c0)=""/95, 0x5f}, {&(0x7f0000000540)=""/171, 0xab}, {&(0x7f0000000600)=""/53, 0x35}, {&(0x7f0000000640)=""/119, 0x77}, {&(0x7f00000006c0)=""/23, 0x17}], 0x8) 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x40030000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 788.287472][T16426] FAULT_INJECTION: forcing a failure. [ 788.287472][T16426] name failslab, interval 1, probability 0, space 0, times 0 [ 788.301837][T16426] CPU: 0 PID: 16426 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 788.313118][T16426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.323452][T16426] Call Trace: [ 788.326744][T16426] dump_stack+0x137/0x19d [ 788.331570][T16426] should_fail+0x23c/0x250 [ 788.336550][T16426] ? mempool_alloc_slab+0x16/0x20 [ 788.341847][T16426] __should_failslab+0x81/0x90 [ 788.346941][T16426] should_failslab+0x5/0x20 [ 788.351938][T16426] kmem_cache_alloc+0x46/0x2f0 [ 788.357044][T16426] mempool_alloc_slab+0x16/0x20 [ 788.362224][T16426] ? mempool_free+0x130/0x130 [ 788.367161][T16426] mempool_alloc+0x8c/0x300 [ 788.372061][T16426] ? strsep+0x16/0xe0 [ 788.377659][T16426] bio_alloc_bioset+0xcc/0x480 [ 788.383266][T16426] submit_bh_wbc+0x130/0x330 [ 788.388023][T16426] ? ext4_update_super+0x71c/0x740 [ 788.394032][T16426] __sync_dirty_buffer+0x136/0x1e0 [ 788.399450][T16426] ext4_commit_super+0x1e3/0x270 [ 788.404729][T16426] ext4_remount+0xfc0/0x1840 [ 788.409620][T16426] ? ext4_statfs+0x6b0/0x6b0 [ 788.414423][T16426] legacy_reconfigure+0x8e/0xa0 [ 788.419354][T16426] reconfigure_super+0x2d3/0x4f0 [ 788.424566][T16426] path_mount+0x1442/0x1ce0 [ 788.429059][T16426] __se_sys_mount+0x23d/0x2e0 [ 788.434087][T16426] __x64_sys_mount+0x63/0x70 [ 788.439604][T16426] do_syscall_64+0x4a/0x90 [ 788.444858][T16426] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 788.451639][T16426] RIP: 0033:0x467afa [ 788.456252][T16426] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 788.479145][T16426] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x68}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x6c}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 788.488415][T16426] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 788.496862][T16426] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 788.505373][T16426] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 788.513951][T16426] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 788.523557][T16426] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x20800, 0x0) mkdirat(r1, &(0x7f0000000100)='./file0\x00', 0x105) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:50 executing program 2 (fault-call:2 fault-nth:12): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:50 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x25000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:50 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x74}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 788.670244][T16457] FAULT_INJECTION: forcing a failure. [ 788.670244][T16457] name failslab, interval 1, probability 0, space 0, times 0 [ 788.683888][T16457] CPU: 1 PID: 16457 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 788.696847][T16457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.708125][T16457] Call Trace: [ 788.711632][T16457] dump_stack+0x137/0x19d [ 788.716535][T16457] should_fail+0x23c/0x250 [ 788.721714][T16457] __should_failslab+0x81/0x90 [ 788.727617][T16457] should_failslab+0x5/0x20 [ 788.732828][T16457] kmem_cache_alloc_node+0x58/0x2b0 [ 788.739561][T16457] ? create_task_io_context+0x36/0x210 [ 788.745718][T16457] create_task_io_context+0x36/0x210 [ 788.751795][T16457] submit_bio_checks+0x778/0x800 [ 788.757263][T16457] ? mempool_alloc_slab+0x16/0x20 [ 788.762451][T16457] submit_bio_noacct+0x33/0x7e0 [ 788.767935][T16457] ? mempool_alloc_slab+0x16/0x20 [ 788.776025][T16457] ? mempool_free+0x130/0x130 [ 788.782450][T16457] ? mempool_alloc+0x99/0x300 [ 788.787545][T16457] submit_bio+0x16d/0x2b0 [ 788.793003][T16457] ? bio_alloc_bioset+0x402/0x480 [ 788.798737][T16457] submit_bh_wbc+0x2f3/0x330 [ 788.803659][T16457] __sync_dirty_buffer+0x136/0x1e0 [ 788.809790][T16457] ext4_commit_super+0x1e3/0x270 [ 788.815247][T16457] ext4_remount+0xfc0/0x1840 [ 788.820897][T16457] ? ext4_statfs+0x6b0/0x6b0 [ 788.826523][T16457] legacy_reconfigure+0x8e/0xa0 [ 788.832110][T16457] reconfigure_super+0x2d3/0x4f0 [ 788.837514][T16457] path_mount+0x1442/0x1ce0 [ 788.842190][T16457] __se_sys_mount+0x23d/0x2e0 [ 788.847380][T16457] __x64_sys_mount+0x63/0x70 [ 788.852609][T16457] do_syscall_64+0x4a/0x90 [ 788.857680][T16457] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 788.863910][T16457] RIP: 0033:0x467afa [ 788.867888][T16457] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 788.889310][T16457] RSP: 002b:00007f0be9524fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 788.898823][T16457] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467afa [ 788.907574][T16457] RDX: 0000000020000040 RSI: 0000000020000000 RDI: 0000000000000000 13:16:51 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x7a}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 788.916200][T16457] RBP: 00007f0be9525040 R08: 00007f0be9525040 R09: 0000000020000040 [ 788.924904][T16457] R10: 00000000000884a0 R11: 0000000000000206 R12: 0000000020000040 [ 788.933521][T16457] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:51 executing program 2 (fault-call:2 fault-nth:13): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:51 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:51 executing program 5: mq_timedsend(0xffffffffffffffff, &(0x7f00000000c0)="b226935ff4307e192ebf016d7a7b3a9fdbd928d1d6761f1f41bf6f36b66a6e87431380ff926a2a0d54f13fbe22c2cfa2a9ecc69fe0dab08ad644432c88fde5f0d851b40a2cb40b25f95cbd7b38b7dc07e156f5f5d09b36520c77c36896150fd5cceb51ffff44b78eb4b8ac2fc1e0c33790e4889d19ad426d5a9518782afb9e59df6cb66465cf05b6b0e7c937c1978b21579924cf06580b67f5d342139178c2", 0x9f, 0x4, &(0x7f0000000180)={0x77359400}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000400)="8d4c876b9da1c7e06ad0f1c22de9f94e7f316974d975456944ce108256fa1bde34c594ed00279e74851406d2bcbefc7682918209125976d9e2c5f2b9882b3c6957b24a55", 0x44}, {&(0x7f0000000480)="4d6968ac721c08ed7fd2ecc8e82331bed003696923e8d9acf0a5b8f469c189b007f58fe29027ebf3769ffdb8f6c61a9b9bbb7c0f31203a4176111d3a579d25dd8b39db0444cc10aae9e4465400e3bef57767ec1118d780029a8d633366872ca68ae5a7ffe7ff07afc377eae13dfe4a04d4b05577037bdfc7bf9ac70056a664978ae8a4a530a06cc69de9cb81f317f8c46d03fab20af19ebbb90e622486196088f553305d46f7588b8cd8494df4370dacbb3d5cae6131be9c08363336b7d3d47c1a", 0xc1}, {&(0x7f0000000580)="f727b57099cab76a4faf85350944bd4e0026d851633f249f52a6a9c11d0f224e074b10b62b7271ef9f36d9fb0aee5f77b4fb569d7c1835266caec72e343efe09512d81d7b0d58d22d7cc2f55d8112e3b7fa87bd816dd03aa312cc9208d51d62ca523d177b45471e8ae8d72ecd586160e82db8b5192a4f03cd7a532fca63c61c96552e9d0aa", 0x85}], 0x3, 0x3ff, 0xfff) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:51 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x300}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:51 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 789.113174][T16490] FAULT_INJECTION: forcing a failure. [ 789.113174][T16490] name failslab, interval 1, probability 0, space 0, times 0 [ 789.127923][T16490] CPU: 1 PID: 16490 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 789.138693][T16490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.149041][T16490] Call Trace: [ 789.152870][T16490] dump_stack+0x137/0x19d [ 789.157481][T16490] should_fail+0x23c/0x250 [ 789.162133][T16490] ? getname_flags+0x84/0x3d0 [ 789.168116][T16490] __should_failslab+0x81/0x90 [ 789.174988][T16490] should_failslab+0x5/0x20 [ 789.179913][T16490] kmem_cache_alloc+0x46/0x2f0 [ 789.185111][T16490] getname_flags+0x84/0x3d0 [ 789.190141][T16490] getname+0x15/0x20 [ 789.194715][T16490] do_sys_openat2+0x5b/0x250 [ 789.199977][T16490] ? __se_sys_mount+0x261/0x2e0 [ 789.205987][T16490] __x64_sys_openat+0xef/0x110 [ 789.211401][T16490] do_syscall_64+0x4a/0x90 [ 789.216473][T16490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 789.222900][T16490] RIP: 0033:0x4196c4 [ 789.227214][T16490] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 789.248641][T16490] RSP: 002b:00007f0be9524f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 13:16:51 executing program 2 (fault-call:2 fault-nth:14): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 789.258537][T16490] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 [ 789.266957][T16490] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 789.275192][T16490] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 789.283584][T16490] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 789.291834][T16490] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:51 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x500}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 789.359094][T16511] FAULT_INJECTION: forcing a failure. [ 789.359094][T16511] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.373432][T16511] CPU: 0 PID: 16511 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 789.385236][T16511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.396287][T16511] Call Trace: [ 789.399827][T16511] dump_stack+0x137/0x19d [ 789.404638][T16511] should_fail+0x23c/0x250 [ 789.409312][T16511] should_fail_usercopy+0x16/0x20 [ 789.414934][T16511] strncpy_from_user+0x21/0x250 [ 789.419988][T16511] getname_flags+0xb8/0x3d0 [ 789.424562][T16511] getname+0x15/0x20 [ 789.428528][T16511] do_sys_openat2+0x5b/0x250 [ 789.433378][T16511] ? __se_sys_mount+0x261/0x2e0 [ 789.438221][T16511] __x64_sys_openat+0xef/0x110 [ 789.443147][T16511] do_syscall_64+0x4a/0x90 [ 789.447908][T16511] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 789.454330][T16511] RIP: 0033:0x4196c4 [ 789.458440][T16511] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 789.479359][T16511] RSP: 002b:00007f0be9524f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 789.489267][T16511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 [ 789.497806][T16511] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c 13:16:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 789.506223][T16511] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 789.515079][T16511] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 789.523544][T16511] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 [ 789.545176][T16509] EXT4-fs: 76 callbacks suppressed [ 789.545187][T16509] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:51 executing program 5: ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000000c0)={0x9, 0x2, 0xffff0001, 0x1, 0x4, "ac868d1754afe7e12e8833b8fe58e9c326480e"}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x43) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000001dc0)={0x0, 0x0, 0x7, 0x0, '\x00', [{0x8, 0xffffffff, 0x9, 0x3, 0x9, 0x6}, {0x1ff, 0x7, 0x8, 0x1, 0x8, 0x9}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) preadv(r1, &(0x7f0000000540)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000400)=""/21, 0x15}, {&(0x7f0000000440)=""/39, 0x27}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000004c0)=""/118, 0x76}, {&(0x7f0000000dc0)=""/4096, 0x1000}], 0x6, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:51 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 789.598377][T16521] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 789.617722][T16522] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 789.631708][T16526] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:51 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 789.723405][T16536] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 789.748716][T16537] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 789.758365][T16538] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 789.791234][T16543] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:52 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 789.840109][T16548] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 789.864897][T16550] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:52 executing program 2 (fault-call:2 fault-nth:15): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x800000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:52 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 790.054862][T16565] FAULT_INJECTION: forcing a failure. [ 790.054862][T16565] name failslab, interval 1, probability 0, space 0, times 0 [ 790.068402][T16565] CPU: 0 PID: 16565 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 790.079270][T16565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.090583][T16565] Call Trace: [ 790.094114][T16565] dump_stack+0x137/0x19d [ 790.098959][T16565] should_fail+0x23c/0x250 [ 790.104233][T16565] ? __alloc_file+0x2e/0x1a0 [ 790.108977][T16565] __should_failslab+0x81/0x90 [ 790.114454][T16565] should_failslab+0x5/0x20 [ 790.119256][T16565] kmem_cache_alloc+0x46/0x2f0 [ 790.124592][T16565] __alloc_file+0x2e/0x1a0 [ 790.129295][T16565] alloc_empty_file+0xcd/0x1c0 [ 790.134350][T16565] path_openat+0x6a/0x20b0 [ 790.139894][T16565] ? ext4_remount+0x1643/0x1840 [ 790.145565][T16565] do_filp_open+0xd9/0x1f0 [ 790.150257][T16565] ? __virt_addr_valid+0x15a/0x1a0 [ 790.156133][T16565] ? __check_object_size+0x253/0x310 [ 790.161866][T16565] ? _find_next_bit+0x16a/0x190 [ 790.167667][T16565] ? alloc_fd+0x388/0x3e0 [ 790.172356][T16565] do_sys_openat2+0xa3/0x250 [ 790.177120][T16565] ? __se_sys_mount+0x261/0x2e0 [ 790.182207][T16565] __x64_sys_openat+0xef/0x110 [ 790.187415][T16565] do_syscall_64+0x4a/0x90 [ 790.192092][T16565] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 790.198402][T16565] RIP: 0033:0x4196c4 [ 790.202554][T16565] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 790.223934][T16565] RSP: 002b:00007f0be9524f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 790.232905][T16565] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 [ 790.241016][T16565] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 790.249920][T16565] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 790.258942][T16565] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 790.267990][T16565] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 13:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r0, 0x8000, 0x1, 0x400}) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/109, 0x6d}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/156, 0x9c}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x9, 0xffffffff) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000500)=@v2={0x2, @adiantum, 0x0, '\x00', @c}) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:52 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x600}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x900000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:52 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:52 executing program 2 (fault-call:2 fault-nth:16): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 790.539286][T16584] __nla_validate_parse: 27 callbacks suppressed [ 790.539299][T16584] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 790.559603][T16583] FAULT_INJECTION: forcing a failure. [ 790.559603][T16583] name failslab, interval 1, probability 0, space 0, times 0 [ 790.573695][T16583] CPU: 0 PID: 16583 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 13:16:52 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000700000/0x4000)=nil, 0x4000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) [ 790.586534][T16583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.598207][T16583] Call Trace: [ 790.602295][T16583] dump_stack+0x137/0x19d [ 790.606758][T16583] should_fail+0x23c/0x250 [ 790.611800][T16583] ? security_file_alloc+0x30/0x190 [ 790.617452][T16583] __should_failslab+0x81/0x90 [ 790.623006][T16583] should_failslab+0x5/0x20 [ 790.628903][T16583] kmem_cache_alloc+0x46/0x2f0 [ 790.634906][T16583] security_file_alloc+0x30/0x190 [ 790.640282][T16583] __alloc_file+0x83/0x1a0 [ 790.644965][T16583] alloc_empty_file+0xcd/0x1c0 [ 790.650441][T16583] path_openat+0x6a/0x20b0 [ 790.655021][T16583] ? rb_insert_color+0x2fa/0x310 [ 790.660473][T16583] ? __perf_event_task_sched_out+0xce0/0xd30 [ 790.666958][T16583] ? __perf_event_task_sched_in+0x471/0x4c0 [ 790.673663][T16583] ? enqueue_entity+0x47b/0x650 [ 790.679735][T16583] ? rb_erase+0x4bb/0x750 [ 790.684170][T16583] do_filp_open+0xd9/0x1f0 [ 790.688899][T16583] ? __virt_addr_valid+0x15a/0x1a0 [ 790.694127][T16583] ? __check_object_size+0x253/0x310 [ 790.699693][T16583] ? _find_next_bit+0x16a/0x190 [ 790.705165][T16583] ? alloc_fd+0x388/0x3e0 [ 790.710409][T16583] do_sys_openat2+0xa3/0x250 [ 790.715313][T16583] ? __se_sys_mount+0x261/0x2e0 [ 790.720786][T16583] __x64_sys_openat+0xef/0x110 [ 790.725650][T16583] do_syscall_64+0x4a/0x90 [ 790.730306][T16583] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 790.737201][T16583] RIP: 0033:0x4196c4 [ 790.741535][T16583] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 790.763665][T16583] RSP: 002b:00007f0be9524f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 790.773509][T16583] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196c4 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 790.787191][T16583] RDX: 0000000000010000 RSI: 0000000020000000 RDI: 00000000ffffff9c [ 790.796713][T16583] RBP: 0000000020000000 R08: 0000000000000000 R09: 0000000020000040 [ 790.806583][T16583] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 790.816382][T16583] R13: 0000000020000000 R14: 00007f0be9525000 R15: 00000000200001c0 [ 790.824776][T16584] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() r2 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x80000) r4 = syz_open_dev$evdev(&(0x7f0000000400), 0x8, 0x200) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r6 = syz_open_pts(r5, 0x0) ioctl$TCSETSF(r6, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ppoll(&(0x7f0000000440)=[{r3, 0x22}, {0xffffffffffffffff, 0x20}, {r4, 0x20}, {r6, 0x8000}], 0x4, &(0x7f0000000480)={0x0, 0x989680}, &(0x7f00000004c0)={[0x10001]}, 0x8) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/211, 0xd3}, {&(0x7f0000000300)=""/231, 0xe7}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f00000001c0)=""/225, 0xe1}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x700}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 2 (fault-call:2 fault-nth:17): syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 790.968485][T16620] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xb00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 791.067581][T16636] FAULT_INJECTION: forcing a failure. [ 791.067581][T16636] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 791.082357][T16636] CPU: 1 PID: 16636 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 791.093840][T16636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.104553][T16636] Call Trace: [ 791.108133][T16636] dump_stack+0x137/0x19d [ 791.113031][T16636] should_fail+0x23c/0x250 [ 791.117801][T16636] should_fail_usercopy+0x16/0x20 [ 791.122844][T16636] _copy_to_user+0x1c/0x90 [ 791.127934][T16636] simple_read_from_buffer+0xab/0x120 [ 791.133468][T16636] proc_fail_nth_read+0xf6/0x140 [ 791.138672][T16636] ? rw_verify_area+0x136/0x250 [ 791.143755][T16636] ? proc_fault_inject_write+0x200/0x200 [ 791.149890][T16636] vfs_read+0x154/0x5d0 [ 791.154143][T16636] ? __fget_light+0x21b/0x260 [ 791.159354][T16636] ? __cond_resched+0x11/0x40 [ 791.164709][T16636] ksys_read+0xce/0x180 [ 791.169925][T16636] __x64_sys_read+0x3e/0x50 [ 791.175216][T16636] do_syscall_64+0x4a/0x90 [ 791.181197][T16636] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 791.187432][T16636] RIP: 0033:0x41935c [ 791.191730][T16636] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 13:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x3, &(0x7f0000000540)=[{&(0x7f0000000180)="e1ae2870757d5b7afd05b6fdbc6e3ef3a8d5c2e3fc7c9ddf23969394fec93c1b67d17093c57378cda0b08a2d8492087f5de9c7bc7776bc96ac2b50f94c3cd347fbdf63e7ebd15f1d2b24b6185f4806c601a8e728ed88d81a2420513ba9021df4ec5676fcf8c40154c427b8689c", 0x6d, 0x6}, {&(0x7f0000000400)="df0fdd47883d0b6c9c346780de799c5c5f01bf2bd99f81a741cb92bb242d0d8919900fd37f63581f8be2f877214a4e58f7d1d4f87e91c4549b9810efc38b39f26f4aa3d9e1b3bbbc7b4eb1f679c392680fa9c32ea22d9a4844af26d4c0993f36d088975c", 0x64, 0x80}, {&(0x7f0000000480)="346b3edbf1fccf5b5eb1b756479396de6ad14bd68e67be697c915d133ef5895fe67ef405da03235080fb5806f1f7e91e8468f4b152eb48054ce884641f509777bb08ce3203870491c0bb923d9768ac70fcb2b980648e89beeaf194b7ccace1972f43f05c96023269b9d90c82155cfae2ee0efe53e50e976c8d8e2ddbe0cfc8a6c45d660916c9dd2b091fa762a0b528fa2682df9f6e2a6f0fca2b226302e478b27c413411be73684459e417", 0xab, 0x3}], 0xc00, &(0x7f00000005c0)={[{@nombcache}, {@data_err_abort}], [{@euid_gt={'euid>', 0xee01}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x36, 0x61, 0x32, 0x0, 0x34, 0x35, 0x32], 0x2d, [0x6a, 0x37, 0x65, 0x33], 0x2d, [0x37, 0x34, 0x35], 0x2d, [0x32, 0x36, 0x61, 0x6], 0x2d, [0x32, 0x33, 0xcb, 0x32, 0x61, 0x63, 0x33, 0x59]}}}, {@audit}, {@fsname={'fsname', 0x3d, '@:[*'}}]}) r2 = fork() ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000680)={0x0, 0x0}) ptrace$cont(0x20, r3, 0x8, 0xffffffff) 13:16:53 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x900}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 791.212720][T16636] RSP: 002b:00007f0be9525170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 791.221713][T16636] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000041935c [ 791.230222][T16636] RDX: 000000000000000f RSI: 00007f0be95251e0 RDI: 0000000000000003 [ 791.238453][T16636] RBP: 00007f0be95251d0 R08: 0000000000000000 R09: 0000000020000040 [ 791.246757][T16636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 791.255897][T16636] R13: 00007ffce3fc390f R14: 00007f0be9525300 R15: 0000000000022000 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x1000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 791.272988][T16648] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 791.309236][T16647] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 13:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/149, 0x95}, {&(0x7f0000000400)=""/83, 0x53}, {&(0x7f0000000480)=""/187, 0xbb}], 0x4, 0x2, 0x100) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x9) fallocate(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x1100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:53 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xa00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 791.439880][T16674] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x2000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:53 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xb00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) [ 791.484683][T16674] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close(r0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x3f00000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 791.590613][T16701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/191, 0xbf}, {&(0x7f0000000400)=""/22, 0x16}, {&(0x7f0000000440)=""/203, 0xcb}, {&(0x7f0000000540)=""/98, 0x62}, {&(0x7f00000005c0)}], 0x6, 0x401, 0x6) 13:16:53 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 791.639722][T16701] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:53 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x4000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:53 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xc00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) fallocate(r0, 0x0, 0x0, 0x0) r1 = openat(r0, &(0x7f00000000c0)='/proc/self/exe\x00', 0x101080, 0x1fd) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 791.794091][T16745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 791.824938][T16745] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xd00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = signalfd4(r0, &(0x7f00000000c0)={[0x1]}, 0x8, 0x800) fchmodat(r1, &(0x7f0000000100)='./file0\x00', 0x13) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0), 0x0, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x8000000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xe00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0), 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0x3d}], 0x2, 0x0) r2 = gettid() tkill(r2, 0x7) rt_sigqueueinfo(r2, 0x2f, &(0x7f00000000c0)={0x30, 0x3, 0x1}) r3 = gettid() tkill(r3, 0x7) sched_getattr(r3, &(0x7f0000000040)={0x38}, 0x38, 0x0) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x9effffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xec0}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f00000000c0)=""/194, 0xc2}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xa700000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x1100}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xeaffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x18, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x1200}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffff) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xefffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f00000000c0)) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x1235}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xf0ffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) dup(r3) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x2000}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xfeffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000004c0)={0x0, 0xfb, 0x8d, 0x1, 0xdf, "db4c2ef3ac383fffab367798d888cd68", "86e27a24d7c6277aed1f20f04b4e93d5275f5620942efd69d8bc7612c5a4bd508df1785fc9a0615296f5f656a604c1ca5b989ed8cc611a841fa44875398cf13cc2276bc21fdf4bec90f38c4c1422836988c12b654337c15b616f373781ddda10b12d96c20a1f1fe8c155191c9a7957ba83adcbdd162fe37d"}, 0x8d, 0x1) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000400)) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r4 = syz_open_pts(r2, 0x0) mmap(&(0x7f00004b4000/0x4000)=nil, 0x4000, 0x1000004, 0x10, r0, 0xc30f1000) ioctl$BTRFS_IOC_DEV_REPLACE(r4, 0xca289435, &(0x7f0000000dc0)={0x0, 0x80000000, @start={0x0, 0x0, "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", "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"}, [0x4b0d9635, 0x7f, 0xffffffffffffffff, 0x10001, 0xb2, 0xe, 0x0, 0x7, 0x6, 0x2000, 0xf45c, 0x0, 0x5db, 0x10000, 0x2, 0x9, 0x6, 0x10001, 0x10001, 0xbb, 0x5, 0x1, 0x80000001, 0x1, 0x8, 0x8001, 0x3, 0xfffffffffffffd55, 0x1, 0x9, 0x800, 0x101, 0x0, 0x9, 0x80000001, 0x6, 0x6, 0x7f, 0x1800, 0x6, 0x20, 0x813, 0xa78, 0x20, 0x100000000, 0xffffffff, 0x1, 0x1, 0xffff, 0x93, 0x1c0, 0x0, 0x7, 0x9, 0x0, 0x818, 0x7, 0x7, 0xfff, 0x6aa3, 0x4, 0xffffffffffffff25, 0x4000000000000000, 0x1]}) 13:16:54 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x2500}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:54 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffff7f00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:54 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:54 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000140)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/195, 0xc3}, {&(0x7f00000000c0)=""/69, 0x45}], 0x3, 0x0) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0xffffffff00000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x3512}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x4800}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f00000000c0)={@desc={0x1, 0x0, @auto="7e7327650dca914a"}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fchmod(r0, 0x108) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x3}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x4c00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x101000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r4 = openat$cgroup_ro(r0, &(0x7f00000008c0)='freezer.parent_freezing\x00', 0x0, 0x0) syz_open_pts(r4, 0x2441) preadv(r1, &(0x7f00000003c0)=[{&(0x7f0000000040)}, {&(0x7f0000000200)=""/228, 0xe4}, {&(0x7f0000000080)=""/42, 0x2a}, {&(0x7f0000000300)=""/145, 0x91}], 0x4, 0xe5c0, 0x8) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = fork() waitid(0x0, r5, &(0x7f00000000c0), 0xc0000001, &(0x7f0000000140)) r6 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000900)={0x8, 0x7702, 0x6, 0xe, 0x0, "aad2ebbd37d80f5035d0fb4527d304071e24f1"}) preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/137, 0x89}, {&(0x7f0000000580)=""/142, 0x8e}, {&(0x7f0000000640)=""/167, 0xa7}, {&(0x7f0000000700)=""/63, 0x3f}, {&(0x7f0000000740)=""/215, 0xd7}], 0x6, 0x2, 0x0) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x4}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x6000}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) statx(r1, &(0x7f0000000100)='./file0\x00', 0x6000, 0x100, &(0x7f0000000400)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = accept4(r2, 0x0, &(0x7f0000000100), 0x800) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000140), 0x10) sendto(r2, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) r4 = fsmount(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000005400)={'gre0\x00', 0x0, 0x80, 0x7, 0x81, 0x5, {{0x15, 0x4, 0x0, 0x8, 0x54, 0x67, 0x0, 0xf9, 0x4, 0x0, @rand_addr=0x64010102, @remote, {[@generic={0x8c, 0x6, "77dcece7"}, @end, @noop, @generic={0x44, 0x7, "7cb27c40b9"}, @generic={0x82, 0x4, "f568"}, @end, @timestamp={0x44, 0x8, 0xc1, 0x0, 0x5, [0x81]}, @end, @timestamp={0x44, 0x20, 0x27, 0x0, 0xe, [0x2, 0x20, 0x1, 0x17, 0x8, 0x7fffffff, 0x937]}]}}}}}) recvmmsg(r2, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x0, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36}, {&(0x7f0000000580)=""/11}], 0x0, &(0x7f0000000600)=""/76}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104}, {&(0x7f0000004140)=""/244}, {&(0x7f00000008c0)=""/230}, {&(0x7f00000009c0)=""/4096}, {&(0x7f00000019c0)=""/70}, {&(0x7f0000001a40)=""/14}], 0x0, &(0x7f0000001b00)=""/130}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @broadcast}}, 0x0, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096}, {&(0x7f0000002c80)=""/4096}, {&(0x7f0000003c80)=""/128}, {&(0x7f0000003d00)=""/24}, {&(0x7f0000003d40)=""/211}, {&(0x7f0000003e40)=""/113}, {&(0x7f0000003ec0)=""/96}], 0x0, &(0x7f0000003fc0)=""/27, 0xffffff39}}], 0x4000361, 0x100000002, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f00000000c0)="b1a3b983d63dd45e90185b547c4939e3", 0x10) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x5}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x6800}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x11000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f00000000c0)={0x1, {0x1, 0xffff, 0x1ff, 0x4, 0x7fffffff}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x6}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x12000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x6c00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) writev(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)="5d29f47a23c6639710d0d2be922fcd15c7397901de9e8fa636c7ae963c6eb1caf14d5662e5ccdb3f65e792f4f1fc505fa13dee82ca810790eb80d9ca12367715b467414f2e9e328bfa9fd684106b9e86008401ad4e35e1c15bb6256096caafb804f2f7b4b8dab2839ff1a2bc4f17a5c73ef7dc5c9802b9172fe03a1df49a8159ef82db9e2729a093ce52a31ca1c7ad26facc0e6f5ba84e2c69c8ad7773ba6d", 0x9f}], 0x1) r3 = fork() process_vm_writev(r3, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x7400}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x8}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x84) mmap(&(0x7f0000140000/0x2000)=nil, 0x2000, 0x4000000, 0x110, r0, 0x89795000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) ppoll(&(0x7f00000000c0)=[{r0, 0x400}, {r0, 0x81}], 0x2, &(0x7f0000000100), &(0x7f0000000140)={[0x9]}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfffffd28) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040), 0x4) close(r4) mmap(&(0x7f00007fa000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x33a2c000) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0x7a00}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:55 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:55 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15, 0x0, 0xc00e}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:55 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140), 0x103000, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="232120202e5d5e5d2d0a7af86e4dddf1e8eced755d08547758705f88146b5aca4b283907a97803296784e63cc7571b77d7681e7ef917809a80590708111cc8c58f8863c8712bbfb43ef9242a60295f0e0249adef8fd74f42b279f15523ea86ef682fd0a07fd02b0c8ac33ef6c27a66d3e63b3abcb39b785ef58b9733"], 0x95) r2 = fork() process_vm_writev(r2, &(0x7f0000000400)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/230, 0xe6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000000c0)=""/70, 0x3}, {&(0x7f0000000480)=""/55, 0x29}, {&(0x7f0000000180)=""/78, 0x4e}], 0x6, &(0x7f0000000d80), 0x0, 0x0) 13:16:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x2}}}}, 0x20}}, 0x0) 13:16:56 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xb}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x13) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) r1 = fork() ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) pipe(&(0x7f00000043c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(r1, &(0x7f0000004400)='numa_maps\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000004440)=0x0) lstat(&(0x7f0000004480)='./file0\x00', &(0x7f00000044c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000004540)=0x0) sendmsg$unix(r0, &(0x7f0000004680)={&(0x7f0000000680)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f00000019c0)="ec99879fd2a9adce1e671c6a55b64e777835f207eef87aafb6364992979992c5a210bd8805c45bad518386e27159570d88214c698e42ea2aba64ab087e116fb4af5d22a62162c9c537e07e8b7c09db7b04cbd47e5488bdc00d144f8639203b892f7344", 0x63}], 0x1, &(0x7f0000004140)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32, @ANYRESHEX=r3, @ANYRES32, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRESOCT=r7, @ANYRES32=r3, @ANYRES32=r5, @ANYBLOB="1c000000000000000100020002000000", @ANYRES32=r6, @ANYRESDEC=r4, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xe0, 0x4000000}, 0x4000801) process_vm_writev(r1, &(0x7f0000000180)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000000c0)=""/184, 0xb8}], 0x4, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000400)=""/209, 0xd1}], 0x2, 0x0) r10 = socket(0x10, 0x803, 0x0) sendto(r10, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r10, 0x1, 0x10, &(0x7f0000000280)=0x85aa, 0x4) recvmmsg(r10, &(0x7f0000004000)=[{{&(0x7f0000000400)=@nfc, 0x80, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/36, 0x24}, {&(0x7f0000000580)=""/11, 0xb}], 0x2, &(0x7f0000000600)=""/76, 0x4c}}, {{&(0x7f00000040c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000740)=""/104, 0x68}, {&(0x7f00000007c0)=""/244, 0xf4}, {&(0x7f00000008c0)=""/230, 0xe6}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000500)=""/74, 0x4a}, {&(0x7f0000001a40)=""/14, 0xe}], 0x6, &(0x7f0000001b00)=""/130, 0x82}}, {{&(0x7f0000001bc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/128, 0x80}, {&(0x7f0000003d00)=""/24, 0x18}, {&(0x7f0000003d40)=""/211, 0xd3}, {&(0x7f0000003e40)=""/113, 0x71}, {&(0x7f0000003ec0)=""/96, 0x60}], 0x7, &(0x7f0000003fc0)=""/27, 0x1b}}], 0x3, 0x100000002, 0x0) sendto$unix(r10, &(0x7f00000001c0)="53057583cfd3919793869b95ca4184cdefec23abd6283b2cb9b0bfbaceaccd314fb2c5cfc3bb5f2fa1ee7280ccea137e3766c929169d9b9ebdfac071620a", 0x3e, 0xc0, 0x0, 0x0) 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x10}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x25000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x4}}}}, 0x20}}, 0x0) 13:16:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x420800) write$sndseq(r1, &(0x7f0000000400)=[{0x7, 0x0, 0x3, 0x1, @time={0x3ff, 0x4}, {0xd6}, {0x7, 0x1d}, @connect={{0x5, 0xfc}, {0x44, 0x9}}}, {0x9, 0x0, 0x1f, 0x7, @tick=0x1, {0x80, 0x6}, {0x2, 0x3}, @time=@tick=0x8}, {0x8, 0x7, 0xc0, 0x9, @tick=0x9, {0x0, 0x1}, {0x3, 0x80}, @queue={0xec, {0x2, 0xab}}}, {0x5, 0x8, 0x8, 0x19, @time={0x7, 0x4}, {0xaa, 0x4}, {0x3f, 0xbc}, @quote={{0x0, 0x9}, 0xff3f, &(0x7f0000000140)={0x3, 0x3, 0x6, 0x1, @time={0x6, 0x81}, {0x1, 0xf0}, {0x5}, @raw32={[0x1, 0x8]}}}}, {0x5, 0x7, 0x2, 0x8, @tick=0x7ff, {0x5, 0x8}, {0x1, 0xfc}, @time=@tick=0x4}], 0x8c) r2 = fork() preadv(r1, &(0x7f0000000800)=[{&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/83, 0x53}, {&(0x7f00000006c0)=""/157, 0x9d}, {&(0x7f0000000780)=""/62, 0x3e}], 0x4, 0x7, 0xf97) process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f00000000c0)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) mmap(&(0x7f0000131000/0x3000)=nil, 0x3000, 0x7, 0x100010, r0, 0x2d426000) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f00000001c0)='g', 0x1}], 0x1, 0x0) readlinkat(r3, &(0x7f0000000180)='./file0\x00', &(0x7f00000004c0)=""/74, 0x4a) 13:16:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffffffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x11}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 794.051963][T17201] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x5}}}}, 0x20}}, 0x0) [ 794.131300][T17201] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa7}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:56 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 794.246788][T17240] netlink: 'syz-executor.4': attribute type 153 has an invalid length. [ 794.267794][T17240] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) fork() syz_open_pts(r2, 0x0) mmap(&(0x7f00006ba000/0xa000)=nil, 0xa000, 0x100000d, 0x10, r2, 0x75438000) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x6}}}}, 0x20}}, 0x0) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x500}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x600}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 795.033836][T17271] netlink: 'syz-executor.4': attribute type 153 has an invalid length. [ 795.047571][T17269] EXT4-fs: 172 callbacks suppressed [ 795.047585][T17269] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 795.068902][T17271] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x8, 0x10, r0, 0x33124000) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x9) fallocate(r1, 0x0, 0x0, 0x0) fchmodat(r1, &(0x7f0000000180)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) sendfile(r3, r1, &(0x7f00000001c0)=0xfffffffffffff001, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = fork() process_vm_writev(r4, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x55, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000140)) r5 = open_tree(r0, &(0x7f00000000c0)='./file0\x00', 0x1801) openat(r5, &(0x7f0000000100)='./file0\x00', 0x608000, 0x9f) [ 795.085796][T17272] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 795.096325][T17273] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 795.107527][T17282] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 795.122880][T17286] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x7}}}}, 0x20}}, 0x0) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 795.138943][T17288] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 795.210946][T17306] netlink: 'syz-executor.4': attribute type 153 has an invalid length. [ 795.230848][T17306] netlink: 'syz-executor.4': attribute type 153 has an invalid length. [ 795.244008][T17303] EXT4-fs (sda1): Invalid want_extra_isize 0 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x8}}}}, 0x20}}, 0x0) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) r5 = getpid() sched_setaffinity(r5, 0x8, &(0x7f0000000500)=0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@private2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) sendmsg$netlink(r0, &(0x7f0000000680)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x400000}, 0xc, &(0x7f0000000180)=[{&(0x7f0000000400)={0x130, 0x3b, 0x400, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x8f, 0x0, 0x0, @uid=r2}, @generic='~', @nested={0x80, 0x8e, 0x0, 0x1, [@typed={0x63, 0x45, 0x0, 0x0, @binary="a0db6d1ea657c34b1ad8e5a9e00fa92b75a336297417f0a8a6e9f6f07b9ca38b4569078d40839082630a71269f7f2eb6813ccd063267198ac831ba920c70d5666b65cc2ab685033277b06c51c8393dd07d5908d43ce720915d33d3f6708261"}, @generic, @typed={0xf, 0x30, 0x0, 0x0, @str='-(.@{&#\xe5@:\x00'}, @typed={0x8, 0x85, 0x0, 0x0, @ipv4=@multicast1}]}, @typed={0x93, 0x6d, 0x0, 0x0, @binary="1c3f1e83313d79c6c885a57e15aee1e2bd4cf61a9799a126bc8da8601dfb388525733e1bf85a79b2f55d8d1ace1d661d5389aa0115b6b20528e60f63fbc8d542b5b45254a274a0a78281f85a5af149de10eac3bf982447a817a234a1a22af6b238f7068bbfa94679b8b7cb7edd3d78a5cfe82164fc2991134cf690bf74a6b5f5a49c04dc13f3b942341a167e55a804"}]}, 0x130}], 0x1, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {r1, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6}}}], 0x40, 0x40000}, 0x40000d0) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x900}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 795.258217][T17310] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 795.267726][T17314] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 795.295021][T17320] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 795.354682][T17327] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:57 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x20e42) r1 = syz_open_dev$vcsn(&(0x7f0000002780), 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000001c0)=0x6) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000004, 0x8010, r3, 0xe1b15000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000724000/0x4000)=nil, 0x4000, 0x2000008, 0x4010, r2, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000180)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10000, 0x0, {0x3}}, 0x6) r5 = fork() process_vm_writev(r5, &(0x7f0000000140)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}, {&(0x7f00000000c0)=""/77, 0x4d}], 0x4, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 795.416655][T17327] netlink: 'syz-executor.4': attribute type 153 has an invalid length. 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x60000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x9}}}}, 0x20}}, 0x0) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xb00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) lchown(&(0x7f0000000140)='./file0\x00', r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r3, 0x5000943f, &(0x7f0000000dc0)={{r5}, 0x0, 0xc, @inherit={0x68, &(0x7f0000000180)={0x0, 0x4, 0x1, 0x0, {0x20, 0x3, 0xfff, 0x7fffffff, 0x9}, [0x101, 0x7, 0x0, 0x80]}}, @subvolid=0x1}) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f00000000c0)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = fork() process_vm_writev(r6, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0xa}}}}, 0x20}}, 0x0) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x1100}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0xb}}}}, 0x20}}, 0x0) 13:16:57 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:57 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x85) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f00001f5000/0x3000)=nil, 0x3000, 0x1000003, 0x10010, r0, 0x10000000) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_WRITE_FIXED={0x5, 0x4, 0x2007, @fd_index=0x3, 0x6, 0x56, 0x9, 0x18, 0x1, {0x0, r2}}, 0xd40a) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) fsetxattr$trusted_overlay_nlink(r3, &(0x7f00000001c0), &(0x7f0000000740)={'L+', 0x9}, 0x16, 0x4b49f924eab87ee8) r4 = fork() r5 = fsmount(r0, 0x1, 0x4a) preadv(r5, &(0x7f0000000800)=[{&(0x7f0000000100)=""/34, 0x22}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/104, 0x68}, {&(0x7f0000000400)=""/236, 0xec}, {&(0x7f0000000500)=""/212, 0xd4}, {&(0x7f00000001c0)}, {&(0x7f0000000600)=""/24, 0x18}, {&(0x7f0000000640)=""/235, 0xeb}], 0x9, 0x1, 0x10000) process_vm_writev(r4, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x2000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x18000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0xd}}}}, 0x20}}, 0x0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x3f00}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000100)=0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000dc0)={{r1}, r2, 0x1, @unused=[0x0, 0x4d, 0x9, 0xffff], @devid}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = fork() process_vm_writev(r3, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 795.919302][T17441] __nla_validate_parse: 28 callbacks suppressed [ 795.919315][T17441] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x4000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0xe}}}}, 0x20}}, 0x0) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa700}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 795.996613][T17441] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = io_uring_setup(0xef, &(0x7f0000000140)={0x0, 0xc968, 0x0, 0x2, 0x8f}) flistxattr(r1, &(0x7f0000000400)=""/167, 0xa7) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r3, 0x4e, 0x80000}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = fork() prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) process_vm_writev(r4, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x22000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 796.073936][T17470] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x34000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 796.122680][T17470] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x10}}}}, 0x20}}, 0x0) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x400300}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x1000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 796.289108][T17506] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x11}}}}, 0x20}}, 0x0) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'vlan0\x00'}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xfffffffffffffee8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x2000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 796.469364][T17548] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x3000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/206, 0xce}], 0x2, 0x0) 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x12}}}}, 0x20}}, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x4001}}}}, 0x20}}, 0x0) [ 796.624556][T17575] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x4000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:58 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:58 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x1ff, 0x0) fchmodat(r2, &(0x7f0000000100)='./file0\x00', 0xa0) 13:16:58 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 796.725628][T17596] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:58 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x5000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x6000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 796.872970][T17623] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 796.907518][T17623] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x2}}}}}, 0x20}}, 0x0) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x3}}}}}, 0x20}}, 0x0) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x1010, r2, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = fork() process_vm_writev(r3, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/240, 0xf0}, {&(0x7f00000000c0)=""/78, 0x56}], 0x3, &(0x7f0000000d80), 0x8, 0x0) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x8000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x4}}}}}, 0x20}}, 0x0) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffff0f, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffefff, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r2, 0x0) fcntl$setflags(r2, 0x2, 0x0) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x5}}}}}, 0x20}}, 0x0) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e400"}) syz_open_pts(r1, 0x0) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x200) mmap(&(0x7f0000506000/0x3000)=nil, 0x3000, 0x0, 0x13, r1, 0x6bc1e000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r3, 0x0) ioctl$KDSKBENT(r3, 0x4b47, &(0x7f00000000c0)={0x3, 0x61}) process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x6}}}}}, 0x20}}, 0x0) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xb000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000000c0)={0x0, @aes256, 0x0, @desc3}) process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x5, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00006bc000/0x3000)=nil, 0x3000, 0x3000008, 0x110, r0, 0x11b35000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000dc0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0xed, 0xf8, 0x4, 0x3, 0x3, 0xffffffc1, 0x375, 0x40, 0x20d, 0x6df, 0x200, 0x38, 0x1, 0x7ff, 0x4, 0xff}, [{0x3, 0x3, 0x1, 0xff, 0x1, 0x7fff, 0x80000001, 0x6}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1978) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x10000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x7}}}}}, 0x20}}, 0x0) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:16:59 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:16:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x11000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:16:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x8}}}}}, 0x20}}, 0x0) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 797.844973][T17818] ================================================================== [ 797.853985][T17818] BUG: KCSAN: data-race in list_lru_add / list_lru_count_node [ 797.862178][T17818] [ 797.865390][T17818] write to 0xffff888100c666e8 of 8 bytes by task 1773 on cpu 0: [ 797.873978][T17818] list_lru_add+0x26d/0x2c0 [ 797.879017][T17818] retain_dentry+0x226/0x260 [ 797.883720][T17818] dput+0x3d/0x360 [ 797.887734][T17818] path_umount+0xde/0xa70 13:17:00 executing program 5: ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000400)={0x10d5, 0xdb0, 0x5}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)={0x282000, 0x0, 0x11}, 0x18) recvmmsg(r0, &(0x7f0000005180)=[{{&(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000004700)=[{&(0x7f0000000680)=""/117, 0x75}, {&(0x7f0000000800)=""/115, 0x73}, {&(0x7f0000004240)=""/252, 0xfc}, {&(0x7f0000000700)=""/14, 0xe}, {&(0x7f0000004340)=""/246, 0xf6}, {&(0x7f0000004440)=""/247, 0xf7}, {&(0x7f0000004540)=""/170, 0xaa}, {&(0x7f0000004600)=""/227, 0xe3}, {&(0x7f0000000880)=""/37, 0x25}], 0x9, &(0x7f00000047c0)=""/74, 0x4a}, 0x40}, {{&(0x7f0000004840)=@tipc=@id, 0x80, &(0x7f0000004c80)=[{&(0x7f0000001c40)=""/58, 0x3a}, {&(0x7f00000048c0)=""/150, 0x96}, {&(0x7f0000004980)=""/176, 0xb0}, {&(0x7f0000004a40)=""/176, 0xb0}, {&(0x7f0000004b00)=""/147, 0x93}, {&(0x7f0000004bc0)=""/178, 0xb2}], 0x6, &(0x7f0000004d00)=""/133, 0x85}, 0x2}, {{0x0, 0x0, &(0x7f0000004e80)=[{&(0x7f0000004dc0)=""/163, 0xa3}], 0x1, &(0x7f0000004ec0)=""/37, 0x25}, 0x4}, {{0x0, 0x0, &(0x7f0000005040)=[{&(0x7f0000004f00)=""/221, 0xdd}, {&(0x7f0000005000)=""/14, 0xe}], 0x2, &(0x7f0000005080)=""/224, 0xe0}, 0x5}], 0x4, 0x0, &(0x7f0000005280)) r2 = fork() r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f0000000000)="120000001a00e5ff007b00000000008000a1", 0x12, 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b40), 0x20402, 0x0) recvmsg(r4, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000b80)=""/63, 0x3f}, {&(0x7f0000000bc0)=""/55, 0x37}, {&(0x7f0000000c00)=""/243, 0xf3}], 0x3, &(0x7f0000000dc0)=""/121, 0x79}, 0x20) recvmmsg(r3, &(0x7f0000004000), 0x0, 0x100000002, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000e40)) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000002d00)=ANY=[@ANYBLOB="000000005d7b4ca02c268a6a5e58a3b3c91004035fa54e2fe4dc9a108c7d506ed05c6086f2f05beb8bad44eff44b000000000000000020fd6807a829d159c5a353cfe84de5cf1d0fcd4686ffa978b5d2a70885b2412d3ebdbf5cff726bd272bf1c64c03d63d593835adbcb46efd617d7c49145e81a75bf2e9a0a2754861f60330e23f91fe039595ded91c750fed89281183c57037ff3906f3c05b252cb70ecccf7db24bf1bac2adfd768c182b8621e", @ANYRES16=0x0, @ANYBLOB="08002852b03f28d7f6ad1f6005e7bf6942bd7000ffdbdf2501000000080032000100000005004425972b670ed89952d302a8090beaed04b78f7502ff10c76da723ee445ab6801b42b420dfa8da86696b19796513969deb501a42e5e17743b58412858b9358bd2ea8ca9e175615246d062b3d1aacc07b06f94ef6411ffa0d9effffffffbbd854d39e778b5e339993ccf3326c4e999ff82420c513132e913e"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) bind$packet(0xffffffffffffffff, &(0x7f0000000140), 0x14) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000001300)="2a608e217be90448475295036acb7b1f7b610f8a8a0a17b87acbc89e3e034e97c6372e8be6e288c1ae77e1c75d7af71d5748c132aee9cc25435cade4dfb6f5b9813165f632287e316b40982dae65033c3417084cefb68cdd59f599", 0x5b}, {&(0x7f0000001380)="6dcd4db08e9834bd9f43aed05d35ab61dc2f0702", 0x14}, {&(0x7f00000013c0)="cd4eedb3746eea1672c2450ca50a6511f985d87de95462dc3f6afe168e1247498bdbe4bac4b8a01d56238b5c06c11f4b744f3ac76ca02494cafa518f53c2e030e328cde2d7fd6e1b2fec8c6c5a8cd87202c061f63b973bfb0e936c55fb59d8b15dc61b1c3e8e9db9c482d890ccaae53fac5282f1d2eb997d30d3ba6901b339294b9241f698212199bb9fbb0ba1dd2feca79f0bd73aa8601549ab463234ed0edc939819d8ca229ccb6b0e126476fd4c5e830d17d895961180ef4d9ba88cc702544e6526bf786ea16727bd05d0183df61f10061110", 0xd4}, {&(0x7f00000014c0)="a08da7f80b10c2a4691a16be05f1876229956b50ba0051a5b2b90aca0d519e894fc2ce7edf4af4b32b45eca866133e8811a9b2b73f2421a9a2c1d7cd916f01748ba81cfdfce3772dfc83fb53818eb510cc969d01d2fb92d76a7674489bd3fe7cd1d6068146319374b3a4351bdf6da1ff01b40a909ea9394bd4681581f918cd908985b6292cb8f2204ab5e1bf643ed4f2c583e16dfa8abf59203d5a5d2af2bdcd6a2ffc1c9384da0488b8f7b82ac7707473d4b288d37e20b3a71ed8969fed27f2da8d942e55b1a79057aea5b6814d22a3c5f16037af9ee2435680d00de9537357698f66f186fa3aa84f210df0ed64", 0xee}, {&(0x7f00000015c0)="5b612901eefb5485cdf14626d9d4038fd621fb668b705c42398b9fda6de4915cd6e9d15899323d8d6e635e119af4f12da4b5e7b1ca8adbb0ca728595d5f0dc8d9e5a95b60ed5da96b3079b1f47da9b0208c609ff0156cf936fe61b2a3f54e12a80619e2f61daaa557bb467941abb6475cfd3d119db47828ef653cd3e3484c6913fa35331d4c9c83252e7e4eb3da24d61dde4129293e70e182355c9f56703e4034bcac2cf361e0319d08d5fa8b8a0b0322f82", 0xb2}, {&(0x7f0000001680)="d209e5fc211421e392db248e", 0xc}], 0x6}}, {{&(0x7f0000001740)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000001900)=[{&(0x7f0000001780)="dc965f5096d0ebba6d9c5c4222c71a0089e1891a92180f9cf119881eb1595eb532097693a11d9bec4c78f02d1bec68f7bd30e07955a2a4ffc3d9fd23848615ca2b", 0x41}, {&(0x7f0000001800)="9f180fe7de47fa6ebe2f912d9c44bb5d03e24462da83cefadb071d1b0545a70ed126873c29", 0x25}, {&(0x7f0000001840)="5c3cb7195eaf16e85ebde14b1b2be770ccda3903227d102928fcd9c7148ee942c3c00e97213df775e09980f743062df46ed2796daef10544c56c3ab9581b7ce4fae1208ed16a81fa3c98c0611fdcbed48860bd829e2688f50d1ffa4ef729c5b3f613952336b43c8acff0f0e738f7dc8e8c2049c7a646631b8715240fee5ec86c47cf3154f38ee43c7f5944bde8206064b12a0f0189b6c957caaef3d22cc6cbeeb949fec5eb16e233b8ac52e5d33b2de5c8d8f046b87c02d4cf74d774dbc60c4d", 0xc0}], 0x3, &(0x7f0000001940)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @rand_addr=0x64010100}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_retopts={{0xd4, 0x0, 0x7, {[@rr={0x7, 0x13, 0xbc, [@local, @multicast2, @empty, @private=0xa010102]}, @cipso={0x86, 0x37, 0x3, [{0x5, 0x5, "67009c"}, {0x0, 0xc, "1389a8ef53e4ab78b0a2"}, {0x0, 0xb, "b34a28f0f24d947108"}, {0x5, 0x8, "701bf6bea073"}, {0x5, 0xd, "d91477ca18477b25c4f196"}]}, @timestamp={0x44, 0x14, 0xb0, 0x0, 0xb, [0x9, 0x3, 0x800, 0x80000000]}, @lsrr={0x83, 0x1f, 0xfc, [@broadcast, @rand_addr=0x64010101, @broadcast, @remote, @multicast2, @private=0xa010102, @remote]}, @timestamp_prespec={0x44, 0x24, 0xcd, 0x3, 0x2, [{@remote, 0x2}, {@remote, 0x20}, {@local, 0x9}, {@multicast2, 0x3ff}]}, @noop, @timestamp={0x44, 0x14, 0xbd, 0x0, 0x5, [0x7f, 0x6e2, 0x5, 0x1000]}, @timestamp={0x44, 0xc, 0x6c, 0x0, 0x5, [0x2, 0x1]}]}}}], 0x130}}, {{&(0x7f0000001a80)={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)="2e41a17e0d811f3699e8a88dc059e51677556551b21999bb5e1a8368a543939758708b00038f6829ef5a5d86ed239a53fe4d1d62e6d299282873b57df62407e5afbffb27e6388e0234211cc92d40e7a39e19d7448a5544f34bf6e786a9cf44fdc5289cb11b3d455ffd1f5eded5a26c79dbbf76ed5cb48857318bf43f0c9222492b7bb8dd8433a9b366b54973bb19a21603136537088d9ce98404f78c71ca954e1c90b4aa2158f428b5672e2b7eaad3ce2df234277f840fdcb2a274b408ddc75406f2af18a86619c602d5dd8704", 0xcd}], 0x1, &(0x7f0000001c80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_retopts={{0xbc, 0x0, 0x7, {[@ssrr={0x89, 0x1b, 0x4e, [@empty, @multicast2, @loopback, @dev={0xac, 0x14, 0x14, 0xd}, @broadcast, @multicast2]}, @ssrr={0x89, 0x23, 0xa7, [@loopback, @loopback, @remote, @loopback, @empty, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}, @cipso={0x86, 0x46, 0x0, [{0x6, 0x6, "f9b15cba"}, {0x6, 0xf, "420abf7916d76f2cac3949a914"}, {0x5, 0xe, "ffd365381a9a48d65b33908c"}, {0x0, 0xa, "5543cd8fbf52ff22"}, {0x2, 0x9, "98a1cabcc3e1b4"}, {0x2, 0xa, "d8c0f7589a51ce08"}]}, @noop, @timestamp_addr={0x44, 0x24, 0xc3, 0x1, 0x2, [{@empty, 0xffffffff}, {@empty, 0x40}, {@multicast2, 0xab9e}, {@private=0xa010101, 0x8000}]}]}}}, @ip_retopts={{0xa4, 0x0, 0x7, {[@cipso={0x86, 0x3d, 0xffffffffffffffff, [{0x1, 0x2}, {0x1, 0xd, "642ce87631c9acce2d95e4"}, {0x5, 0x3, "03"}, {0x2, 0x9, "98ad8930327864"}, {0x6, 0x5, "d63c20"}, {0x7, 0x11, "ab926ce7480c8727e8e295e2c86efa"}, {0x1, 0x6, "019963c5"}]}, @timestamp_addr={0x44, 0x14, 0xc, 0x1, 0xc, [{@private=0xa010102, 0x8}, {@dev={0xac, 0x14, 0x14, 0x2e}, 0x7fffffff}]}, @cipso={0x86, 0x27, 0x2, [{0x2, 0x11, "c76f0af6febe90273f3b61a7d412de"}, {0x3, 0x7, "b13a851add"}, {0x2, 0x9, "e98ed9c387c1c4"}]}, @timestamp={0x44, 0x18, 0xec, 0x0, 0xa, [0x9b2, 0xfffffc00, 0x7, 0x5, 0x4]}, @noop]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x95d9}}], 0x1d0}}, {{&(0x7f0000001c00)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000002040)=[{&(0x7f0000001e80)="e533c631d9cc441f55eaf575c4569c864dd773faa93c2f3cee85642d4d1ea0a4d49b614d9dd2339e740b37f52595f7c30750e467a40c8fc3850b248c3ca51f8633c8c1ff235525b297e9b5b71ef11d6abdc8db5905fd7cf33d535337499c7c378fda08b8e5d96fd91cc225066dcf9f990db93f5f1e428c492e61f84b127a7d16ec036816af81afd8c07e5f67a1", 0x8d}, {&(0x7f0000001f40)="2fba0940761596f0dff6adba36f7f8a28df7baf327ed816591c384b87736896e620ba2ac4c470b3bef9530c3c663b37529b806faa2b99a8c16a38a7d852a92c3567010fbcee5f298a921a1ab3553bd52f8c6cb0dff3728be2a475205445155fc44cdf43d1351f6a4118ce0b9cdc1ff906081c8016778f05d80a2b8bc9aa0f9f530f7fccb49cd343f831437fa4577bba5cda89dcf053b8f9905132320ca06b9561f994b00e15100c250ad068a78f1111709c418c6e5acce865f70d700213840bf64cc034c28609425a8e72e633256f31ee42a7d3f86cd415e96c416337548517d6c3d3c0464794f9107bcc66315023718e9ca359e24ca", 0xf6}], 0x2, &(0x7f0000002080)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x18}}, {{&(0x7f00000020c0)={0x2, 0x4e21, @rand_addr=0x64010102}, 0x10, &(0x7f0000002280)=[{&(0x7f0000002100)="1db1c9179c654d6ee48af58dd9be864a2604b9009900dfff97c216dbecb1237e888fba9cc6933e862172da0e7aa3e19882341da46943a3563855a7989f1713ce21de30c965df91c9f4b9c4ce4c37cda4da95493ef25f6a5b5da2c6ed17956425cdd522ce9dbf0d0bee912bbab9801449c72a8fc4e5d85bd8a8eeb56e6cb32606e9e0cf142f5eb0e5f6dda844a2188c60c5ae976460358216a93496ee0a53fae556c4470979b22f5a145152027e2dfed937df78e5eed26b4657d2c526f32bfd", 0xbf}, {&(0x7f00000021c0)="7fe90f9e5df2b9cfdd40f55824277cb60930e3faf1635215ed2518cd8adad79718c39c3fb2ecf90dc53e68ce31daaab48eb5607015f0e67f8c5425a26b4699de52c399598547cb1804cd886abea9bd9aa4076aef9c960b60c28468e1766c2495ded5c3be074dcf375c24942b11", 0x6d}, {&(0x7f0000002240)="d8e8fdbede50009e89c612e2b9901a320dde23c8", 0x14}], 0x3, &(0x7f00000022c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102}}}], 0x20}}, {{&(0x7f0000002300)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002740)=[{&(0x7f0000002340)="8a330fb15eee2f652f11b931e8386b54624e3ca32c347c4e3b5a6d634dc7d461d7c9880fe195364a532fe970675a3963f277e65567f3b77d7577317c81df9801f2bdfc641f0b56196596484e8904b684a1cb541fff191c689630eb65d64054c59523f4ebc29e9a7340dd705c10", 0x6d}, {&(0x7f00000023c0)="f096d18abd1865f3dd0ed04578c73a01def4915b089d2e502b66a57c02d8c43148a8ef4e38c029cf6ae1c7c5805cccdaebe9eb29446eb2039ef06c33293024cb4bcd6edec67af97012bce176cf9207e7e62d413254cc07e1b656c3e43088bcebf2c8b3ef6710acf3d8ae1843f5dbebe6de2aa1d9556c835b3ad5b123950c19c09ab897a068773d1ab3634483e76194bb9fecb912294a9bc7ca9b925c97cf1d69f2353207e2e03f3573feab6cfd614ee2ba1511bdad73f8925261081d5060faf71fe0c8d33873ffadc25034d99fea810ce7746eedd0047fc3fb50991a13ec3b3a9d45", 0xe2}, {&(0x7f00000024c0)="522d56a2fd3cc29cf38454831b28026097cdab58c88221ececdc4a910e0d6dff34ea7705f1b60561db96e63ec3dde35ec2aa", 0x32}, {&(0x7f0000002500)="14d669b488704781f65c284ecb2d0e4e542fa1b0836c1aa5db26294ea756e6672c4d0e2f6cf233d9ec7d84e7b516df2a2d57", 0x32}, {&(0x7f0000002540)="3e8483dfc03388e43dfd7c833dd49a92ed1cb251db5b11a838127c3499c83fe3936929742fa2257d2ea7b39679e889139f2133615fd7686c006c3cb366eb57f4af1b3be249976a214075b182d5a9e7d4473334ccf2d5b80842c816aaa795a56afce5eb7138f459231c7225c7276dacf81180dda361c88e4a9b91613147431cde9a80aefe81c143d4daf6ef4713a56665b369", 0x92}, {&(0x7f0000002600)="3f183b8ec9c40bd8bd145ac56dadf60fa761b85c685b2e24fb0747e6a3c0be5436dde50906c62ccfe8c14eb314191eee02357e3da7ee611e609b3f885e251945d7153f2095f6", 0x46}, {&(0x7f0000002680)="02b57b2e43e616687f6831c3579cde33583424376ec4db3f45b73e87d2cd038d63f5021528c4ae1c1e5bf6f350863e26390183d4560e9dd9997cc14ccec2fb040f9b71e2ad0e59798961d49eb7f836718d712c3c5977adf0cbf5e8106e7816d5b564ff880c5da5cd896c0bf1d970dd961023407c8a1aa8c390db34fd57275267b1cfbb75756721bfdc9abe988cfbdb3052915dc498dbd949a14dfbca8b68bd035892d73b22b6f8ce4ce984704385c6545ddd7953184f", 0xb6}], 0x7, &(0x7f00000027c0)=[@ip_retopts={{0x40, 0x0, 0x7, {[@lsrr={0x83, 0x17, 0xf2, [@remote, @local, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102]}, @cipso={0x86, 0x17, 0x1, [{0x0, 0xf, "dbc80109e1a826fdcc12ea4a57"}, {0x0, 0x2}]}]}}}, @ip_retopts={{0x78, 0x0, 0x7, {[@timestamp={0x44, 0x8, 0x9e, 0x0, 0x8, [0x1000]}, @noop, @lsrr={0x83, 0x23, 0xbb, [@multicast2, @multicast2, @rand_addr=0x64010102, @broadcast, @remote, @rand_addr=0x64010102, @empty, @broadcast]}, @generic={0x86, 0x7, "e2f2d80a37"}, @timestamp_prespec={0x44, 0x34, 0xa7, 0x3, 0x0, [{@remote, 0x8}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x809}, {@private=0xa010102, 0x5}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@local, 0x3f}, {@remote, 0xf80000}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3b}}], 0xe8}}, {{&(0x7f00000028c0)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002a00)=[{&(0x7f0000002900)="1d480cf9b43561e6d11a3fd439c0101c174882553a6d15728e991da81cd502b64812d763386cd8a93214020951233a36d87e5b6adf9f1647f912c9019a9b5627990e7d381c925eae9a36dcd930d5ee6e686f9511b0a912510285e6a2ff7c07cfd6ddb7aa00b6efa37921f23d665d251640", 0x71}, {&(0x7f0000002980)="78feb4a7025816f8d633d9dc7a3e1dc39f2f1199f961443d4f48c8b68459457d6560f712829ea44c37a3f75b2f6608ad26d9ee72b611767bc7bfd01af11c1931fa96f3bfe7b3d6a8ae1c4049eb3a45bd", 0x50}], 0x2, &(0x7f0000002a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @private=0xa010102}}}, @ip_retopts={{0x80, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x17, 0x50, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @broadcast, @broadcast]}, @timestamp_prespec={0x44, 0x14, 0xab, 0x3, 0x4, [{@loopback}, {@empty, 0xff}]}, @timestamp_addr={0x44, 0xc, 0xc2, 0x1, 0xb, [{@rand_addr=0x64010100, 0xffff}]}, @timestamp_addr={0x44, 0x14, 0x9f, 0x1, 0x1, [{@local, 0xff}, {@dev={0xac, 0x14, 0x14, 0xe}, 0x101}]}, @timestamp_prespec={0x44, 0x24, 0xc6, 0x3, 0x5, [{@private=0xa010101, 0x2}, {@rand_addr=0x64010101, 0x1}, {@dev={0xac, 0x14, 0x14, 0xc}}, {@private=0xa010102, 0x3}]}]}}}, @ip_retopts={{0x30, 0x0, 0x7, {[@lsrr={0x83, 0x1f, 0xfc, [@broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x26}, @dev={0xac, 0x14, 0x14, 0x3f}, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, @rand_addr=0x64010102]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xbc8e}}], 0xe8}}], 0x7, 0x0) process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), r0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r0, 0x89f5, &(0x7f0000000440)={'syztnl2\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x3f, 0x8, 0x64, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1, 0x700, 0xf73f, 0x646c, 0x8}}) preadv(r1, &(0x7f00000011c0)=[{&(0x7f0000000e40)}, {&(0x7f0000000e80)=""/22, 0x16}, {&(0x7f0000000ec0)=""/232, 0xe8}, {&(0x7f0000000fc0)=""/219, 0xdb}, {&(0x7f00000010c0)=""/105, 0x69}, {&(0x7f0000001140)=""/86, 0x56}], 0x6, 0x5, 0xbf1) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000004c0)={&(0x7f00000008c0)={0x68, r5, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0xf9}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x20}, @ETHTOOL_A_LINKINFO_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x15) [ 797.892385][T17818] __x64_sys_umount+0xa6/0xd0 [ 797.897079][T17818] do_syscall_64+0x4a/0x90 [ 797.901686][T17818] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 797.907862][T17818] [ 797.910237][T17818] read to 0xffff888100c666e8 of 8 bytes by task 17818 on cpu 1: [ 797.919232][T17818] list_lru_count_node+0x28/0x30 [ 797.924709][T17818] shrink_dcache_sb+0x1ed/0x2d0 [ 797.930027][T17818] reconfigure_super+0x2aa/0x4f0 [ 797.935037][T17818] path_mount+0x1442/0x1ce0 [ 797.940135][T17818] __se_sys_mount+0x23d/0x2e0 [ 797.945072][T17818] __x64_sys_mount+0x63/0x70 [ 797.950094][T17818] do_syscall_64+0x4a/0x90 [ 797.955032][T17818] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 797.961263][T17818] [ 797.963654][T17818] Reported by Kernel Concurrency Sanitizer on: [ 797.970952][T17818] CPU: 1 PID: 17818 Comm: syz-executor.2 Tainted: G W 5.13.0-rc1-syzkaller #0 [ 797.981331][T17818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x20000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x8, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) [ 797.992686][T17818] ================================================================== 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x9, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x9, 0x5, &(0x7f0000000680)=[{&(0x7f0000000440)="112af3bd7cd93997fad9e7a67510d46b06e1c8745d3ac7651f698b5e2d12c07c1af20be4d7ca79be29f857ee9c8c02b023aa50301f0e379500c0c09634e043301eb4766444a7430459af5851c9f4cc80532391d3ffd04828d8b84a7e0765bfa00dbc353e55e71a6792c975ac6b2e3cb563727c6cfff62f5361fcf8b230c39181b5606e0f5c50", 0x86, 0x10001}, {&(0x7f0000000500)="d70df343c3c3e7304f65d755c0963c831b82fdec0c658b3709c3ecaff3d94056509c0f1b9d0eb41dd064667067ecf33c4cf8c4b4299f1ef6f62bfbac1618395ddbff0c7d6293615e5b03c520f28e1c33b8b94b5cee1c9fdfffaa8aa8dd34c9903b07c71f", 0x64, 0xffffffffffffff7f}, {&(0x7f0000000dc0)="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", 0x1000}, {&(0x7f0000001dc0)="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", 0x1000, 0x7}, {&(0x7f0000000580)="8590fb211fe302d7a02e78544e44e680b6e7ab8f0211d05757197ad86c4b95ed1ec440645a9e281d3a1d4906cc6b5c61dca527c5749ae29cbd291a6c7899a1c06ae5e97e79a6bac541db9a0c456219fe9764bca0b052ef7868e3111160aeeeed202ace5e29ec84c8583ed41a86ad998d77beef7b777b992206de783c0c5629b3d8a62541025503777047cd5965bcfa58ae73e6178174058c2fb96d224a04514b4ce53f3bbe3749a7b6d4087c610db4f6518236c1dbff2fc1248baeb91f2925857ce6f87df128516c7fc5879e679bcbc2c045b1", 0xd3, 0x1aa8}], 0x2000, &(0x7f0000000700)={[{@noload}, {@data_writeback}, {@data_err_abort}, {@noinit_itable}], [{@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '&}*!@/'}}, {@subj_user={'subj_user', 0x3d, '^'}}, {@hash}, {@smackfsroot}, {@smackfsroot}, {@obj_type={'obj_type', 0x3d, ':-^'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f00000000c0)=""/217, 0xd9}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x9}}}}}, 0x20}}, 0x0) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x3f000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xa}}}}}, 0x20}}, 0x0) 13:17:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xa, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x40000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf83f0000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/242, 0xf2}, {&(0x7f0000000400)=""/182, 0xb6}, {&(0x7f00000004c0)=""/174, 0xae}, {&(0x7f00000001c0)}], 0x4, 0x9000000, 0x4) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xb}}}}}, 0x20}}, 0x0) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9effffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xb, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xc}}}}}, 0x20}}, 0x0) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xa7000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xc, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f00003a8000/0x3000)=nil, 0x3000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x20000) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000dc0)={0x0, 0xff, 0x5, 0x1}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000011c0)={r2, 0x4, 0xf97e1ca9b2495298, [0xdaae, 0x4, 0xbd, 0x5, 0x6], [0x1, 0x100000000, 0x6, 0xaafa, 0xfffffffffffffffd, 0x3, 0x5ce, 0xfffffffffffffff8, 0x9, 0x2, 0x7, 0xd08, 0x200, 0x2, 0x1, 0xd7, 0x20, 0x10000, 0x4, 0x81, 0x7, 0x5, 0x0, 0x520a, 0x101, 0x9, 0x3, 0x5, 0x44d, 0x5, 0x9f2b, 0x20, 0x0, 0x0, 0x9ea, 0x4d1, 0x4, 0x2, 0x3, 0x3, 0x10000, 0x101, 0x5, 0x69d0, 0x6, 0x0, 0x1, 0x1ff, 0x3, 0x1, 0x80, 0x9, 0xfffffffffffffffd, 0x9, 0x4, 0x100000001, 0x7, 0x0, 0x5, 0x200, 0xc6, 0x9, 0x3, 0x6, 0x1, 0x1f, 0x20, 0x3, 0xfffffffffffffa4c, 0x3, 0x8, 0x4, 0x8, 0x7, 0x2, 0x0, 0x0, 0x4, 0x20, 0x64, 0x7, 0x7f, 0x1, 0x3, 0xc5, 0x5, 0x0, 0x101, 0xffffffffffffffff, 0x6, 0x401, 0x800, 0x4, 0x2, 0x8, 0x45f5, 0x7fffffff, 0xffffffff80000000, 0x3f, 0x10000, 0x5, 0xd7eb, 0x1ff, 0x40, 0x0, 0x4, 0x2, 0x7, 0x7fffffff, 0x200, 0x5, 0x101, 0x3, 0x200, 0x1f, 0x4, 0x8, 0xffffffff80000001, 0x44626f01, 0x8, 0x4]}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r3, 0x84009422, &(0x7f00000012c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f00000001c0)={r4, 0x1, 0x20}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000200)={{}, 0x0, 0xe, @unused=[0x0, 0xfffffffffffeffff, 0xffffffffffff8af2, 0x4], @devid=r4}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000200)={r4, "b4533b4f5f87ddd4537c3d1ad60c478d"}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000001c0)={{}, 0x0, 0x8, @inherit={0x98, &(0x7f0000000100)={0x0, 0xa, 0x100, 0x47, {0x21, 0x7, 0x9, 0x10001, 0x1fa}, [0x9, 0x0, 0x2, 0x8, 0x9, 0x1ff, 0x100000001, 0x80000000, 0x238a, 0x10001]}}, @devid=r4}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f00000003c0)={0x0, 0x2, @start={r4, 0x0, "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", "60db940175aa245409f86977c24c07e06fd2e731b70b6229c2b8c8e11ba265b20c9e03e29cfde5871ab09821467de0c1cce880916c74cd0108366b0efbea7a68a5dae20cdf6f44e302dd36e3e7d7c9041d735d27ba3b86e1f45e85b93582605917aab4be4725ad13b3ab7b3e3bbd92bb008d786e6aa3bce55297a790382a201a6d58f3e2c0f49f27bcc3dd142746b56895a9fca814fafe2c37f82db6d866fa3be438b62e8e74de882f9645b88b8f91da6f46455a191ce0dcda0653634aa7f1778b0e00e4b028f7676b2fb359042d4246be93d6935a4299a1dad4be94806357386c9e946baa53011a433efc26ee632b09614f082cd91a9d2d60d9dc214cbee8cab0de5d8f027992174c435a116268fa18a1d9d705c769f76ddf3ca82f629c83e41d6c4245b759c32548f08bc3fecbc5199a75a7e30f7c5ae687921585e3de57ec4d1009b3d49b5791f7b4676c8db5ab5a516ddff3b1e8bbb5e03dbebaf8d4d187b2231f93973fbeb0afbf5e8976d5a4344b8ca3c857a35b385a96c98f299983c0e17167a2e07daefb824d6ad36246cb670faca1f4aa46c0d05de00555a0a5120e9009028eee0b805991c4f687894620b5952ae69d076563b5ec96a81e2b550bc92adf52c87cefa3d261263fc77832ec2b2cdda8f0bd24c1cf26d1b6ed1d5cdbce7532772529d864f29f3ec36e4d75f3b4157c0f2a1009be8314a9d4f59a136535dcda3e35ecfd2ade154dca484edad2dbad60a8c7b0dda57e175b84ff10235ac20fb7753c1e4bb9734c3984d67388ae671f9d4e97650093d988effdc3936326c1c169a49637ebacb6dfc0c8430222dbdc760b1d72fdc33b72bd21da046084c70c35e66f549ed63cc5ae4ab48007ffb5415a9a55d79ef968816877a0792bdb88b0d34f6f3fc53d2a75e8f3b7100d095a50a96103d417ae7eb732ee5c65beddaf7141f2b98064ef29c2ae94c3ed2c6aa92f81ee30bcca74ed75b7167e2c0aea9f37604ae82dc2b578176168d5e3dcbe110c56a34ebd6b38d5f56a09b777f2984c5a8420bf68e55d4c7e9303e6de33d3c5707771db8c1f27049ceacdf49bd448b0d8ecccaa9d9eee92ed1a5a6260852beed47b21355851ccda05e568b014f03f515eeaad4459efa74510adcab5892d53691856e64ad07fb7ec94470bce0439cac11a06b409f9eb671ad7188415eb27be6d8811c9967db1d4190d8fbce21401ebed8cbbd49a20ec90da87b617333d6d5b9d69e60cec37bd95441c01577a171c8be4d2ae9ce00c31621fb172f43a9e45f1f422257a337ebc2024b108fd789bef64f6a860b315d86f6e3f756b995bea1a693701df20e56b691fa50a006c4ebbc1fef15c53a182c7fc89249c3416a0f402ae1febc4031340d01dedd3ae2bf7fe7d607ff37ebe452e3a1a345843d4dd1abebe005c0725146aafa52ea95e9958868346e15679"}, [0x9, 0x0, 0x8fd0, 0x7, 0x80000001, 0x61a6, 0x3, 0x9, 0x10000, 0xb902, 0x5, 0x20, 0x1, 0xff, 0x1ff, 0xfffffffffffffff9, 0x9, 0x5, 0x38a, 0xfff, 0x200, 0x5, 0x4, 0x3, 0x101, 0x6, 0x101, 0xfffffffffffffffa, 0x8af2, 0x0, 0x2, 0x5, 0x0, 0x7, 0x3, 0xd3, 0x3, 0xfffffffffffffffb, 0x7, 0xcac, 0x6, 0x1ff, 0x1, 0x0, 0x9e, 0xffffffff, 0x1ff, 0x7, 0x5, 0xffffffff, 0x8, 0x7ff, 0xce5, 0x200000000, 0x6, 0x5, 0x36, 0x80b7, 0x800, 0x3, 0xd1e8, 0x9, 0x0, 0x8]}) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000001600)={0x1, 0x0, @start={r4, 0x0, "7b300b8c14df7530a57d547ca5640f1a4264ab95b57f8a5660cabd68400106e5a32d379ff59e24341e22368c38e24ae606df5975692e61578f4c5a66cdfefd9bcef627564f1f5614b06385b33dbeac7853e8d62d8d65962766d152716e56f03341b36bdb821b29031a22348c8e1f240a9f022285e4cce477ba134ac78a42efb6fb432397eb2894af5b3b98c112cf13dedbb3dc25554b72b7939ffd117142ceb57347226145e796965ddf98de4087ca54d9edc12359718ad6fc5ea7b3de26522530cd1a390ce6f6b874cba7a6ae75e9284cc83c0ed13f1634d4d170689a554e770d3f414017d6b260b91e09bcf1a2f6dfae668e2ba60645f3c4143a49ca3bf4afb92a02a92913bdd3f3759f3b36500bd3f43c36be46139d4c81ddc77b757293844e3eeecce20eac50286c3850e40e296a3b113c749e769b90805758ce97868c20ac03cc1fe188d016dff5e2b66de1a491a4729a95ce95fdbb1c99a5a39752f65b07a711123ae202a928d60f44f9c0529452e3b4f65f37bd33dad26aeced1a92b56099b48a4fe54bb1593e5b18547594a240ffff331d03637b1ac4c7751773ea6fbc5279f0e984eee722895c57923c80c05c0d4d9cc17e639d7105810d847d060860b8cf82e3fd2459968685b25401f30fe9268bb75ee019155fd68aa6fe4fd66189311dc58c8d71eaa7e1019d6cc21427fc936ea06057ca7516bbc5101d376aaa34b7cbf781f8a9e5b75788d3be879059b5365f39a3c9fb9aea021e35af0d0315ea7ca0468e5248703a329f543d56e77329c83ec3aee3711def277ad6ee382784e1b90358a22183d00b83387040ffc5e3ddd94de4dea0c65d7bb456e73ea67e20c1b0feaf7444c5a33971154a07a76c39c0b23dc791c5396273e63f5046ffa5f6c28982a995846bdb56105ea2ce37019995ba0e1db9b03cdafdb3a428175111639868554e52741814df9f770534c4eb3e579280075680ab54b974facaae836fc273c8e8cfb7ea817ebfa692102da887a60b833eb44ec874de6ce04d0ff544b7ef520cbd77e0f38f7451f7979d75112eb21565577210ff450489a4f273e03b78886f1ff4b488f7ee2854af990697e78b4397f5da24680ccfa6445f0a66f910adc026cf6f6c1f99826f6592a9ccaa983550dd278b7185a5871c42aa9b39a98bcef5b26a08559961442b3bf8e46b78e418d6eb70e5aa5fe81448e545cd03ab35ae7f0edf8277f89c74bad31bef8d384a79735df86e45c21291478000ec8abd9a2bbb77ae7f1fd53d1561cfab37245e706ae007fefd21203115ec32aedff6295b57ae9d61d9f0a689c71bcfe06a1209bce2b6d533fe24e3503034ad84430f572a1ff3e568a5bbea5829d42bc9b9f48a0118c2a528be4807741e5b5029927f2bbf5ee83fbf0e8d999a79cd1dc7f9a18589e6f8ee5240da7b446faa38196daf116080ea05", "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"}, [0x800, 0x5, 0xa7, 0x800, 0x0, 0x7, 0x80000000, 0x58227025, 0x5, 0x6, 0xd9, 0x8001, 0x7, 0x800, 0x3f, 0x100, 0x84a, 0xebcb, 0x8, 0x7f, 0x81, 0xffffffff80000001, 0x0, 0x3, 0x2, 0x3, 0x4, 0x3, 0xff, 0x2, 0xcdc, 0x6, 0x62, 0x40, 0x400, 0xd2, 0x1d, 0x10000, 0x100000001, 0x80, 0x2, 0x3da, 0x4, 0x5, 0x9, 0x1, 0x1000, 0x1f, 0xffff, 0x2, 0x750f, 0x9, 0x7fff, 0x120, 0xffff, 0x1, 0x180000000, 0x5, 0x4, 0x5, 0xff, 0x965, 0x5, 0x8]}) close_range(r0, r0, 0x2) r5 = fork() process_vm_writev(r5, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xd}}}}}, 0x20}}, 0x0) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xeaffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xe}}}}}, 0x20}}, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xd, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x10}}}}}, 0x20}}, 0x0) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xefffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'sit0\x00'}) socket$packet(0x11, 0x3, 0x300) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = open(&(0x7f0000000000)='./file0\x00', 0x1c1500, 0x41) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$unix(r4, &(0x7f0000000900)={&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000440)="f24eeb781b6f5492673dd6fbc18b89427d329089a0572b0beffe4096d29a3b5901cdd74731e0cd7e24ed4693488b02897e96ccb26c3b96d45a9e7379bab28a14da7357c7a292e0aee3bbe05c14599b3ab55b20b0ceecb519f42ae8d5ef8ee20f20bd552a7921b880320fe467e84b494b511a7b", 0x73}], 0x1, &(0x7f0000000840)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r1, r5]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8, 0x10004800}, 0x0) fchown(r0, 0x0, r3) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = fork() process_vm_writev(r6, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xe, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:00 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xf0ffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:00 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x11}}}}}, 0x20}}, 0x0) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0), 0x2, 0x313000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) setpriority(0x1, r3, 0x9) process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xfeffffff}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x11, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x12}}}}}, 0x20}}, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x25}}}}}, 0x20}}, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x12, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xffffff7f}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x8) preadv(r1, &(0x7f0000000880)=[{&(0x7f0000000100)=""/153, 0x99}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/1, 0x1}, {&(0x7f0000000700)=""/136, 0x88}, {&(0x7f0000000800)=""/75, 0x4b}], 0x9, 0x7, 0x5) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = fork() process_vm_writev(r2, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x22, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x48}}}}}, 0x20}}, 0x0) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xffffff9e}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x4c}}}}}, 0x20}}, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xffffffea}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x25, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x60}}}}}, 0x20}}, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xffffffef}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) ptrace(0x8, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2e, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x68}}}}}, 0x20}}, 0x0) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xfffffff0}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x48, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) syz_open_pts(r2, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r0, r2], 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = fork() process_vm_writev(r3, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x6c}}}}}, 0x20}}, 0x0) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) rmdir(&(0x7f0000000300)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f00000000c0)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80), 0x0, 0x0) 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4c, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x74}}}}}, 0x20}}, 0x0) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x1000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x2) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={{r2}, 0x7f, 0x7, 0xfffffffffffeffff}) fork() 13:17:01 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x60, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x40030000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:01 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x1800000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x7a}}}}}, 0x20}}, 0x0) 13:17:01 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:01 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x100000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x300}}}}}, 0x20}}, 0x0) 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x68, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x8102, 0x17b) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() process_vm_writev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/240, 0xf0}, {&(0x7f0000000400)=""/86, 0x56}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000000540)=""/143, 0xffffffffffffff04}], 0x5, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f00000000c0)=""/218, 0xda}], 0x2, 0x0) process_vm_readv(0x0, &(0x7f00000008c0)=[{&(0x7f0000001dc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/193, 0xc1}, {&(0x7f0000000480)=""/88, 0x58}, {&(0x7f0000000500)=""/29, 0x1d}, {&(0x7f0000000700)=""/12, 0xc}, {&(0x7f0000000740)=""/233, 0xe9}, {&(0x7f0000000840)=""/108, 0x6c}, {&(0x7f0000002dc0)=""/4096, 0x1000}], 0x8, &(0x7f0000000ac0)=[{&(0x7f0000000a40)=""/123, 0x7b}], 0x1, 0x0) 13:17:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x200000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x500}}}}}, 0x20}}, 0x0) 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6c, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2200000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xf8f73f0000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x600}}}}}, 0x20}}, 0x0) 13:17:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000880), 0x680, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r3 = signalfd4(r0, &(0x7f0000000800)={[0x4]}, 0x8, 0x800) splice(r2, &(0x7f0000000780)=0xf84, r3, &(0x7f0000000840)=0x100000000, 0x0, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) preadv(r5, &(0x7f0000000700)=[{&(0x7f00000000c0)=""/160, 0xa0}, {&(0x7f0000000400)=""/179, 0xb3}, {&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/170, 0xaa}, {&(0x7f0000000180)=""/3, 0x3}, {&(0x7f0000000680)=""/124, 0x7c}, {&(0x7f00000001c0)=""/57, 0x39}], 0x7, 0x200, 0x401) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = fork() process_vm_writev(r6, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/197, 0xc5}, {&(0x7f0000000300)=""/246, 0xf6}, {&(0x7f0000000040)=""/86, 0x56}], 0x3, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/216, 0xd8}, {&(0x7f0000000a40)=""/209, 0xd1}], 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r7 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r7, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) ioctl$TCSETS(r7, 0x5402, &(0x7f00000008c0)={0xfffffff7, 0x9, 0x7, 0x8, 0x18, "d8fcacc52df4cb9cb3236472d55baedd6526cb"}) 13:17:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x300000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x74, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7a, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x400000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x700}}}}}, 0x20}}, 0x0) 13:17:02 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x2e00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000dc0)="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", 0x1000}, {&(0x7f0000000180)="e7abd29fe8578ee28903273d2a81d4004872247fadae558932939fd18d", 0x1d}, {&(0x7f0000000100)="121b5283ec41b3b8168f7c91efd5a056fd8216fc6d7ec7cc78d84209df96d5292bc9750c424b29c7c5ee", 0x2a}], 0x3, 0x1) r1 = fork() process_vm_writev(r1, &(0x7f00000007c0)=[{&(0x7f0000000900)=""/204, 0xcc}, {&(0x7f00000001c0)=""/237, 0xed}, {&(0x7f0000000600)=""/88, 0x58}], 0x3, &(0x7f00000000c0)=[{&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000800)=""/199, 0x115}, {&(0x7f0000000400)=""/134, 0x86}, {&(0x7f00000006c0)=""/131, 0x83}], 0x4, 0x0) [ 800.120200][T18263] EXT4-fs: 248 callbacks suppressed [ 800.120214][T18263] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 800.140428][T18270] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 800.150414][T18279] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 800.160984][T18278] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0x900}}}}}, 0x20}}, 0x0) 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x500000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) 13:17:02 executing program 2: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0xffefffff00000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) [ 800.205893][T18283] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xa00}}}}}, 0x20}}, 0x0) 13:17:02 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=@newsa={0x13c, 0x1a, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, @in=@multicast2, {0x0, 0x0, 0x0, 0x600000000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}]}, 0x13c}}, 0x0) [ 800.258344][T18291] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 800.267221][T18297] EXT4-fs (sda1): Invalid want_extra_isize 0 [ 800.283880][T18301] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. [ 800.294437][T18304] EXT4-fs (sda1): Invalid want_extra_isize 0 13:17:02 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x500, 0x0, 0x884a0, &(0x7f00000001c0)={[{@debug_want_extra_isize}]}) 13:17:02 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffd6, 0x0, 0x0, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f0000000780)='./file0\x00', 0x0, 0x9800, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x884a0, &(0x7f00000001c0)) 13:17:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3, 0x99, {0xb00}}}}}, 0x20}}, 0x0) [ 800.306373][T18305] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue. Quota mode: none. 13:17:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000d80), 0x2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r7 = syz_open_pts(r6, 0x0) ioctl$TCSETSF(r7, 0x5457, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, "3de44bef0cae561f3a719fe156b060da72f9a8"}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000078c0)={0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000b40)={0x194, 0x2a, 0x400, 0x70bd27, 0x25dfdbff, "", [@nested={0x87, 0x16, 0x0, 0x1, [@generic="15e7ba089e5ee13387594574587db85ae26fa3a77d111839a5efb3a2a850b6e1e065db41d33376b360675eacaf3c038bb9acf0575990bd1768cfa22004c20df5f16c4f5d9896fda21f9a6bb51f67829d47faf150a0ac5047ce6223487011ad5c23e9ee453f118548a92550f5f34e62ec52b2ca51a35d14e83c430da2399e7a76b4969b"]}, @generic="c498904d38d28729750a27d5fd256f92", @generic="1a0e66094a04f0a1fb72a2588165302402dc3baec20bed3d55ea1a0d176734fb5269b66c742bec3da66c0bdc092f7a2d362a6dd265d509a404f57be8d678b668f60c35c9b05c9b8f0aa7bd9fa6bb8f128f456ba9ff56367d69783e43cf1c7f9d8ebec2c94d614a0ad75091e932018eb9187e9b6dc51ec750dec889aaa9939b909d1f43a779b2f3fef81795a1921a6298015adbb7af3a1d776166afbc1517967d0475b374b4ecd9ae23e379a0641030d6ba4036db7774026cc7832fa58db164a2be1c643fa6567ed16dba3a6c85387f144ea7e85339f8141aed153a3f17c11b8db402f8bc2dc573558cd6"]}, 0x194}, {&(0x7f0000007900)={0x350, 0x12, 0x100, 0x70bd26, 0x25dfdbff, "", [@generic="b5cc17a1c87bb3c395ecae4e61d9e67aa423b0cdda5566a99c226fe9b4ec7d9466ae47722ef5042adc4defd6aef88a6f2edc7c6bbfce3031fb581ab63a91828cf65e158c4441a42573f274e3a51186df3abfd308853013e29387379885fed01599f0cf4d5965775aba4bfb943533f4983b71e30c061bce9b6c6d8081ca441d1f305e21d807b06126f50709390e98ed06f98eeb5ffb9dc35e916c88a054e0726ba389e3485072f29c283e4682cfe824d4428aff7dc29f61e2f84fc44bc3317ca0cba9b7b6fed325bd20777746ae49fefce286f4df5b39da28640488c8", @nested={0x97, 0x55, 0x0, 0x1, [@typed={0xc, 0x7a, 0x0, 0x0, @u64=0x7fff}, @generic="d010805aeb0793e41af3fc24d373327f50587a6093bd8a6a8a825a685554604a9a64c2dc631ef0f8a247f613782786fabdd1dc8340bc3803d68c9c4efc20dfb23df2723f7d2c419e42cc40af5fea52c9ac346654b953b7762edc73d886a72a1426427025e4", @typed={0x6, 0x43, 0x0, 0x0, @str='}\x00'}, @generic="3bc669831b0db8005cf0bc", @generic="d4caf741285210c6fb0288da17e4f2"]}, @nested={0x45, 0x1f, 0x0, 0x1, [@generic="226d25a1bd9723d519c1aae1285e97ce0f56a502aaf2aad35ff2382eb8eae62206a1d447272cdcb9b83e17b34866674b909f7781b30ebb6bb1445ce0907a77d960"]}, @nested={0xbc, 0x23, 0x0, 0x1, [@generic="81bfb3c32e6d42dadb959b86c7a0f8ccb32f2518dd2bcacc557f3cc7d8b22e6d08df7a4d4debc4e7e11587ce87aab3b98a2d5c10abc059cae69d2d89e6a84184ffd82224bd1c63490be0101876412f2531457051a4d91bb18600fc2ac3160ecaafdcacf12b8f2db5180517e9f3cfa81c8f3da6fd39e362e89c2bad892ad15f0164a3cdd2f8ad641553864e970534b76f05610ff889d882b9e9a2255aa5dbba14e5fba4b0bcda7e7ac8dc44549d7f62eb37f705b93b22f15c"]}, @nested={0xc, 0x16, 0x0, 0x1, [@typed={0x8, 0x41, 0x0, 0x0, @str='{%:\x00'}]}, @typed={0xc, 0x89, 0x0, 0x0, @u64=0xfffffffffffffffa}, @generic="a8ecd09046945f9b94c1936e5b0b21867c8078ba48d08da68649d88d50ca041c6cf33fb9e273e99781b9de66b6fbe4178445b1d4e949", @generic="529dc8be3bf20696f276e8a45e4ef994a99f1064b1e40e184629f6c62346d5eae6674295820ea8bae89aa30e17341ef9ee", @typed={0x48, 0x8e, 0x0, 0x0, @binary="6790d6d3e097c61e39771fb62d610454c2ab2e9ca491802b26cf6dafbc5c385a8eaa193670fe462a7f297245e0087d3341d7ef195ca6103fc09bf8d877b247a553293766"}]}, 0x350}, {&(0x7f0000003200)={0x30c, 0x36, 0x2, 0x70bd29, 0x25dfdbfb, "", [@generic="a5d83a70692dbf11d3646332f8f17a375fe3e7a48d1efc82970622b56b784dc9526a760e4495e2f9afcd3f1580869f69edf37d19d0053bfcb3516fafbfb26a588b83f1eec5f401d76fb6d021935ba2f7f34b6ceb20609db10fc2946ff047c1909fc23f8e333792b95bd9653939d134be4c9de27c5b2cfc80de821abc2495e9888308e2bc00e18c058882df1c1c332bbbe247149af91aa2a3ed883e5d32f8a2fe557643b68dc9c1bb105755e7bc9eec02063f6c59", @nested={0x248, 0x47, 0x0, 0x1, [@typed={0x6, 0x2c, 0x0, 0x0, @str='*\x00'}, @typed={0x4, 0x84}, @generic="45646f7e03626bb960ac31f6e4f69ae8434a4afdce1b4474a442b919c956e12041069e027f116ba5b06f044a79bf1766a76db081fc75b469eb81f45a28650306fd0a8504b76b9f3c3681dcfbd7d12dcee0e43ef39e236435a26e1b9bf84c067b7f1a0233d1904297166041714d0d24bd844fe18e9633b91f70a6ca77ebd94b0a722c94e96546a8fd3d3b403760d46979891139", @generic="a36eedf24dc457ebaf8245ce4ceb7290df7a16dc4f93f0f4a909846335bb295d922e0929f4a984f6bfffb407d9b2fd168c840af73c98ae9ee26dfa886762b30a9f9b89a884845d28f50cd65fd0b73990872c7c5d0795425bdb2f447eb697f04ed15258e46f4e7d956ce63dcdd4e9e3c3db08742be95abf91380d854915a0c447c9fb90348cc8bd03301207fa78ac0123def0a340e64b9af57cb08df1", @typed={0xdc, 0x5c, 0x0, 0x0, @binary="ed4db9fe2fb68c5905de9a6b67269efed581374b5cbec8739dffbe42783145a8605edd121847559d602321500b2c0abbb577ae50bc78c2a87498cc25f2e55f2ded7ca0a069981c52689745ae4bbc32ae004b906bfd4dcab3a9b48d01b23ee088cda61c833f6ae2846e79ec2d45de2d9c16d487e826e14f2ad58ebaec7c779bf749583793981363509d8497a077412cead46876630dd921f4fa3efd294e6021fc2dbffa1c0ee405d5c279b943aac5d788328bcc381813a2e9a1f3f01dc563beec4560439d78d1b16f74179b0960dd818037e8778cd04c1965"}, @generic="7cc31312d65cd4", @typed={0x8, 0xc, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}, @generic="9042bb21b43d2e1bef86b7479e1ecacff360ce28237a1fc2f960e9aaf3f0"]}]}, 0x30c}, {&(0x7f0000003540)={0x4a4, 0x3b, 0x10, 0x70bd29, 0x25dfdbfe, "", [@generic="2b6e1159b8f7c0bb612832acbf118b3c588dccde6e781555d2849e46c3bfaab251b93d340402fb0b3a834b8fa58b5e2f81", @generic="c1453fe7740c519f09723834c05e489e49a5182abdf7af6b47dbc81139fbead8d8ee6a4cb8840a1a147070ec82b3597ebecebd0b0a175d34329ed193c7ea3336b74f96bf7dd2f82286d0a5f32d0ba6d51dfe5c1792297e3934e4e4c7cfe72122008aa030a7dadb631d9c91c95f918859e9e58e19555610a23fd22a3b8301042b75c6e1fb7028c768d130a1c0d019fc3b8ec83b6c6188f05fbe60eb1dea6533f3c60b3e570a9f828d184d88ccb566f04f09a5bc3bf21f1fda2a24c40eae81b4180e18cc63b3a6", @typed={0x14, 0x1f, 0x0, 0x0, @ipv6=@empty}, @nested={0x387, 0x53, 0x0, 0x1, [@generic="d260d2210e12ae50b6ca7d317b19986da8cbe22c897de02f27d051508ebf6b505fbad3ad214b4de70390742a7f23a4d45d873d116d74c1597d653e7c13c04d996290ed656c47386cceae7067e96779795702690aeda15fc3bb2c1e31b3a40f2acb0ad6bec111c1335110734fb8da523b8e00a20140710fb4168320c9217a5c05253e66bcff0cf320605c63c63179599323b494f87760fabd14d2f64966f1d04df2683b49514f9f69218b5d802fc42592d5c60145eb402214da6697594b8808c6e14f0e4a2ae44fdc264fdbd7aa933663840f0979139a2822ad654d369dd8c79676085458c64367833acc8a7194c7ef6aec6c", @generic="267b39152b825a3ffeb384935c6b9f594c0ee5d004aa1fe87bc4daaa1afef0ebde050e1edfeef8513d12f85753bfd3fceeb0b6d0233b54bde244040775d94852b53002c46405041ddd509d2bea74d568e862398ba9d450d5ccb70d55c4b820122b59c3a8273b3c4658df8ecf2a870750b06009750de55c65b7a70a35058e224e669c2063d22f381679209223020df3a149e348e9d7e168676a1f7430e236162846e8bb319a584d9f0a68c3e0db389e128bd06aa996864fc824bf8e59fd7f987d84ed71fce87591b6e613bc515298f9677111c70707713e2e698764de73788d845ec834a3f537fdf9ab1